| Index: build/android/provision_devices.py
|
| diff --git a/build/android/provision_devices.py b/build/android/provision_devices.py
|
| index 5f00b31e8a817440b99d845b6745401c6d46c947..ee52c7163750e49d65a1759184b39fd75528540a 100755
|
| --- a/build/android/provision_devices.py
|
| +++ b/build/android/provision_devices.py
|
| @@ -19,9 +19,9 @@ import subprocess
|
| import sys
|
| import time
|
|
|
| -from pylib import android_commands
|
| from pylib import constants
|
| from pylib import device_settings
|
| +from pylib.device import battery_utils
|
| from pylib.device import device_blacklist
|
| from pylib.device import device_errors
|
| from pylib.device import device_utils
|
| @@ -41,54 +41,148 @@ class _DEFAULT_TIMEOUTS(object):
|
| HELP_TEXT = '{}s on L, {}s on pre-L'.format(LOLLIPOP, PRE_LOLLIPOP)
|
|
|
|
|
| -def KillHostHeartbeat():
|
| - ps = subprocess.Popen(['ps', 'aux'], stdout=subprocess.PIPE)
|
| - stdout, _ = ps.communicate()
|
| - matches = re.findall('\\n.*host_heartbeat.*', stdout)
|
| - for match in matches:
|
| - logging.info('An instance of host heart beart running... will kill')
|
| - pid = re.findall(r'(\S+)', match)[1]
|
| - subprocess.call(['kill', str(pid)])
|
| +class _PHASES(object):
|
| + WIPE = 'wipe'
|
| + PROPERTIES = 'properties'
|
| + FINISH = 'finish'
|
|
|
| + ALL = [WIPE, PROPERTIES, FINISH]
|
|
|
| -def LaunchHostHeartbeat():
|
| - # Kill if existing host_heartbeat
|
| - KillHostHeartbeat()
|
| - # Launch a new host_heartbeat
|
| - logging.info('Spawning host heartbeat...')
|
| - subprocess.Popen([os.path.join(constants.DIR_SOURCE_ROOT,
|
| - 'build/android/host_heartbeat.py')])
|
|
|
| +def ProvisionDevices(options):
|
| + if options.device is not None:
|
| + devices = [options.device]
|
| + else:
|
| + devices = device_utils.DeviceUtils.HealthyDevices()
|
|
|
| -def PushAndLaunchAdbReboot(device, target):
|
| - """Pushes and launches the adb_reboot binary on the device.
|
| + parallel_devices = device_utils.DeviceUtils.parallel(devices)
|
| + parallel_devices.pMap(ProvisionDevice, options)
|
| + if options.auto_reconnect:
|
| + _LaunchHostHeartbeat()
|
| + blacklist = device_blacklist.ReadBlacklist()
|
| + if all(d in blacklist for d in devices):
|
| + raise device_errors.NoDevicesError
|
| + return 0
|
| +
|
| +
|
| +def ProvisionDevice(device, options):
|
| + if options.reboot_timeout:
|
| + reboot_timeout = options.reboot_timeout
|
| + elif (device.build_version_sdk >=
|
| + constants.ANDROID_SDK_VERSION_CODES.LOLLIPOP):
|
| + reboot_timeout = _DEFAULT_TIMEOUTS.LOLLIPOP
|
| + else:
|
| + reboot_timeout = _DEFAULT_TIMEOUTS.PRE_LOLLIPOP
|
| +
|
| + def should_run_phase(phase_name):
|
| + return not options.phases or phase_name in options.phases
|
| +
|
| + def run_phase(phase_func, reboot=True):
|
| + device.WaitUntilFullyBooted(timeout=reboot_timeout)
|
| + phase_func(device, options)
|
| + if reboot:
|
| + device.Reboot(False, retries=0)
|
| + device.adb.WaitForDevice()
|
| +
|
| + try:
|
| + if should_run_phase(_PHASES.WIPE):
|
| + run_phase(WipeDevice)
|
| +
|
| + if should_run_phase(_PHASES.PROPERTIES):
|
| + run_phase(SetProperties)
|
| +
|
| + if should_run_phase(_PHASES.FINISH):
|
| + run_phase(FinishProvisioning, reboot=False)
|
| +
|
| + except (errors.WaitForResponseTimedOutError,
|
| + device_errors.CommandTimeoutError):
|
| + logging.exception('Timed out waiting for device %s. Adding to blacklist.',
|
| + str(device))
|
| + device_blacklist.ExtendBlacklist([str(device)])
|
| +
|
| + except device_errors.CommandFailedError:
|
| + logging.exception('Failed to provision device %s. Adding to blacklist.',
|
| + str(device))
|
| + device_blacklist.ExtendBlacklist([str(device)])
|
| +
|
| +
|
| +def WipeDevice(device, options):
|
| + """Wipes data from device, keeping only the adb_keys for authorization.
