437474990d
Add a fake UI that can run a sequence of actions (and replies). Bug: 31961946 Test: manual Change-Id: Iee0fac5ddf75a97eff7b401c9c932634489349de
38 lines
1.1 KiB
Plaintext
38 lines
1.1 KiB
Plaintext
# Copyright (C) 2015 The Android Open Source Project
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
# you may not use this file except in compliance with the License.
|
|
# You may obtain a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
# See the License for the specific language governing permissions and
|
|
# limitations under the License.
|
|
|
|
# This script is used on the host only. It uses a common subset
|
|
# shell dialect that should work well. It is partially derived
|
|
# from art/tools/art.
|
|
|
|
function follow_links() {
|
|
if [ z"$BASH_SOURCE" != z ]; then
|
|
file="$BASH_SOURCE"
|
|
else
|
|
file="$0"
|
|
fi
|
|
while [ -h "$file" ]; do
|
|
# On Mac OS, readlink -f doesn't work.
|
|
file="$(readlink "$file")"
|
|
done
|
|
echo "$file"
|
|
}
|
|
|
|
|
|
PROG_NAME="$(follow_links)"
|
|
PROG_DIR="$(cd "${PROG_NAME%/*}" ; pwd -P)"
|
|
ANDROID_ROOT=$PROG_DIR/..
|
|
|
|
java -cp $ANDROID_ROOT/framework/preload2.jar com.android.preload.Main $@
|