| #!/usr/bin/env python |
| # |
| # Copyright (c) 2013 The Chromium Authors. All rights reserved. |
| # Use of this source code is governed by a BSD-style license that can be |
| # found in the LICENSE file. |
| |
| """Provisions Android devices with settings required for bots. |
| |
| Usage: |
| ./provision_devices.py [-d <device serial number>] |
| """ |
| |
| import argparse |
| import datetime |
| import json |
| import logging |
| import os |
| import posixpath |
| import re |
| import subprocess |
| import sys |
| import time |
| |
| # Import _strptime before threaded code. datetime.datetime.strptime is |
| # threadsafe except for the initial import of the _strptime module. |
| # See crbug.com/584730 and https://bugs.python.org/issue7980. |
| import _strptime # pylint: disable=unused-import |
| |
| import devil_chromium |
| from devil.android import battery_utils |
| from devil.android import device_blacklist |
| from devil.android import device_errors |
| from devil.android import device_temp_file |
| from devil.android import device_utils |
| from devil.android.sdk import keyevent |
| from devil.android.sdk import version_codes |
| from devil.constants import exit_codes |
| from devil.utils import run_tests_helper |
| from devil.utils import timeout_retry |
| from pylib import constants |
| from pylib import device_settings |
| from pylib.constants import host_paths |
| |
| _SYSTEM_WEBVIEW_PATHS = ['/system/app/webview', '/system/app/WebViewGoogle'] |
| _CHROME_PACKAGE_REGEX = re.compile('.*chrom.*') |
| _TOMBSTONE_REGEX = re.compile('tombstone.*') |
| |
| |
| class _DEFAULT_TIMEOUTS(object): |
| # L can take a while to reboot after a wipe. |
| LOLLIPOP = 600 |
| PRE_LOLLIPOP = 180 |
| |
| HELP_TEXT = '{}s on L, {}s on pre-L'.format(LOLLIPOP, PRE_LOLLIPOP) |
| |
| |
| class _PHASES(object): |
| WIPE = 'wipe' |
| PROPERTIES = 'properties' |
| FINISH = 'finish' |
| |
| ALL = [WIPE, PROPERTIES, FINISH] |
| |
| |
| def ProvisionDevices(args): |
| blacklist = (device_blacklist.Blacklist(args.blacklist_file) |
| if args.blacklist_file |
| else None) |
| devices = [d for d in device_utils.DeviceUtils.HealthyDevices(blacklist) |
| if not args.emulators or d.adb.is_emulator] |
| if args.device: |
| devices = [d for d in devices if d == args.device] |
| if not devices: |
| raise device_errors.DeviceUnreachableError(args.device) |
| parallel_devices = device_utils.DeviceUtils.parallel(devices) |
| if args.emulators: |
| parallel_devices.pMap(SetProperties, args) |
| else: |
| parallel_devices.pMap(ProvisionDevice, blacklist, args) |
| if args.auto_reconnect: |
| _LaunchHostHeartbeat() |
| blacklisted_devices = blacklist.Read() if blacklist else [] |
| if args.output_device_blacklist: |
| with open(args.output_device_blacklist, 'w') as f: |
| json.dump(blacklisted_devices, f) |
| if all(d in blacklisted_devices for d in devices): |
| raise device_errors.NoDevicesError |
| return 0 |
| |
| |
| def ProvisionDevice(device, blacklist, options): |
| def should_run_phase(phase_name): |
| return not options.phases or phase_name in options.phases |
| |
| def run_phase(phase_func, reboot_timeout, reboot=True): |
| try: |
| device.WaitUntilFullyBooted(timeout=reboot_timeout, retries=0) |
| except device_errors.CommandTimeoutError: |
| logging.error('Device did not finish booting. Will try to reboot.') |
| device.Reboot(timeout=reboot_timeout) |
| phase_func(device, options) |
| if reboot: |
| device.Reboot(False, retries=0) |
| device.adb.WaitForDevice() |
| |
| try: |
| if options.reboot_timeout: |
| reboot_timeout = options.reboot_timeout |
| elif device.build_version_sdk >= version_codes.LOLLIPOP: |
