Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
michael@0 | 1 | # This Source Code Form is subject to the terms of the Mozilla Public |
michael@0 | 2 | # License, v. 2.0. If a copy of the MPL was not distributed with this |
michael@0 | 3 | # file, You can obtain one at http://mozilla.org/MPL/2.0/. |
michael@0 | 4 | |
michael@0 | 5 | import os |
michael@0 | 6 | import posixpath |
michael@0 | 7 | from StringIO import StringIO |
michael@0 | 8 | |
michael@0 | 9 | from dmunit import DeviceManagerTestCase |
michael@0 | 10 | |
michael@0 | 11 | class ExecEnvTestCase(DeviceManagerTestCase): |
michael@0 | 12 | |
michael@0 | 13 | def runTest(self): |
michael@0 | 14 | """Exec test with env vars.""" |
michael@0 | 15 | # Push the file |
michael@0 | 16 | localfile = os.path.join('test-files', 'test_script.sh') |
michael@0 | 17 | remotefile = posixpath.join(self.dm.getDeviceRoot(), 'test_script.sh') |
michael@0 | 18 | self.dm.pushFile(localfile, remotefile) |
michael@0 | 19 | |
michael@0 | 20 | # Run the cmd |
michael@0 | 21 | out = StringIO() |
michael@0 | 22 | self.dm.shell(['sh', remotefile], out, env={'THE_ANSWER': 42}) |
michael@0 | 23 | |
michael@0 | 24 | # Rewind the output file |
michael@0 | 25 | out.seek(0) |
michael@0 | 26 | # Make sure first line is 42 |
michael@0 | 27 | line = out.readline() |
michael@0 | 28 | self.assertTrue(int(line) == 42) |
michael@0 | 29 | |
michael@0 | 30 | # Clean up |
michael@0 | 31 | self.dm.removeFile(remotefile) |