Summary: Moves lldbsuite tests to lldb/test/API.
This is a largely mechanical change, moved with the following steps:
```
rm lldb/test/API/testcases
mkdir -p lldb/test/API/{test_runner/test,tools/lldb-{server,vscode}}
mv lldb/packages/Python/lldbsuite/test/test_runner/test lldb/test/API/test_runner
for d in $(find lldb/packages/Python/lldbsuite/test/* -maxdepth 0 -type d | egrep -v "make|plugins|test_runner|tools"); do mv $d lldb/test/API; done
for d in $(find lldb/packages/Python/lldbsuite/test/tools/lldb-vscode -maxdepth 1 -mindepth 1 | grep -v ".py"); do mv $d lldb/test/API/tools/lldb-vscode; done
for d in $(find lldb/packages/Python/lldbsuite/test/tools/lldb-server -maxdepth 1 -mindepth 1 | egrep -v "gdbremote_testcase.py|lldbgdbserverutils.py|socket_packet_pump.py"); do mv $d lldb/test/API/tools/lldb-server; done
```
lldb/packages/Python/lldbsuite/__init__.py and lldb/test/API/lit.cfg.py were also updated with the new directory structure.
Reviewers: labath, JDevlieghere
Tags: #lldb
Differential Revision: https://reviews.llvm.org/D71151
37 lines
1.4 KiB
Python
37 lines
1.4 KiB
Python
import lldb
|
|
from lldbsuite.test.lldbtest import *
|
|
from lldbsuite.test.decorators import *
|
|
|
|
# This test checks that source code location is shown correctly
|
|
# when DWARF5 debug information is used.
|
|
|
|
class TestTargetSourceMap(TestBase):
|
|
|
|
mydir = TestBase.compute_mydir(__file__)
|
|
|
|
@skipIf(archs="aarch64", oslist="linux",
|
|
bugnumber="https://bugs.llvm.org/show_bug.cgi?id=44180")
|
|
def test_source_map(self):
|
|
# Set the target soure map to map "./" to the current test directory.
|
|
yaml_path = os.path.join(self.getSourceDir(), "a.yaml")
|
|
yaml_base, ext = os.path.splitext(yaml_path)
|
|
obj_path = self.getBuildArtifact(yaml_base)
|
|
self.yaml2obj(yaml_path, obj_path)
|
|
|
|
def cleanup():
|
|
if os.path.exists(obj_path):
|
|
os.unlink(obj_path)
|
|
|
|
# Execute the cleanup function during test case tear down.
|
|
self.addTearDownHook(cleanup)
|
|
|
|
# Create a target with the object file we just created from YAML
|
|
target = self.dbg.CreateTarget(obj_path)
|
|
|
|
# Check we are able to show the locations properly.
|
|
self.expect("b main", VALID_BREAKPOINT_LOCATION,
|
|
substrs=['main + 13 at test.cpp:2:3, address = 0x000000000040052d'])
|
|
|
|
self.expect("b foo", VALID_BREAKPOINT_LOCATION,
|
|
substrs=['foo() + 4 at test.cpp:6:1, address = 0x0000000000400534'])
|