testing/mozbase/mozdevice/sut_tests/README.md

Wed, 31 Dec 2014 06:09:35 +0100

author
Michael Schloh von Bennewitz <michael@schloh.com>
date
Wed, 31 Dec 2014 06:09:35 +0100
changeset 0
6474c204b198
permissions
-rw-r--r--

Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.

     1 # SUT Agent tests
     3 * In order to run these tests you need to have a phone running SUT Agent
     4 connected.
     6 * Make sure you can reach the device's TCP 20700 and 20701 ports. Doing
     7 *adb forward tcp:20700 tcp:20700 && adb forward tcp:20701 tcp:20701* will
     8 forward your localhost 20700 and 20701 ports to the ones on the device.
    10 * You might need some common tools like cp. Use the `setup-tools.sh` script
    11 to install them. It requires `$ADB` to point to the `adb` binary on the system.
    13 * Make sure the SUTAgent on the device is running.
    15 * Run: python runtests.py

mercurial