sbsv2/raptor/test/smoke_suite/unfrozen_savespace.py
changeset 3 e1eecf4d390d
equal deleted inserted replaced
1:be27ed110b50 3:e1eecf4d390d
       
     1 #
       
     2 # Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
       
     3 # All rights reserved.
       
     4 # This component and the accompanying materials are made available
       
     5 # under the terms of the License "Eclipse Public License v1.0"
       
     6 # which accompanies this distribution, and is available
       
     7 # at the URL "http://www.eclipse.org/legal/epl-v10.html".
       
     8 #
       
     9 # Initial Contributors:
       
    10 # Nokia Corporation - initial contribution.
       
    11 #
       
    12 # Contributors:
       
    13 #
       
    14 # Description: 
       
    15 #
       
    16 
       
    17 from raptor_tests import AntiTargetSmokeTest
       
    18 
       
    19 def run():
       
    20 
       
    21 	t = AntiTargetSmokeTest()
       
    22 	t.id = "99"
       
    23 	t.name = "unfrozen_savespace"
       
    24 
       
    25 	t.command = "sbs -b smoke_suite/test_resources/unfrozen/bld.inf -k -c winscw -c armv5 CLEAN" \
       
    26 				" && sbs -b smoke_suite/test_resources/unfrozen/bld.inf -c winscw.savespace -c armv5.savespace"
       
    27 
       
    28 	t.targets = [
       
    29 		"$(EPOCROOT)/epoc32/release/armv5/lib/unfrozensymbols.dso",
       
    30 		"$(EPOCROOT)/epoc32/release/armv5/lib/unfrozensymbols{000a0000}.dso",
       
    31 		"$(EPOCROOT)/epoc32/release/armv5/urel/unfrozensymbols.dll",
       
    32 		"$(EPOCROOT)/epoc32/release/armv5/urel/unfrozensymbols.dll.sym",
       
    33 		"$(EPOCROOT)/epoc32/release/armv5/urel/unfrozensymbols.dll.map",
       
    34 		"$(EPOCROOT)/epoc32/release/armv5/lib/unfrozensymbols2.dso",
       
    35 		"$(EPOCROOT)/epoc32/release/armv5/lib/unfrozensymbols2{000a0000}.dso",
       
    36 		"$(EPOCROOT)/epoc32/release/armv5/urel/unfrozensymbols2.dll",
       
    37 		"$(EPOCROOT)/epoc32/release/armv5/urel/unfrozensymbols2.dll.sym",
       
    38 		"$(EPOCROOT)/epoc32/release/armv5/urel/unfrozensymbols2.dll.map",
       
    39 		"$(EPOCROOT)/epoc32/release/armv5/urel/test_unfrozen.exe",
       
    40 		"$(EPOCROOT)/epoc32/release/armv5/urel/test_unfrozen.exe.sym",
       
    41 		"$(EPOCROOT)/epoc32/release/armv5/urel/test_unfrozen.exe.map",
       
    42 		"$(EPOCROOT)/epoc32/release/winscw/urel/unfrozensymbols.dll",
       
    43 		"$(EPOCROOT)/epoc32/release/winscw/urel/unfrozensymbols.dll.map",
       
    44 		"$(EPOCROOT)/epoc32/release/winscw/urel/unfrozensymbols2.dll",
       
    45 		"$(EPOCROOT)/epoc32/release/winscw/urel/unfrozensymbols2.dll.map",
       
    46 		"$(EPOCROOT)/epoc32/release/winscw/urel/test_unfrozen.exe",
       
    47 		"$(EPOCROOT)/epoc32/release/winscw/urel/test_unfrozen.exe.map",
       
    48 		"$(EPOCROOT)/epoc32/release/armv5/udeb/unfrozensymbols.dll",
       
    49 		"$(EPOCROOT)/epoc32/release/armv5/udeb/unfrozensymbols.dll.sym",
       
    50 		"$(EPOCROOT)/epoc32/release/armv5/udeb/unfrozensymbols.dll.map",
       
    51 		"$(EPOCROOT)/epoc32/release/armv5/udeb/unfrozensymbols2.dll",
       
    52 		"$(EPOCROOT)/epoc32/release/armv5/udeb/unfrozensymbols2.dll.sym",
       
    53 		"$(EPOCROOT)/epoc32/release/armv5/udeb/unfrozensymbols2.dll.map",
       
    54 		"$(EPOCROOT)/epoc32/release/armv5/udeb/test_unfrozen.exe",
       
    55 		"$(EPOCROOT)/epoc32/release/armv5/udeb/test_unfrozen.exe.sym",
       
    56 		"$(EPOCROOT)/epoc32/release/armv5/udeb/test_unfrozen.exe.map",
       
    57 		"$(EPOCROOT)/epoc32/release/winscw/udeb/unfrozensymbols.dll",
       
    58 		"$(EPOCROOT)/epoc32/release/winscw/udeb/unfrozensymbols.lib",
       
    59 		"$(EPOCROOT)/epoc32/release/winscw/udeb/unfrozensymbols2.dll",
       
    60 		"$(EPOCROOT)/epoc32/release/winscw/udeb/unfrozensymbols2.lib",
       
    61 		"$(EPOCROOT)/epoc32/release/winscw/udeb/test_unfrozen.exe"
       
    62 		]
       
    63 
       
    64 	t.antitargets = []
       
    65 
       
    66 	t.addbuildantitargets('smoke_suite/test_resources/unfrozen/bld.inf', [
       
    67 		"test_unfrozen_/armv5/udeb",
       
    68 		"test_unfrozen_/armv5/urel",
       
    69 		"test_unfrozen_/winscw/udeb",
       
    70 		"test_unfrozen_/winscw/urel"
       
    71 		# TODO: Add these anti targets once we figure out how to actually delete
       
    72 		# them.
       
    73 		# "unfrozensymbols2_dll/armv5/udeb",
       
    74 		# "unfrozensymbols2_dll/armv5/urel",
       
    75 		# "unfrozensymbols2_dll/winscw/udeb",
       
    76 		# "unfrozensymbols2_dll/winscw/urel",
       
    77 		# "unfrozensymbols_dll/armv5/udeb",
       
    78 		# "unfrozensymbols_dll/armv5/urel",
       
    79 		# "unfrozensymbols_dll/winscw/udeb",
       
    80 		# "unfrozensymbols_dll/winscw/urel"
       
    81 		] )
       
    82 
       
    83 	t.countmatch = [
       
    84 			[".*Elf2e32: Warning: New Symbol .* found, export\(s\) not yet Frozen.*", 14],
       
    85 			[".*\.def\(\d\) : .*@\d.*", 10]
       
    86 		]
       
    87 
       
    88 	t.warnings = 8
       
    89 
       
    90 	t.run()
       
    91 
       
    92 	return t
       
    93