OLD | NEW |
(Empty) | |
| 1 # Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 # Use of this source code is governed by a BSD-style license that can be |
| 3 # found in the LICENSE file. |
| 4 |
| 5 # pylint: disable=W0212 |
| 6 |
| 7 import fcntl |
| 8 import logging |
| 9 import os |
| 10 import psutil |
| 11 |
| 12 from pylib import cmd_helper |
| 13 from pylib import constants |
| 14 from pylib import valgrind_tools |
| 15 |
| 16 # TODO(jbudorick) Remove once telemetry gets switched over. |
| 17 import pylib.android_commands |
| 18 import pylib.device.device_utils |
| 19 |
| 20 |
| 21 def _GetProcessStartTime(pid): |
| 22 return psutil.Process(pid).create_time |
| 23 |
| 24 |
| 25 class _FileLock(object): |
| 26 """With statement-aware implementation of a file lock. |
| 27 |
| 28 File locks are needed for cross-process synchronization when the |
| 29 multiprocessing Python module is used. |
| 30 """ |
| 31 def __init__(self, path): |
| 32 self._fd = -1 |
| 33 self._path = path |
| 34 |
| 35 def __enter__(self): |
| 36 self._fd = os.open(self._path, os.O_RDONLY | os.O_CREAT) |
| 37 if self._fd < 0: |
| 38 raise Exception('Could not open file %s for reading' % self._path) |
| 39 fcntl.flock(self._fd, fcntl.LOCK_EX) |
| 40 |
| 41 def __exit__(self, _exception_type, _exception_value, traceback): |
| 42 fcntl.flock(self._fd, fcntl.LOCK_UN) |
| 43 os.close(self._fd) |
| 44 |
| 45 |
| 46 class Forwarder(object): |
| 47 """Thread-safe class to manage port forwards from the device to the host.""" |
| 48 |
| 49 _DEVICE_FORWARDER_FOLDER = (constants.TEST_EXECUTABLE_DIR + |
| 50 '/forwarder/') |
| 51 _DEVICE_FORWARDER_PATH = (constants.TEST_EXECUTABLE_DIR + |
| 52 '/forwarder/device_forwarder') |
| 53 _LOCK_PATH = '/tmp/chrome.forwarder.lock' |
| 54 # Defined in host_forwarder_main.cc |
| 55 _HOST_FORWARDER_LOG = '/tmp/host_forwarder_log' |
| 56 |
| 57 _instance = None |
| 58 |
| 59 @staticmethod |
| 60 def Map(port_pairs, device, tool=None): |
| 61 """Runs the forwarder. |
| 62 |
| 63 Args: |
| 64 port_pairs: A list of tuples (device_port, host_port) to forward. Note |
| 65 that you can specify 0 as a device_port, in which case a |
| 66 port will by dynamically assigned on the device. You can |
| 67 get the number of the assigned port using the |
| 68 DevicePortForHostPort method. |
| 69 device: A DeviceUtils instance. |
| 70 tool: Tool class to use to get wrapper, if necessary, for executing the |
| 71 forwarder (see valgrind_tools.py). |
| 72 |
| 73 Raises: |
| 74 Exception on failure to forward the port. |
| 75 """ |
| 76 # TODO(jbudorick) Remove once telemetry gets switched over. |
| 77 if isinstance(device, pylib.android_commands.AndroidCommands): |
| 78 device = pylib.device.device_utils.DeviceUtils(device) |
| 79 if not tool: |
| 80 tool = valgrind_tools.CreateTool(None, device) |
| 81 with _FileLock(Forwarder._LOCK_PATH): |
| 82 instance = Forwarder._GetInstanceLocked(tool) |
| 83 instance._InitDeviceLocked(device, tool) |
| 84 |
| 85 device_serial = str(device) |
| 86 redirection_commands = [ |
| 87 ['--adb=' + constants.GetAdbPath(), |
| 88 '--serial-id=' + device_serial, |
| 89 '--map', str(device_port), str(host_port)] |
| 90 for device_port, host_port in port_pairs] |
| 91 logging.info('Forwarding using commands: %s', redirection_commands) |
| 92 |
| 93 for redirection_command in redirection_commands: |