| reboot_timeout = _DEFAULT_TIMEOUTS.LOLLIPOP |
| else: |
| reboot_timeout = _DEFAULT_TIMEOUTS.PRE_LOLLIPOP |
| |
| if should_run_phase(_PHASES.WIPE): |
| if (options.chrome_specific_wipe or device.IsUserBuild() or |
| device.build_version_sdk >= version_codes.MARSHMALLOW): |
| run_phase(WipeChromeData, reboot_timeout) |
| else: |
| run_phase(WipeDevice, reboot_timeout) |
| |
| if should_run_phase(_PHASES.PROPERTIES): |
| run_phase(SetProperties, reboot_timeout) |
| |
| if should_run_phase(_PHASES.FINISH): |
| run_phase(FinishProvisioning, reboot_timeout, reboot=False) |
| |
| if options.chrome_specific_wipe: |
| package = "com.google.android.gms" |
| version_name = device.GetApplicationVersion(package) |
| logging.info("Version name for %s is %s", package, version_name) |
| |
| CheckExternalStorage(device) |
| |
| except device_errors.CommandTimeoutError: |
| logging.exception('Timed out waiting for device %s. Adding to blacklist.', |
| str(device)) |
| if blacklist: |
| blacklist.Extend([str(device)], reason='provision_timeout') |
| |
| except (device_errors.CommandFailedError, |
| device_errors.DeviceUnreachableError): |
| logging.exception('Failed to provision device %s. Adding to blacklist.', |
| str(device)) |
| if blacklist: |
| blacklist.Extend([str(device)], reason='provision_failure') |
| |
| def CheckExternalStorage(device): |
| """Checks that storage is writable and if not makes it writable. |
| |
| Arguments: |
| device: The device to check. |
| """ |
| try: |
| with device_temp_file.DeviceTempFile( |
| device.adb, suffix='.sh', dir=device.GetExternalStoragePath()) as f: |
| device.WriteFile(f.name, 'test') |
| except device_errors.CommandFailedError: |
| logging.info('External storage not writable. Remounting / as RW') |
| device.RunShellCommand(['mount', '-o', 'remount,rw', '/'], |
| check_return=True, as_root=True) |
| device.EnableRoot() |
| with device_temp_file.DeviceTempFile( |
| device.adb, suffix='.sh', dir=device.GetExternalStoragePath()) as f: |
| device.WriteFile(f.name, 'test') |
| |
| def WipeChromeData(device, options): |
| """Wipes chrome specific data from device |
| |
| (1) uninstall any app whose name matches *chrom*, except |
| com.android.chrome, which is the chrome stable package. Doing so also |
| removes the corresponding dirs under /data/data/ and /data/app/ |
| (2) remove any dir under /data/app-lib/ whose name matches *chrom* |
| (3) remove any files under /data/tombstones/ whose name matches "tombstone*" |
| (4) remove /data/local.prop if there is any |
| (5) remove /data/local/chrome-command-line if there is any |
| (6) remove anything under /data/local/.config/ if the dir exists |
| (this is telemetry related) |
| (7) remove anything under /data/local/tmp/ |
| |
| Arguments: |
| device: the device to wipe |
| """ |
| if options.skip_wipe: |
| return |
| |
| try: |
| if device.IsUserBuild(): |
| _UninstallIfMatch(device, _CHROME_PACKAGE_REGEX, |
| constants.PACKAGE_INFO['chrome_stable'].package) |
| device.RunShellCommand('rm -rf %s/*' % device.GetExternalStoragePath(), |
| check_return=True) |
| device.RunShellCommand('rm -rf /data/local/tmp/*', check_return=True) |
| else: |
| device.EnableRoot() |
| _UninstallIfMatch(device, _CHROME_PACKAGE_REGEX, |
| constants.PACKAGE_INFO['chrome_stable'].package) |
| _WipeUnderDirIfMatch(device, '/data/app-lib/', _CHROME_PACKAGE_REGEX) |
| _WipeUnderDirIfMatch(device, '/data/tombstones/', _TOMBSTONE_REGEX) |
| |
| _WipeFileOrDir(device, '/data/local.prop') |
| _WipeFileOrDir(device, '/data/local/chrome-command-line') |
| _WipeFileOrDir(device, '/data/local/.config/') |