|
| +
|
| + After wiping data on a device that has been authorized, adb can still
|
| + communicate with the device, but after reboot the device will need to be
|
| + re-authorized because the adb keys file is stored in /data/misc/adb/.
|
| + Thus, adb_keys file is rewritten so the device does not need to be
|
| + re-authorized.
|
|
|
| Arguments:
|
| - device: The DeviceUtils instance for the device to which the adb_reboot
|
| - binary should be pushed.
|
| - target: The build target (example, Debug or Release) which helps in
|
| - locating the adb_reboot binary.
|
| + device: the device to wipe
|
| """
|
| - logging.info('Will push and launch adb_reboot on %s' % str(device))
|
| - # Kill if adb_reboot is already running.
|
| + if options.skip_wipe:
|
| + return
|
| +
|
| try:
|
| - # Don't try to kill adb_reboot more than once. We don't expect it to be
|
| - # running at all.
|
| - device.KillAll('adb_reboot', blocking=True, timeout=2, retries=0)
|
| + device.EnableRoot()
|
| + device_authorized = device.FileExists(constants.ADB_KEYS_FILE)
|
| + if device_authorized:
|
| + adb_keys = device.ReadFile(constants.ADB_KEYS_FILE,
|
| + as_root=True).splitlines()
|
| + device.RunShellCommand(['wipe', 'data'],
|
| + as_root=True, check_return=True)
|
| + device.adb.WaitForDevice()
|
| +
|
| + if device_authorized:
|
| + adb_keys_set = set(adb_keys)
|
| + for adb_key_file in options.adb_key_files or []:
|
| + try:
|
| + with open(adb_key_file, 'r') as f:
|
| + adb_public_keys = f.readlines()
|
| + adb_keys_set.update(adb_public_keys)
|
| + except IOError:
|
| + logging.warning('Unable to find adb keys file %s.' % adb_key_file)
|
| + _WriteAdbKeysFile(device, '\n'.join(adb_keys_set))
|
| except device_errors.CommandFailedError:
|
| - # We can safely ignore the exception because we don't expect adb_reboot
|
| - # to be running.
|
| - pass
|
| - # Push adb_reboot
|
| - logging.info(' Pushing adb_reboot ...')
|
| - adb_reboot = os.path.join(constants.DIR_SOURCE_ROOT,
|
| - 'out/%s/adb_reboot' % target)
|
| - device.PushChangedFiles([(adb_reboot, '/data/local/tmp/')])
|
| - # Launch adb_reboot
|
| - logging.info(' Launching adb_reboot ...')
|
| - device.RunShellCommand([
|
| - device.GetDevicePieWrapper(),
|
| - '/data/local/tmp/adb_reboot'])
|
| + logging.exception('Possible failure while wiping the device. '
|
| + 'Attempting to continue.')
