Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
1 from sut import MockAgent
2 import mozdevice
3 import unittest
5 class PsTest(unittest.TestCase):
7 pscommands = [('ps',
8 "10029 549 com.android.launcher\n"
9 "10066 1198 com.twitter.android")]
11 bad_pscommands = [('ps',
12 "abcdef 549 com.android.launcher\n"
13 "10066 1198 com.twitter.android")]
15 def test_processList(self):
16 a = MockAgent(self,
17 commands=self.pscommands)
18 d = mozdevice.DroidSUT("127.0.0.1", port=a.port)
19 pslist = d.getProcessList()
20 self.assertEqual(len(pslist), 2)
21 self.assertEqual(pslist[0], [549, 'com.android.launcher', 10029])
22 self.assertEqual(pslist[1], [1198, 'com.twitter.android', 10066])
24 a.wait()
26 def test_badProcessList(self):
27 a = MockAgent(self,
28 commands=self.bad_pscommands)
29 d = mozdevice.DroidSUT("127.0.0.1", port=a.port)
30 exceptionTriggered = False
31 try:
32 d.getProcessList()
33 except mozdevice.DMError:
34 exceptionTriggered = True
36 self.assertTrue(exceptionTriggered)
38 a.wait()
40 def test_processExist(self):
41 for i in [('com.android.launcher', 549),
42 ('com.fennec.android', None)]:
43 a = MockAgent(self, commands=self.pscommands)
44 d = mozdevice.DroidSUT("127.0.0.1", port=a.port)
45 self.assertEqual(d.processExist(i[0]), i[1])
46 a.wait()
48 if __name__ == '__main__':
49 unittest.main()