| _WipeFileOrDir(device, '/data/local/tmp/') |
| device.RunShellCommand('rm -rf %s/*' % device.GetExternalStoragePath(), |
| check_return=True) |
| except device_errors.CommandFailedError: |
| logging.exception('Possible failure while wiping the device. ' |
| 'Attempting to continue.') |
| |
| |
| def WipeDevice(device, options): |
| """Wipes data from device, keeping only the adb_keys for authorization. |
| |
| After wiping data on a device that has been authorized, adb can still |
| communicate with the device, but after reboot the device will need to be |
| re-authorized because the adb keys file is stored in /data/misc/adb/. |
| Thus, adb_keys file is rewritten so the device does not need to be |
| re-authorized. |
| |
| Arguments: |
| device: the device to wipe |
| """ |
| if options.skip_wipe: |
| return |
| |
| try: |
| device.EnableRoot() |
| device_authorized = device.FileExists(constants.ADB_KEYS_FILE) |
| if device_authorized: |
| adb_keys = device.ReadFile(constants.ADB_KEYS_FILE, |
| as_root=True).splitlines() |
| device.RunShellCommand(['wipe', 'data'], |
| as_root=True, check_return=True) |
| device.adb.WaitForDevice() |
| |
| if device_authorized: |
| adb_keys_set = set(adb_keys) |
| for adb_key_file in options.adb_key_files or []: |
| try: |
| with open(adb_key_file, 'r') as f: |
| adb_public_keys = f.readlines() |
| adb_keys_set.update(adb_public_keys) |
| except IOError: |
| logging.warning('Unable to find adb keys file %s.', adb_key_file) |
| _WriteAdbKeysFile(device, '\n'.join(adb_keys_set)) |
| except device_errors.CommandFailedError: |
| logging.exception('Possible failure while wiping the device. ' |
| 'Attempting to continue.') |
| |
| |
| def _WriteAdbKeysFile(device, adb_keys_string): |
| dir_path = posixpath.dirname(constants.ADB_KEYS_FILE) |
| device.RunShellCommand(['mkdir', '-p', dir_path], |
| as_root=True, check_return=True) |
| device.RunShellCommand(['restorecon', dir_path], |
| as_root=True, check_return=True) |
| device.WriteFile(constants.ADB_KEYS_FILE, adb_keys_string, as_root=True) |
| device.RunShellCommand(['restorecon', constants.ADB_KEYS_FILE], |
| as_root=True, check_return=True) |
| |
| |
| def SetProperties(device, options): |
| try: |
| device.EnableRoot() |
| except device_errors.CommandFailedError as e: |
| logging.warning(str(e)) |
| |
| if not device.IsUserBuild(): |
| _ConfigureLocalProperties(device, options.enable_java_debug) |
| else: |
| logging.warning('Cannot configure properties in user builds.') |
| device_settings.ConfigureContentSettings( |
| device, device_settings.DETERMINISTIC_DEVICE_SETTINGS) |
| if options.disable_location: |
| device_settings.ConfigureContentSettings( |
| device, device_settings.DISABLE_LOCATION_SETTINGS) |
| else: |
| device_settings.ConfigureContentSettings( |
| device, device_settings.ENABLE_LOCATION_SETTINGS) |
| |
| if options.disable_mock_location: |
| device_settings.ConfigureContentSettings( |
| device, device_settings.DISABLE_MOCK_LOCATION_SETTINGS) |
| else: |
| device_settings.ConfigureContentSettings( |
| device, device_settings.ENABLE_MOCK_LOCATION_SETTINGS) |
| |
| device_settings.SetLockScreenSettings(device) |
| if options.disable_network: |
| device_settings.ConfigureContentSettings( |
| device, device_settings.NETWORK_DISABLED_SETTINGS) |
| if device.build_version_sdk >= version_codes.MARSHMALLOW: |
| # Ensure that NFC is also switched off. |
| device.RunShellCommand(['svc', 'nfc', 'disable'], |
| as_root=True, check_return=True) |
| |
| if options.disable_system_chrome: |
| # The system chrome version on the device interferes with some tests. |