|
| +
|
| +
|
| +def _WriteAdbKeysFile(device, adb_keys_string):
|
| + dir_path = posixpath.dirname(constants.ADB_KEYS_FILE)
|
| + device.RunShellCommand(['mkdir', '-p', dir_path],
|
| + as_root=True, check_return=True)
|
| + device.RunShellCommand(['restorecon', dir_path],
|
| + as_root=True, check_return=True)
|
| + device.WriteFile(constants.ADB_KEYS_FILE, adb_keys_string, as_root=True)
|
| + device.RunShellCommand(['restorecon', constants.ADB_KEYS_FILE],
|
| + as_root=True, check_return=True)
|
| +
|
| +
|
| +def SetProperties(device, options):
|
| + try:
|
| + device.EnableRoot()
|
| + except device_errors.CommandFailedError as e:
|
| + logging.warning(str(e))
|
| +
|
| + _ConfigureLocalProperties(device, options.enable_java_debug)
|
| + device_settings.ConfigureContentSettings(
|
| + device, device_settings.DETERMINISTIC_DEVICE_SETTINGS)
|
| + if options.disable_location:
|
| + device_settings.ConfigureContentSettings(
|
| + device, device_settings.DISABLE_LOCATION_SETTINGS)
|
| + else:
|
| + device_settings.ConfigureContentSettings(
|
| + device, device_settings.ENABLE_LOCATION_SETTINGS)
|
| + device_settings.SetLockScreenSettings(device)
|
| + if options.disable_network:
|
| + device_settings.ConfigureContentSettings(
|
| + device, device_settings.NETWORK_DISABLED_SETTINGS)
|
| +
|
| + if options.min_battery_level is not None:
|
| + try:
|
| + battery = battery_utils.BatteryUtils(device)
|
| + battery.ChargeDeviceToLevel(options.min_battery_level)
|
| + except device_errors.CommandFailedError as e:
|
| + logging.exception('Unable to charge device to specified level.')
|
|
|
|
|
| def _ConfigureLocalProperties(device, java_debug=True):
|
| @@ -101,7 +195,8 @@ def _ConfigureLocalProperties(device, java_debug=True):
|
| 'ro.setupwizard.mode=DISABLED',
|
| ]
|
| if java_debug:
|
| - local_props.append('%s=all' % android_commands.JAVA_ASSERT_PROPERTY)
|
| + local_props.append(
|
| + '%s=all' % device_utils.DeviceUtils.JAVA_ASSERT_PROPERTY)
|
| local_props.append('debug.checkjni=1')
|
| try:
|
| device.WriteFile(
|
| @@ -110,153 +205,66 @@ def _ConfigureLocalProperties(device, java_debug=True):
|
| # Android will not respect the local props file if it is world writable.
|
| device.RunShellCommand(
|
| ['chmod', '644', constants.DEVICE_LOCAL_PROPERTIES_PATH],
|
| - as_root=True)
|
| - except device_errors.CommandFailedError as e:
|
| - logging.warning(str(e))
|
| -
|
| - # LOCAL_PROPERTIES_PATH = '/data/local.prop'
|
| + as_root=True, check_return=True)
|
| + except device_errors.CommandFailedError:
|
| + logging.exception('Failed to configure local properties.')
|
|
|
| -def WriteAdbKeysFile(device, adb_keys_string):
|
| - dir_path = posixpath.dirname(constants.ADB_KEYS_FILE)
|
| - device.RunShellCommand('mkdir -p %s' % dir_path, as_root=True)
|
| - device.RunShellCommand('restorecon %s' % dir_path, as_root=True)
|
| - device.WriteFile(constants.ADB_KEYS_FILE, adb_keys_string, as_root=True)
|
| - device.RunShellCommand('restorecon %s' % constants.ADB_KEYS_FILE,
|
| - as_root=True)
|
|
|
| +def FinishProvisioning(device, options):
|
| + device.RunShellCommand(
|
| + ['date', '-s', time.strftime('%Y%m%d.%H%M%S', time.gmtime())],
|
| + as_root=True, check_return=True)
|
| + props = device.RunShellCommand('getprop', check_return=True)
|
| + for prop in props:
|
| + logging.info(' %s' % prop)
|
| + if options.auto_reconnect:
|
| + _PushAndLaunchAdbReboot(device, options.target)
|
|
|
| -def WipeDeviceData(device, options):
|
| - """Wipes data from device, keeping only the adb_keys for authorization.
|
|
|
| - After wiping data on a device that has been authorized, adb can still
|
| - communicate with the device, but after reboot the device will need to be
|
| - re-authorized because the adb keys file is stored in /data/misc/adb/.
|
| - Thus, adb_keys file is rewritten so the device does not need to be
|
| - re-authorized.
|
| +def _PushAndLaunchAdbReboot(device, target):
|
| + """Pushes and launches the adb_reboot binary on the device.
|
|
|
| Arguments:
|
| - device: the device to wipe
|
| + device: The DeviceUtils instance for the device to which the adb_reboot
|
| + binary should be pushed.
|
| + target: The build target (example, Debug or Release) which helps in
|
| + locating the adb_reboot binary.