| 94 try: |
| 95 (exit_code, output) = cmd_helper.GetCmdStatusAndOutput( |
| 96 [instance._host_forwarder_path] + redirection_command) |
| 97 except OSError as e: |
| 98 if e.errno == 2: |
| 99 raise Exception('Unable to start host forwarder. Make sure you have' |
| 100 ' built host_forwarder.') |
| 101 else: raise |
| 102 if exit_code != 0: |
| 103 Forwarder._KillDeviceLocked(device, tool) |
| 104 raise Exception('%s exited with %d:\n%s' % ( |
| 105 instance._host_forwarder_path, exit_code, '\n'.join(output))) |
| 106 tokens = output.split(':') |
| 107 if len(tokens) != 2: |
| 108 raise Exception('Unexpected host forwarder output "%s", ' |
| 109 'expected "device_port:host_port"' % output) |
| 110 device_port = int(tokens[0]) |
| 111 host_port = int(tokens[1]) |
| 112 serial_with_port = (device_serial, device_port) |
| 113 instance._device_to_host_port_map[serial_with_port] = host_port |
| 114 instance._host_to_device_port_map[host_port] = serial_with_port |
| 115 logging.info('Forwarding device port: %d to host port: %d.', |
| 116 device_port, host_port) |
| 117 |
| 118 @staticmethod |
| 119 def UnmapDevicePort(device_port, device): |
| 120 """Unmaps a previously forwarded device port. |
| 121 |
| 122 Args: |
| 123 device: A DeviceUtils instance. |
| 124 device_port: A previously forwarded port (through Map()). |
| 125 """ |
| 126 # TODO(jbudorick) Remove once telemetry gets switched over. |
| 127 if isinstance(device, pylib.android_commands.AndroidCommands): |
| 128 device = pylib.device.device_utils.DeviceUtils(device) |
| 129 with _FileLock(Forwarder._LOCK_PATH): |
| 130 Forwarder._UnmapDevicePortLocked(device_port, device) |
| 131 |
| 132 @staticmethod |
| 133 def UnmapAllDevicePorts(device): |
| 134 """Unmaps all the previously forwarded ports for the provided device. |
| 135 |
| 136 Args: |
| 137 device: A DeviceUtils instance. |
| 138 port_pairs: A list of tuples (device_port, host_port) to unmap. |
| 139 """ |
| 140 # TODO(jbudorick) Remove once telemetry gets switched over. |
| 141 if isinstance(device, pylib.android_commands.AndroidCommands): |
| 142 device = pylib.device.device_utils.DeviceUtils(device) |
| 143 with _FileLock(Forwarder._LOCK_PATH): |
| 144 if not Forwarder._instance: |
| 145 return |
| 146 adb_serial = str(device) |
| 147 if adb_serial not in Forwarder._instance._initialized_devices: |
| 148 return |
| 149 port_map = Forwarder._GetInstanceLocked( |
| 150 None)._device_to_host_port_map |
| 151 for (device_serial, device_port) in port_map.keys(): |
| 152 if adb_serial == device_serial: |
| 153 Forwarder._UnmapDevicePortLocked(device_port, device) |
| 154 # There are no more ports mapped, kill the device_forwarder. |
| 155 tool = valgrind_tools.CreateTool(None, device) |
| 156 Forwarder._KillDeviceLocked(device, tool) |
| 157 |
| 158 @staticmethod |
| 159 def DevicePortForHostPort(host_port): |
| 160 """Returns the device port that corresponds to a given host port.""" |
| 161 with _FileLock(Forwarder._LOCK_PATH): |
| 162 (_device_serial, device_port) = Forwarder._GetInstanceLocked( |
| 163 None)._host_to_device_port_map.get(host_port) |
| 164 return device_port |
| 165 |
| 166 @staticmethod |
| 167 def RemoveHostLog(): |
| 168 if os.path.exists(Forwarder._HOST_FORWARDER_LOG): |
| 169 os.unlink(Forwarder._HOST_FORWARDER_LOG) |
| 170 |
| 171 @staticmethod |
| 172 def GetHostLog(): |