| device.RunShellCommand(['pm', 'disable', 'com.android.chrome'], |
| check_return=True) |
| |
| if options.remove_system_webview: |
| if any(device.PathExists(p) for p in _SYSTEM_WEBVIEW_PATHS): |
| logging.info('System WebView exists and needs to be removed') |
| if device.HasRoot(): |
| # Disabled Marshmallow's Verity security feature |
| if device.build_version_sdk >= version_codes.MARSHMALLOW: |
| device.adb.DisableVerity() |
| device.Reboot() |
| device.WaitUntilFullyBooted() |
| device.EnableRoot() |
| |
| # This is required, e.g., to replace the system webview on a device. |
| device.adb.Remount() |
| device.RunShellCommand(['stop'], check_return=True) |
| device.RunShellCommand(['rm', '-rf'] + _SYSTEM_WEBVIEW_PATHS, |
| check_return=True) |
| device.RunShellCommand(['start'], check_return=True) |
| else: |
| logging.warning('Cannot remove system webview from a non-rooted device') |
| else: |
| logging.info('System WebView already removed') |
| |
| # Some device types can momentarily disappear after setting properties. |
| device.adb.WaitForDevice() |
| |
| |
| def _ConfigureLocalProperties(device, java_debug=True): |
| """Set standard readonly testing device properties prior to reboot.""" |
| local_props = [ |
| 'persist.sys.usb.config=adb', |
| 'ro.monkey=1', |
| 'ro.test_harness=1', |
| 'ro.audio.silent=1', |
| 'ro.setupwizard.mode=DISABLED', |
| ] |
| if java_debug: |
| local_props.append( |
| '%s=all' % device_utils.DeviceUtils.JAVA_ASSERT_PROPERTY) |
| local_props.append('debug.checkjni=1') |
| try: |
| device.WriteFile( |
| device.LOCAL_PROPERTIES_PATH, |
| '\n'.join(local_props), as_root=True) |
| # Android will not respect the local props file if it is world writable. |
| device.RunShellCommand( |
| ['chmod', '644', device.LOCAL_PROPERTIES_PATH], |
| as_root=True, check_return=True) |
| except device_errors.CommandFailedError: |
| logging.exception('Failed to configure local properties.') |
| |
| |
| def FinishProvisioning(device, options): |
| # The lockscreen can't be disabled on user builds, so send a keyevent |
| # to unlock it. |
| if device.IsUserBuild(): |
| device.SendKeyEvent(keyevent.KEYCODE_MENU) |
| |
| if options.min_battery_level is not None: |
| battery = battery_utils.BatteryUtils(device) |
| try: |
| battery.ChargeDeviceToLevel(options.min_battery_level) |
| except device_errors.DeviceChargingError: |
| device.Reboot() |
| battery.ChargeDeviceToLevel(options.min_battery_level) |
| |
| if options.max_battery_temp is not None: |
| try: |
| battery = battery_utils.BatteryUtils(device) |
| battery.LetBatteryCoolToTemperature(options.max_battery_temp) |
| except device_errors.CommandFailedError: |
| logging.exception('Unable to let battery cool to specified temperature.') |
| |
| def _set_and_verify_date(): |
| if device.build_version_sdk >= version_codes.MARSHMALLOW: |
| date_format = '%m%d%H%M%Y.%S' |
| set_date_command = ['date', '-u'] |
| get_date_command = ['date', '-u'] |
| else: |
| date_format = '%Y%m%d.%H%M%S' |
| set_date_command = ['date', '-s'] |
| get_date_command = ['date'] |
| |
| # TODO(jbudorick): This is wrong on pre-M devices -- get/set are |
| # dealing in local time, but we're setting based on GMT. |
| strgmtime = time.strftime(date_format, time.gmtime()) |
| set_date_command.append(strgmtime) |
| device.RunShellCommand(set_date_command, as_root=True, check_return=True) |
| |
| get_date_command.append('+"%Y%m%d.%H%M%S"') |
| device_time = device.RunShellCommand( |
| get_date_command, as_root=True, single_line=True).replace('"', '') |
| device_time = datetime.datetime.strptime(device_time, "%Y%m%d.%H%M%S") |
