Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
1 # This Source Code Form is subject to the terms of the Mozilla Public
2 # License, v. 2.0. If a copy of the MPL was not distributed with this
3 # file, You can obtain one at http://mozilla.org/MPL/2.0/.
5 import re
6 import socket
8 from dmunit import DeviceManagerTestCase
10 class PromptTestCase(DeviceManagerTestCase):
12 def tearDown(self):
13 if self.sock:
14 self.sock.close()
16 def runTest(self):
17 """This tests getting a prompt from the device.
18 """
19 self.sock = None
20 ip = self.dm.host
21 port = self.dm.port
23 promptre = re.compile('.*\$\>\x00')
24 data = ""
25 self.sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
26 self.sock.connect((ip, int(port)))
27 data = self.sock.recv(1024)
28 print data
29 self.assertTrue(promptre.match(data))