2018-03-13 01:07:55 +00:00
|
|
|
class Scrcpy < Formula
|
|
|
|
desc "Display and control your Android device"
|
|
|
|
homepage "https://github.com/Genymobile/scrcpy"
|
|
|
|
url "https://github.com/Genymobile/scrcpy/archive/v1.1.tar.gz"
|
|
|
|
sha256 "1b56caa4aad5add2c49ea436e9f26282b55a413003d0d73b029a1fbf48da0a1c"
|
2018-04-21 16:36:59 +00:00
|
|
|
revision 1
|
2018-03-13 01:07:55 +00:00
|
|
|
|
2018-03-24 10:48:52 +00:00
|
|
|
bottle do
|
2018-04-21 19:26:43 +00:00
|
|
|
sha256 "b46f843a8569c69e1b99301e0a69335f443c870df3eead3ad78fa3c141b93a21" => :high_sierra
|
|
|
|
sha256 "4bdcb5d23d7b1852aec8e181001af014fd255be58176e58a9b5eb9bf2e68733f" => :sierra
|
|
|
|
sha256 "c33b30a90c2f801987349a3f958bb6b1e35e44b4d3fe7ecbd9016eb3c32f0020" => :el_capitan
|
2018-03-24 10:48:52 +00:00
|
|
|
end
|
|
|
|
|
2018-03-13 01:07:55 +00:00
|
|
|
depends_on "meson" => :build
|
|
|
|
depends_on "ninja" => :build
|
|
|
|
depends_on "pkg-config" => :build
|
|
|
|
|
|
|
|
depends_on "ffmpeg"
|
|
|
|
depends_on "sdl2"
|
|
|
|
|
|
|
|
resource "prebuilt-server" do
|
|
|
|
url "https://github.com/Genymobile/scrcpy/releases/download/v1.1/scrcpy-server-v1.1.jar"
|
|
|
|
sha256 "14826512bf38447ec94adf3b531676ce038d19e7e06757fb4e537882b17e77b3"
|
|
|
|
end
|
|
|
|
|
|
|
|
def install
|
|
|
|
r = resource("prebuilt-server")
|
|
|
|
r.verify_download_integrity(r.fetch)
|
|
|
|
cp r.cached_download, buildpath/"prebuilt-server.jar"
|
|
|
|
|
|
|
|
mkdir "build" do
|
|
|
|
system "meson", "--prefix=#{prefix}",
|
|
|
|
"-Dprebuilt_server=#{buildpath/"prebuilt-server.jar"}",
|
|
|
|
".."
|
|
|
|
|
|
|
|
system "ninja", "install"
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def caveats; <<~EOS
|
|
|
|
At runtime, adb must be accessible from your PATH.
|
|
|
|
|
|
|
|
You can install adb from Homebrew Cask:
|
|
|
|
brew cask install android-platform-tools
|
|
|
|
EOS
|
|
|
|
end
|
|
|
|
|
|
|
|
test do
|
|
|
|
fakeadb = (testpath/"fakeadb.sh")
|
|
|
|
|
|
|
|
# When running, scrcpy calls adb three times:
|
|
|
|
# - adb push ... (to push scrcpy-server.jar)
|
|
|
|
# - adb reverse ... tcp:PORT ...
|
|
|
|
# - adb shell ...
|
|
|
|
# However, exiting on $1 = shell didn't work properly, so instead
|
|
|
|
# fakeadb exits on $1 = reverse
|
|
|
|
|
|
|
|
fakeadb.write <<~EOS
|
|
|
|
#!/bin/sh
|
|
|
|
echo $@ >> #{testpath/"fakeadb.log"}
|
|
|
|
|
|
|
|
if [ "$1" = "reverse" ]; then
|
|
|
|
exit 42
|
|
|
|
fi
|
|
|
|
EOS
|
|
|
|
|
|
|
|
fakeadb.chmod 0755
|
|
|
|
ENV["ADB"] = fakeadb
|
|
|
|
|
|
|
|
# It's expected to fail after adb reverse step because fakeadb exits
|
|
|
|
# with code 42
|
|
|
|
out = shell_output("#{bin}/scrcpy -p 1337 2>&1", 1)
|
|
|
|
assert_match(/ 42/, out)
|
|
|
|
|
|
|
|
log_content = File.read(testpath/"fakeadb.log")
|
|
|
|
|
|
|
|
# Check that it used port we've specified
|
|
|
|
assert_match(/tcp:1337/, log_content)
|
|
|
|
|
|
|
|
# Check that it tried to push something from its prefix
|
|
|
|
assert_match(/push #{prefix}/, log_content)
|
|
|
|
end
|
|
|
|
end
|