| correct_time = datetime.datetime.strptime(strgmtime, date_format) |
| tdelta = (correct_time - device_time).seconds |
| if tdelta <= 1: |
| logging.info('Date/time successfully set on %s', device) |
| return True |
| else: |
| logging.error('Date mismatch. Device: %s Correct: %s', |
| device_time.isoformat(), correct_time.isoformat()) |
| return False |
| |
| # Sometimes the date is not set correctly on the devices. Retry on failure. |
| if device.IsUserBuild(): |
| # TODO(bpastene): Figure out how to set the date & time on user builds. |
| pass |
| else: |
| if not timeout_retry.WaitFor( |
| _set_and_verify_date, wait_period=1, max_tries=2): |
| raise device_errors.CommandFailedError( |
| 'Failed to set date & time.', device_serial=str(device)) |
| |
| props = device.RunShellCommand('getprop', check_return=True) |
| for prop in props: |
| logging.info(' %s', prop) |
| if options.auto_reconnect: |
| _PushAndLaunchAdbReboot(device, options.target) |
| |
| |
| def _UninstallIfMatch(device, pattern, app_to_keep): |
| installed_packages = device.RunShellCommand(['pm', 'list', 'packages']) |
| installed_system_packages = [ |
| pkg.split(':')[1] for pkg in device.RunShellCommand(['pm', 'list', |
| 'packages', '-s'])] |
| for package_output in installed_packages: |
| package = package_output.split(":")[1] |
| if pattern.match(package) and not package == app_to_keep: |
| if not device.IsUserBuild() or package not in installed_system_packages: |
| device.Uninstall(package) |
| |
| |
| def _WipeUnderDirIfMatch(device, path, pattern): |
| for filename in device.ListDirectory(path): |
| if pattern.match(filename): |
| _WipeFileOrDir(device, posixpath.join(path, filename)) |
| |
| |
| def _WipeFileOrDir(device, path): |
| if device.PathExists(path): |
| device.RunShellCommand(['rm', '-rf', path], check_return=True) |
| |
| |
| def _PushAndLaunchAdbReboot(device, target): |
| """Pushes and launches the adb_reboot binary on the device. |
| |
| Arguments: |
| device: The DeviceUtils instance for the device to which the adb_reboot |
| binary should be pushed. |
| target: The build target (example, Debug or Release) which helps in |
| locating the adb_reboot binary. |
| """ |
| logging.info('Will push and launch adb_reboot on %s', str(device)) |
| # Kill if adb_reboot is already running. |
| device.KillAll('adb_reboot', blocking=True, timeout=2, quiet=True) |
| # Push adb_reboot |
| logging.info(' Pushing adb_reboot ...') |
| adb_reboot = os.path.join(host_paths.DIR_SOURCE_ROOT, |
| 'out/%s/adb_reboot' % target) |
| device.PushChangedFiles([(adb_reboot, '/data/local/tmp/')]) |
| # Launch adb_reboot |
| logging.info(' Launching adb_reboot ...') |
| device.RunShellCommand( |
| ['/data/local/tmp/adb_reboot'], |
| check_return=True) |
| |
| |
| def _LaunchHostHeartbeat(): |
| # Kill if existing host_heartbeat |
| KillHostHeartbeat() |
| # Launch a new host_heartbeat |
| logging.info('Spawning host heartbeat...') |
| subprocess.Popen([os.path.join(host_paths.DIR_SOURCE_ROOT, |
| 'build/android/host_heartbeat.py')]) |
| |
| def KillHostHeartbeat(): |
| ps = subprocess.Popen(['ps', 'aux'], stdout=subprocess.PIPE) |
| stdout, _ = ps.communicate() |
| matches = re.findall('\\n.*host_heartbeat.*', stdout) |
| for match in matches: |
| logging.info('An instance of host heart beart running... will kill') |
| pid = re.findall(r'(\S+)', match)[1] |
| subprocess.call(['kill', str(pid)]) |
| |
| def main(): |
| # Recommended options on perf bots: |
| # --disable-network |
| # TODO(tonyg): We eventually want network on. However, currently radios |
| # can cause perfbots to drain faster than they charge. |
