sbsv2/raptor/test/smoke_suite/unfrozen_savespace.py
changeset 3 e1eecf4d390d
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/sbsv2/raptor/test/smoke_suite/unfrozen_savespace.py	Mon Nov 16 09:46:46 2009 +0000
@@ -0,0 +1,93 @@
+#
+# Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
+# All rights reserved.
+# This component and the accompanying materials are made available
+# under the terms of the License "Eclipse Public License v1.0"
+# which accompanies this distribution, and is available
+# at the URL "http://www.eclipse.org/legal/epl-v10.html".
+#
+# Initial Contributors:
+# Nokia Corporation - initial contribution.
+#
+# Contributors:
+#
+# Description: 
+#
+
+from raptor_tests import AntiTargetSmokeTest
+
+def run():
+
+	t = AntiTargetSmokeTest()
+	t.id = "99"
+	t.name = "unfrozen_savespace"
+
+	t.command = "sbs -b smoke_suite/test_resources/unfrozen/bld.inf -k -c winscw -c armv5 CLEAN" \
+				" && sbs -b smoke_suite/test_resources/unfrozen/bld.inf -c winscw.savespace -c armv5.savespace"
+
+	t.targets = [
+		"$(EPOCROOT)/epoc32/release/armv5/lib/unfrozensymbols.dso",
+		"$(EPOCROOT)/epoc32/release/armv5/lib/unfrozensymbols{000a0000}.dso",
+		"$(EPOCROOT)/epoc32/release/armv5/urel/unfrozensymbols.dll",
+		"$(EPOCROOT)/epoc32/release/armv5/urel/unfrozensymbols.dll.sym",
+		"$(EPOCROOT)/epoc32/release/armv5/urel/unfrozensymbols.dll.map",
+		"$(EPOCROOT)/epoc32/release/armv5/lib/unfrozensymbols2.dso",
+		"$(EPOCROOT)/epoc32/release/armv5/lib/unfrozensymbols2{000a0000}.dso",
+		"$(EPOCROOT)/epoc32/release/armv5/urel/unfrozensymbols2.dll",
+		"$(EPOCROOT)/epoc32/release/armv5/urel/unfrozensymbols2.dll.sym",
+		"$(EPOCROOT)/epoc32/release/armv5/urel/unfrozensymbols2.dll.map",
+		"$(EPOCROOT)/epoc32/release/armv5/urel/test_unfrozen.exe",
+		"$(EPOCROOT)/epoc32/release/armv5/urel/test_unfrozen.exe.sym",
+		"$(EPOCROOT)/epoc32/release/armv5/urel/test_unfrozen.exe.map",
+		"$(EPOCROOT)/epoc32/release/winscw/urel/unfrozensymbols.dll",
+		"$(EPOCROOT)/epoc32/release/winscw/urel/unfrozensymbols.dll.map",
+		"$(EPOCROOT)/epoc32/release/winscw/urel/unfrozensymbols2.dll",
+		"$(EPOCROOT)/epoc32/release/winscw/urel/unfrozensymbols2.dll.map",
+		"$(EPOCROOT)/epoc32/release/winscw/urel/test_unfrozen.exe",
+		"$(EPOCROOT)/epoc32/release/winscw/urel/test_unfrozen.exe.map",
+		"$(EPOCROOT)/epoc32/release/armv5/udeb/unfrozensymbols.dll",
+		"$(EPOCROOT)/epoc32/release/armv5/udeb/unfrozensymbols.dll.sym",
+		"$(EPOCROOT)/epoc32/release/armv5/udeb/unfrozensymbols.dll.map",
+		"$(EPOCROOT)/epoc32/release/armv5/udeb/unfrozensymbols2.dll",
+		"$(EPOCROOT)/epoc32/release/armv5/udeb/unfrozensymbols2.dll.sym",
+		"$(EPOCROOT)/epoc32/release/armv5/udeb/unfrozensymbols2.dll.map",
+		"$(EPOCROOT)/epoc32/release/armv5/udeb/test_unfrozen.exe",
+		"$(EPOCROOT)/epoc32/release/armv5/udeb/test_unfrozen.exe.sym",
+		"$(EPOCROOT)/epoc32/release/armv5/udeb/test_unfrozen.exe.map",
+		"$(EPOCROOT)/epoc32/release/winscw/udeb/unfrozensymbols.dll",
+		"$(EPOCROOT)/epoc32/release/winscw/udeb/unfrozensymbols.lib",
+		"$(EPOCROOT)/epoc32/release/winscw/udeb/unfrozensymbols2.dll",
+		"$(EPOCROOT)/epoc32/release/winscw/udeb/unfrozensymbols2.lib",
+		"$(EPOCROOT)/epoc32/release/winscw/udeb/test_unfrozen.exe"
+		]
+
+	t.antitargets = []
+
+	t.addbuildantitargets('smoke_suite/test_resources/unfrozen/bld.inf', [
+		"test_unfrozen_/armv5/udeb",
+		"test_unfrozen_/armv5/urel",
+		"test_unfrozen_/winscw/udeb",
+		"test_unfrozen_/winscw/urel"
+		# TODO: Add these anti targets once we figure out how to actually delete
+		# them.
+		# "unfrozensymbols2_dll/armv5/udeb",
+		# "unfrozensymbols2_dll/armv5/urel",
+		# "unfrozensymbols2_dll/winscw/udeb",
+		# "unfrozensymbols2_dll/winscw/urel",
+		# "unfrozensymbols_dll/armv5/udeb",
+		# "unfrozensymbols_dll/armv5/urel",
+		# "unfrozensymbols_dll/winscw/udeb",
+		# "unfrozensymbols_dll/winscw/urel"
+		] )
+
+	t.countmatch = [
+			[".*Elf2e32: Warning: New Symbol .* found, export\(s\) not yet Frozen.*", 14],
+			[".*\.def\(\d\) : .*@\d.*", 10]
+		]
+
+	t.warnings = 8
+
+	t.run()
+
+	return t
+