Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
michael@0 | 1 | #!/usr/bin/env python |
michael@0 | 2 | |
michael@0 | 3 | import mozdevice |
michael@0 | 4 | import mozlog |
michael@0 | 5 | import unittest |
michael@0 | 6 | from sut import MockAgent |
michael@0 | 7 | |
michael@0 | 8 | |
michael@0 | 9 | class TestKill(unittest.TestCase): |
michael@0 | 10 | |
michael@0 | 11 | def test_killprocess(self): |
michael@0 | 12 | commands = [("ps", "1000 1486 com.android.settings\n" |
michael@0 | 13 | "10016 420 com.android.location.fused\n" |
michael@0 | 14 | "10023 335 com.android.systemui\n"), |
michael@0 | 15 | ("kill com.android.settings", |
michael@0 | 16 | "Successfully killed com.android.settings\n")] |
michael@0 | 17 | m = MockAgent(self, commands=commands) |
michael@0 | 18 | d = mozdevice.DroidSUT("127.0.0.1", port=m.port, logLevel=mozlog.DEBUG) |
michael@0 | 19 | # No error raised means success |
michael@0 | 20 | self.assertEqual(None, d.killProcess("com.android.settings")) |
michael@0 | 21 | |
michael@0 | 22 | |
michael@0 | 23 | if __name__ == '__main__': |
michael@0 | 24 | unittest.main() |