| 173 if not os.path.exists(Forwarder._HOST_FORWARDER_LOG): |
| 174 return '' |
| 175 with file(Forwarder._HOST_FORWARDER_LOG, 'r') as f: |
| 176 return f.read() |
| 177 |
| 178 @staticmethod |
| 179 def _GetInstanceLocked(tool): |
| 180 """Returns the singleton instance. |
| 181 |
| 182 Note that the global lock must be acquired before calling this method. |
| 183 |
| 184 Args: |
| 185 tool: Tool class to use to get wrapper, if necessary, for executing the |
| 186 forwarder (see valgrind_tools.py). |
| 187 """ |
| 188 if not Forwarder._instance: |
| 189 Forwarder._instance = Forwarder(tool) |
| 190 return Forwarder._instance |
| 191 |
| 192 def __init__(self, tool): |
| 193 """Constructs a new instance of Forwarder. |
| 194 |
| 195 Note that Forwarder is a singleton therefore this constructor should be |
| 196 called only once. |
| 197 |
| 198 Args: |
| 199 tool: Tool class to use to get wrapper, if necessary, for executing the |
| 200 forwarder (see valgrind_tools.py). |
| 201 """ |
| 202 assert not Forwarder._instance |
| 203 self._tool = tool |
| 204 self._initialized_devices = set() |
| 205 self._device_to_host_port_map = dict() |
| 206 self._host_to_device_port_map = dict() |
| 207 self._host_forwarder_path = os.path.join( |
| 208 constants.GetOutDirectory(), 'host_forwarder') |
| 209 assert os.path.exists(self._host_forwarder_path), 'Please build forwarder2' |
| 210 self._device_forwarder_path_on_host = os.path.join( |
| 211 constants.GetOutDirectory(), 'forwarder_dist') |
| 212 self._InitHostLocked() |
| 213 |
| 214 @staticmethod |
| 215 def _UnmapDevicePortLocked(device_port, device): |
| 216 """Internal method used by UnmapDevicePort(). |
| 217 |
| 218 Note that the global lock must be acquired before calling this method. |
| 219 """ |
| 220 instance = Forwarder._GetInstanceLocked(None) |
| 221 serial = str(device) |
| 222 serial_with_port = (serial, device_port) |
| 223 if not serial_with_port in instance._device_to_host_port_map: |
| 224 logging.error('Trying to unmap non-forwarded port %d' % device_port) |
| 225 return |
| 226 redirection_command = ['--adb=' + constants.GetAdbPath(), |
| 227 '--serial-id=' + serial, |
| 228 '--unmap', str(device_port)] |
| 229 (exit_code, output) = cmd_helper.GetCmdStatusAndOutput( |
| 230 [instance._host_forwarder_path] + redirection_command) |
| 231 if exit_code != 0: |
| 232 logging.error('%s exited with %d:\n%s' % ( |
| 233 instance._host_forwarder_path, exit_code, '\n'.join(output))) |
| 234 host_port = instance._device_to_host_port_map[serial_with_port] |
| 235 del instance._device_to_host_port_map[serial_with_port] |
| 236 del instance._host_to_device_port_map[host_port] |
| 237 |
| 238 @staticmethod |
| 239 def _GetPidForLock(): |
| 240 """Returns the PID used for host_forwarder initialization. |
| 241 |
| 242 The PID of the "sharder" is used to handle multiprocessing. The "sharder" |
| 243 is the initial process that forks that is the parent process. |
| 244 """ |
| 245 return os.getpgrp() |
| 246 |
| 247 def _InitHostLocked(self): |
| 248 """Initializes the host forwarder daemon. |
| 249 |
| 250 Note that the global lock must be acquired before calling this method. This |
| 251 method kills any existing host_forwarder process that could be stale. |
| 252 """ |
| 253 # See if the host_forwarder daemon was already initialized by a concurrent |
