Index: build/android/stacktrace/java_deobfuscate.py |
diff --git a/build/android/stacktrace/java_deobfuscate.py b/build/android/stacktrace/java_deobfuscate.py |
new file mode 100755 |
index 0000000000000000000000000000000000000000..a468ec30556f733ec2be8625c8a2b0bf9a73e1a9 |
--- /dev/null |
+++ b/build/android/stacktrace/java_deobfuscate.py |
@@ -0,0 +1,60 @@ |
+#!/usr/bin/env python |
+# Copyright 2016 The Chromium Authors. All rights reserved. |
+# Use of this source code is governed by a BSD-style license that can be |
+# found in the LICENSE file. |
+ |
+"""A tool to deobfuscate Java stack traces. |
+ |
+Utility wrapper around ReTrace to deobfuscate stack traces that have been |
+mangled by ProGuard. Takes stack traces from stdin (eg. adb logcat | |
+java_deobfuscate.py proguard.mapping) and files. |
+""" |
+ |
+# Can just run: |
+# java -jar third_party/proguard/lib/retrace.jar -regex \ |
+# "(?:.*?\bat\s+%c\.%m\s*\(%s(?::%l)?\)\s*)|(?:(?:.*?[:\"]\s+)?%c(?::.*)?)" \ |
+# ~/mapping |
+# in terminal to achieve same effect as this tool. |
+ |
+import argparse |
+import os |
+import subprocess |
+import sys |
+ |
+_THIRD_PARTY_DIR = os.path.abspath(os.path.join(os.path.dirname(__file__), |
+ os.pardir, os.pardir, os.pardir, |
+ 'third_party')) |
+sys.path.append(os.path.join(_THIRD_PARTY_DIR, 'catapult', 'devil')) |
+from devil.utils import cmd_helper |
+ |
+ |
+# This regex is taken from |
+# http://proguard.sourceforge.net/manual/retrace/usage.html. |
+_LINE_PARSE_REGEX = ( |
+ r'(?:.*?\bat\s+%c\.%m\s*\(%s(?::%l)?\)\s*)|(?:(?:.*?[:"]\s+)?%c(?::.*)?)') |
+ |
+ |
+def main(): |
+ parser = argparse.ArgumentParser(description=(__doc__)) |
+ parser.add_argument( |
+ 'mapping_file', |
+ help='ProGuard mapping file from build which the stacktrace is from.') |
+ parser.add_argument( |
+ '--stacktrace', |
+ help='Stacktrace file to be deobfuscated.') |
+ args = parser.parse_args() |
+ |
+ retrace_path = os.path.join(_THIRD_PARTY_DIR, 'proguard', |
+ 'lib', 'retrace.jar') |
+ |
+ base_args = ['java', '-jar', retrace_path, '-regex', _LINE_PARSE_REGEX, |
+ args.mapping_file] |
+ if args.stacktrace: |
+ subprocess.call(base_args + [args.stacktrace]) |
+ else: |
+ for line in cmd_helper.IterCmdOutputLines(base_args): |
+ print line |
+ |
+ |
+if __name__ == '__main__': |
+ main() |