diff options
| author | 2023-05-08 11:57:24 -0700 | |
|---|---|---|
| committer | 2023-05-12 15:54:34 +0000 | |
| commit | 90ee4785e159ba5c52760defd6d80248b6c938c4 (patch) | |
| tree | 798f988cee9315a72798424dd8864ad646c06076 /libs/ultrahdr/jpegencoderhelper.cpp | |
| parent | fdb2aee92bb6af36914b73b2e9dc4b65fb7edd09 (diff) | |
Ensure injected touches poke user activity
Sometimes, there is a need to simulate a touch event via an adb shell
command. This could be done with the following command, for example:
adb shell input tap 500 500
In this CL, we add a unit test to check that the user activity is
getting poked after an event is injected.
Bug: 281559590
Test: m inputflinger_tests && $ANDROID_HOST_OUT/nativetest64/inputflinger_tests/inputflinger_tests
Change-Id: I6ac049135dddd828870a926906f28ba4239d9400
Diffstat (limited to 'libs/ultrahdr/jpegencoderhelper.cpp')
0 files changed, 0 insertions, 0 deletions