| 254 # process or thread (in case multi-process sharding is not used). |
| 255 pid_for_lock = Forwarder._GetPidForLock() |
| 256 fd = os.open(Forwarder._LOCK_PATH, os.O_RDWR | os.O_CREAT) |
| 257 with os.fdopen(fd, 'r+') as pid_file: |
| 258 pid_with_start_time = pid_file.readline() |
| 259 if pid_with_start_time: |
| 260 (pid, process_start_time) = pid_with_start_time.split(':') |
| 261 if pid == str(pid_for_lock): |
| 262 if process_start_time == str(_GetProcessStartTime(pid_for_lock)): |
| 263 return |
| 264 self._KillHostLocked() |
| 265 pid_file.seek(0) |
| 266 pid_file.write( |
| 267 '%s:%s' % (pid_for_lock, str(_GetProcessStartTime(pid_for_lock)))) |
| 268 pid_file.truncate() |
| 269 |
| 270 def _InitDeviceLocked(self, device, tool): |
| 271 """Initializes the device_forwarder daemon for a specific device (once). |
| 272 |
| 273 Note that the global lock must be acquired before calling this method. This |
| 274 method kills any existing device_forwarder daemon on the device that could |
| 275 be stale, pushes the latest version of the daemon (to the device) and starts |
| 276 it. |
| 277 |
| 278 Args: |
| 279 device: A DeviceUtils instance. |
| 280 tool: Tool class to use to get wrapper, if necessary, for executing the |
| 281 forwarder (see valgrind_tools.py). |
| 282 """ |
| 283 device_serial = str(device) |
| 284 if device_serial in self._initialized_devices: |
| 285 return |
| 286 Forwarder._KillDeviceLocked(device, tool) |
| 287 device.PushChangedFiles([( |
| 288 self._device_forwarder_path_on_host, |
| 289 Forwarder._DEVICE_FORWARDER_FOLDER)]) |
| 290 cmd = '%s %s' % (tool.GetUtilWrapper(), Forwarder._DEVICE_FORWARDER_PATH) |
| 291 device.RunShellCommand( |
| 292 cmd, env={'LD_LIBRARY_PATH': Forwarder._DEVICE_FORWARDER_FOLDER}, |
| 293 check_return=True) |
| 294 self._initialized_devices.add(device_serial) |
| 295 |
| 296 def _KillHostLocked(self): |
| 297 """Kills the forwarder process running on the host. |
| 298 |
| 299 Note that the global lock must be acquired before calling this method. |
| 300 """ |
| 301 logging.info('Killing host_forwarder.') |
| 302 (exit_code, output) = cmd_helper.GetCmdStatusAndOutput( |
| 303 [self._host_forwarder_path, '--kill-server']) |
| 304 if exit_code != 0: |
| 305 (exit_code, output) = cmd_helper.GetCmdStatusAndOutput( |
| 306 ['pkill', '-9', 'host_forwarder']) |
| 307 if exit_code != 0: |
| 308 raise Exception('%s exited with %d:\n%s' % ( |
| 309 self._host_forwarder_path, exit_code, '\n'.join(output))) |
| 310 |
| 311 @staticmethod |
| 312 def _KillDeviceLocked(device, tool): |
| 313 """Kills the forwarder process running on the device. |
| 314 |
| 315 Note that the global lock must be acquired before calling this method. |
| 316 |
| 317 Args: |
| 318 device: Instance of DeviceUtils for talking to the device. |
| 319 tool: Wrapper tool (e.g. valgrind) that can be used to execute the device |
| 320 forwarder (see valgrind_tools.py). |
| 321 """ |
| 322 logging.info('Killing device_forwarder.') |
| 323 Forwarder._instance._initialized_devices.discard(str(device)) |
| 324 if not device.FileExists(Forwarder._DEVICE_FORWARDER_PATH): |
| 325 return |
| 326 |
| 327 cmd = '%s %s --kill-server' % (tool.GetUtilWrapper(), |
| 328 Forwarder._DEVICE_FORWARDER_PATH) |
| 329 device.RunShellCommand( |
| 330 cmd, env={'LD_LIBRARY_PATH': Forwarder._DEVICE_FORWARDER_FOLDER}, |
| 331 check_return=True) |
OLD | NEW |