Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
1 #filter substitution
2 <?xml version="1.0" encoding="utf-8"?>
3 <manifest xmlns:android="http://schemas.android.com/apk/res/android"
4 package="org.mozilla.roboexample.test"
5 android:versionCode="1"
6 android:versionName="1.0" >
8 <uses-sdk android:minSdkVersion="8" />
10 <instrumentation
11 android:name="org.mozilla.gecko.FennecInstrumentationTestRunner"
12 android:targetPackage="@ANDROID_PACKAGE_NAME@" />
14 <application
15 android:label="@string/app_name" >
16 <uses-library android:name="android.test.runner" />
18 <!-- Fake handlers to ensure that we have some share intents to show in our share handler list -->
19 <activity android:name="org.mozilla.gecko.RobocopShare1"
20 android:label="Robocop fake activity">
22 <intent-filter android:label="Fake robocop share handler 1">
23 <action android:name="android.intent.action.SEND" />
24 <category android:name="android.intent.category.DEFAULT" />
25 <data android:mimeType="text/*" />
26 </intent-filter>
28 </activity>
30 <activity android:name="org.mozilla.gecko.RobocopShare2"
31 android:label="Robocop fake activity 2">
33 <intent-filter android:label="Fake robocop share handler 2">
34 <action android:name="android.intent.action.SEND" />
35 <category android:name="android.intent.category.DEFAULT" />
36 <data android:mimeType="text/*" />
37 </intent-filter>
39 </activity>
41 </application>
43 </manifest>