|
| """
|
| - device_authorized = device.FileExists(constants.ADB_KEYS_FILE)
|
| - if device_authorized:
|
| - adb_keys = device.ReadFile(constants.ADB_KEYS_FILE,
|
| - as_root=True).splitlines()
|
| - device.RunShellCommand('wipe data', as_root=True)
|
| - if device_authorized:
|
| - adb_keys_set = set(adb_keys)
|
| - for adb_key_file in options.adb_key_files or []:
|
| - try:
|
| - with open(adb_key_file, 'r') as f:
|
| - adb_public_keys = f.readlines()
|
| - adb_keys_set.update(adb_public_keys)
|
| - except IOError:
|
| - logging.warning('Unable to find adb keys file %s.' % adb_key_file)
|
| - WriteAdbKeysFile(device, '\n'.join(adb_keys_set))
|
| -
|
| -
|
| -def WipeDeviceIfPossible(device, timeout, options):
|
| - try:
|
| - device.EnableRoot()
|
| - WipeDeviceData(device, options)
|
| - device.Reboot(True, timeout=timeout, retries=0)
|
| - except (errors.DeviceUnresponsiveError, device_errors.CommandFailedError):
|
| - pass
|
| -
|
| -
|
| -def ChargeDeviceToLevel(device, level):
|
| - def device_charged():
|
| - battery_level = device.GetBatteryInfo().get('level')
|
| - if battery_level is None:
|
| - logging.warning('Unable to find current battery level.')
|
| - battery_level = 100
|
| - else:
|
| - logging.info('current battery level: %d', battery_level)
|
| - battery_level = int(battery_level)
|
| - return battery_level >= level
|
| -
|
| - timeout_retry.WaitFor(device_charged, wait_period=60)
|
| -
|
| -
|
| -def ProvisionDevice(device, options):
|
| - if options.reboot_timeout:
|
| - reboot_timeout = options.reboot_timeout
|
| - elif (device.build_version_sdk >=
|
| - constants.ANDROID_SDK_VERSION_CODES.LOLLIPOP):
|
| - reboot_timeout = _DEFAULT_TIMEOUTS.LOLLIPOP
|
| - else:
|
| - reboot_timeout = _DEFAULT_TIMEOUTS.PRE_LOLLIPOP
|
| + logging.info('Will push and launch adb_reboot on %s' % str(device))
|
| + # Kill if adb_reboot is already running.
|
| + device.KillAll('adb_reboot', blocking=True, timeout=2, quiet=True)
|
| + # Push adb_reboot
|
| + logging.info(' Pushing adb_reboot ...')
|
| + adb_reboot = os.path.join(constants.DIR_SOURCE_ROOT,
|
| + 'out/%s/adb_reboot' % target)
|
| + device.PushChangedFiles([(adb_reboot, '/data/local/tmp/')])
|
| + # Launch adb_reboot
|
| + logging.info(' Launching adb_reboot ...')
|
| + device.RunShellCommand(
|
| + [device.GetDevicePieWrapper(), '/data/local/tmp/adb_reboot'],
|
| + check_return=True)
|
|
|
| - try:
|
| - if not options.skip_wipe:
|
| - WipeDeviceIfPossible(device, reboot_timeout, options)
|
| - try:
|
| - device.EnableRoot()
|
| - except device_errors.CommandFailedError as e:
|
| - logging.warning(str(e))
|
| - _ConfigureLocalProperties(device, options.enable_java_debug)
|
| - device_settings.ConfigureContentSettings(
|
| - device, device_settings.DETERMINISTIC_DEVICE_SETTINGS)
|
| - if options.disable_location:
|
| - device_settings.ConfigureContentSettings(
|
| - device, device_settings.DISABLE_LOCATION_SETTINGS)
|
| - else:
|
| - device_settings.ConfigureContentSettings(
|
| - device, device_settings.ENABLE_LOCATION_SETTINGS)
|
| - device_settings.SetLockScreenSettings(device)
|
| - if options.disable_network:
|
| - device_settings.ConfigureContentSettings(
|
| - device, device_settings.NETWORK_DISABLED_SETTINGS)
|
| - if options.min_battery_level is not None:
|
| - try:
|
| - device.SetCharging(True)
|
| - ChargeDeviceToLevel(device, options.min_battery_level)
|
| - except device_errors.CommandFailedError as e:
|
| - logging.exception('Unable to charge device to specified level.')