| # --min-battery-level 95 |
| # Some perf bots run benchmarks with USB charging disabled which leads |
| # to gradual draining of the battery. We must wait for a full charge |
| # before starting a run in order to keep the devices online. |
| |
| parser = argparse.ArgumentParser( |
| description='Provision Android devices with settings required for bots.') |
| parser.add_argument('-d', '--device', metavar='SERIAL', |
| help='the serial number of the device to be provisioned' |
| ' (the default is to provision all devices attached)') |
| parser.add_argument('--adb-path', |
| help='Absolute path to the adb binary to use.') |
| parser.add_argument('--blacklist-file', help='Device blacklist JSON file.') |
| parser.add_argument('--phase', action='append', choices=_PHASES.ALL, |
| dest='phases', |
| help='Phases of provisioning to run. ' |
| '(If omitted, all phases will be run.)') |
| parser.add_argument('--skip-wipe', action='store_true', default=False, |
| help="don't wipe device data during provisioning") |
| parser.add_argument('--reboot-timeout', metavar='SECS', type=int, |
| help='when wiping the device, max number of seconds to' |
| ' wait after each reboot ' |
| '(default: %s)' % _DEFAULT_TIMEOUTS.HELP_TEXT) |
| parser.add_argument('--min-battery-level', type=int, metavar='NUM', |
| help='wait for the device to reach this minimum battery' |
| ' level before trying to continue') |
| parser.add_argument('--disable-location', action='store_true', |
| help='disable Google location services on devices') |
| parser.add_argument('--disable-mock-location', action='store_true', |
| default=False, help='Set ALLOW_MOCK_LOCATION to false') |
| parser.add_argument('--disable-network', action='store_true', |
| help='disable network access on devices') |
| parser.add_argument('--disable-java-debug', action='store_false', |
| dest='enable_java_debug', default=True, |
| help='disable Java property asserts and JNI checking') |
| parser.add_argument('--disable-system-chrome', action='store_true', |
| help='Disable the system chrome from devices.') |
| parser.add_argument('--remove-system-webview', action='store_true', |
| help='Remove the system webview from devices.') |
| parser.add_argument('-t', '--target', default='Debug', |
| help='the build target (default: %(default)s)') |
| parser.add_argument('-r', '--auto-reconnect', action='store_true', |
| help='push binary which will reboot the device on adb' |
| ' disconnections') |
| parser.add_argument('--adb-key-files', type=str, nargs='+', |
| help='list of adb keys to push to device') |
| parser.add_argument('-v', '--verbose', action='count', default=1, |
| help='Log more information.') |
| parser.add_argument('--max-battery-temp', type=int, metavar='NUM', |
| help='Wait for the battery to have this temp or lower.') |
| parser.add_argument('--output-device-blacklist', |
| help='Json file to output the device blacklist.') |
| parser.add_argument('--chrome-specific-wipe', action='store_true', |
| help='only wipe chrome specific data during provisioning') |
| parser.add_argument('--emulators', action='store_true', |
| help='provision only emulators and ignore usb devices') |
| args = parser.parse_args() |
| constants.SetBuildType(args.target) |
| |
| run_tests_helper.SetLogLevel(args.verbose) |
| |
| devil_chromium.Initialize(adb_path=args.adb_path) |
| |
| try: |
| return ProvisionDevices(args) |
| except (device_errors.DeviceUnreachableError, device_errors.NoDevicesError): |
| logging.exception('Unable to provision local devices.') |
| return exit_codes.INFRA |
| |
| |
| if __name__ == '__main__': |
| sys.exit(main()) |