summaryrefslogtreecommitdiff
path: root/libs/ultrahdr/jpegencoderhelper.cpp
diff options
context:
space:
mode:
author Siarhei Vishniakou <svv@google.com> 2023-05-08 11:57:24 -0700
committer Siarhei Vishniakou <svv@google.com> 2023-05-12 15:54:34 +0000
commit90ee4785e159ba5c52760defd6d80248b6c938c4 (patch)
tree798f988cee9315a72798424dd8864ad646c06076 /libs/ultrahdr/jpegencoderhelper.cpp
parentfdb2aee92bb6af36914b73b2e9dc4b65fb7edd09 (diff)
Ensure injected touches poke user activity
Sometimes, there is a need to simulate a touch event via an adb shell command. This could be done with the following command, for example: adb shell input tap 500 500 In this CL, we add a unit test to check that the user activity is getting poked after an event is injected. Bug: 281559590 Test: m inputflinger_tests && $ANDROID_HOST_OUT/nativetest64/inputflinger_tests/inputflinger_tests Change-Id: I6ac049135dddd828870a926906f28ba4239d9400
Diffstat (limited to 'libs/ultrahdr/jpegencoderhelper.cpp')
0 files changed, 0 insertions, 0 deletions