|
| -
|
| - if not options.skip_wipe:
|
| - device.Reboot(True, timeout=reboot_timeout, retries=0)
|
| - device.RunShellCommand('date -s %s' % time.strftime('%Y%m%d.%H%M%S',
|
| - time.gmtime()),
|
| - as_root=True)
|
| - props = device.RunShellCommand('getprop')
|
| - for prop in props:
|
| - logging.info(' %s' % prop)
|
| - if options.auto_reconnect:
|
| - PushAndLaunchAdbReboot(device, options.target)
|
| - except (errors.WaitForResponseTimedOutError,
|
| - device_errors.CommandTimeoutError):
|
| - logging.info('Timed out waiting for device %s. Adding to blacklist.',
|
| - str(device))
|
| - # Device black list is reset by bb_device_status_check.py per build.
|
| - device_blacklist.ExtendBlacklist([str(device)])
|
| - except device_errors.CommandFailedError:
|
| - logging.exception('Failed to provision device %s. Adding to blacklist.',
|
| - str(device))
|
| - device_blacklist.ExtendBlacklist([str(device)])
|
|
|
| +def _LaunchHostHeartbeat():
|
| + # Kill if existing host_heartbeat
|
| + KillHostHeartbeat()
|
| + # Launch a new host_heartbeat
|
| + logging.info('Spawning host heartbeat...')
|
| + subprocess.Popen([os.path.join(constants.DIR_SOURCE_ROOT,
|
| + 'build/android/host_heartbeat.py')])
|
|
|
| -def ProvisionDevices(options):
|
| - if options.device is not None:
|
| - devices = [options.device]
|
| - else:
|
| - devices = android_commands.GetAttachedDevices()
|
|
|
| - parallel_devices = device_utils.DeviceUtils.parallel(devices)
|
| - parallel_devices.pMap(ProvisionDevice, options)
|
| - if options.auto_reconnect:
|
| - LaunchHostHeartbeat()
|
| - blacklist = device_blacklist.ReadBlacklist()
|
| - if all(d in blacklist for d in devices):
|
| - raise device_errors.NoDevicesError
|
| - return 0
|
| +def KillHostHeartbeat():
|
| + ps = subprocess.Popen(['ps', 'aux'], stdout=subprocess.PIPE)
|
| + stdout, _ = ps.communicate()
|
| + matches = re.findall('\\n.*host_heartbeat.*', stdout)
|
| + for match in matches:
|
| + logging.info('An instance of host heart beart running... will kill')
|
| + pid = re.findall(r'(\S+)', match)[1]
|
| + subprocess.call(['kill', str(pid)])
|
|
|
|
|
| def main():
|
| - custom_handler = logging.StreamHandler(sys.stdout)
|
| - custom_handler.setFormatter(run_tests_helper.CustomFormatter())
|
| - logging.getLogger().addHandler(custom_handler)
|
| - logging.getLogger().setLevel(logging.INFO)
|
| -
|
| # Recommended options on perf bots:
|
| # --disable-network
|
| # TODO(tonyg): We eventually want network on. However, currently radios
|
| @@ -271,6 +279,10 @@ def main():
|
| parser.add_argument('-d', '--device', metavar='SERIAL',
|
| help='the serial number of the device to be provisioned'
|
| ' (the default is to provision all devices attached)')
|
| + parser.add_argument('--phase', action='append', choices=_PHASES.ALL,
|
| + dest='phases',
|
| + help='Phases of provisioning to run. '
|
| + '(If omitted, all phases will be run.)')
|
| parser.add_argument('--skip-wipe', action='store_true', default=False,
|
| help="don't wipe device data during provisioning")
|
| parser.add_argument('--reboot-timeout', metavar='SECS', type=int,
|
| @@ -294,9 +306,13 @@ def main():
|
| ' disconnections')
|
| parser.add_argument('--adb-key-files', type=str, nargs='+',
|
| help='list of adb keys to push to device')
|
| + parser.add_argument('-v', '--verbose', action='count', default=1,
|
| + help='Log more information.')
|
| args = parser.parse_args()
|
| constants.SetBuildType(args.target)
|
|
|
| + run_tests_helper.SetLogLevel(args.verbose)
|
| +
|
| return ProvisionDevices(args)
|
|
|
|
|
|
|