Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
michael@0 | 1 | #T gmake skip |
michael@0 | 2 | EXPECTED := some data |
michael@0 | 3 | |
michael@0 | 4 | # verify that we can load native command modules from |
michael@0 | 5 | # multiple directories in PYCOMMANDPATH separated by the native |
michael@0 | 6 | # path separator |
michael@0 | 7 | ifdef __WIN32__ |
michael@0 | 8 | PS:=; |
michael@0 | 9 | else |
michael@0 | 10 | PS:=: |
michael@0 | 11 | endif |
michael@0 | 12 | CMD = %pycmd writetofile |
michael@0 | 13 | CMD2 = %pymod writetofile |
michael@0 | 14 | PYCOMMANDPATH = $(TESTPATH)$(PS)$(TESTPATH)/subdir |
michael@0 | 15 | |
michael@0 | 16 | all: |
michael@0 | 17 | $(CMD) results $(EXPECTED) |
michael@0 | 18 | test "$$(cat results)" = "$(EXPECTED)" |
michael@0 | 19 | $(CMD2) results2 $(EXPECTED) |
michael@0 | 20 | test "$$(cat results2)" = "$(EXPECTED)" |
michael@0 | 21 | @echo TEST-PASS |