Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
1 # This Source Code Form is subject to the terms of the Mozilla Public
2 # License, v. 2.0. If a copy of the MPL was not distributed with this
3 # file, You can obtain one at http://mozilla.org/MPL/2.0/.
5 ANDROID_APK_NAME := browser-junit3-debug
7 ANDROID_EXTRA_JARS += \
8 browser-junit3.jar \
9 $(NULL)
11 PP_TARGETS += manifest
12 manifest := AndroidManifest.xml.in
13 manifest_FLAGS += \
14 -DANDROID_BROWSER_TARGET_PACKAGE_NAME='$(ANDROID_PACKAGE_NAME)' \
15 -DANDROID_BROWSER_APP_DISPLAYNAME='$(MOZ_APP_DISPLAYNAME) Browser Tests' \
16 -DMOZ_ANDROID_SHARED_ID='$(ANDROID_PACKAGE_NAME).sharedID' \
17 $(NULL)
18 ANDROID_MANIFEST_FILE := $(CURDIR)/AndroidManifest.xml
20 include $(topsrcdir)/config/rules.mk
22 tools:: $(ANDROID_APK_NAME).apk
24 # The test APK needs to know the contents of the target APK while not
25 # being linked against them. This is a best effort to avoid getting
26 # out of sync with base's build config.
27 JARS_DIR := $(DEPTH)/mobile/android/base
28 JAVA_BOOTCLASSPATH := $(JAVA_BOOTCLASSPATH):$(subst $(NULL) ,:,$(wildcard $(JARS_DIR)/*.jar))
29 # We also want to re-compile classes.dex when the associated base
30 # content changes.
31 classes.dex: $(wildcard $(JARS_DIR)/*.jar)