| #!/usr/bin/env vpython3 | 
 | # | 
 | # Copyright 2013 The Chromium Authors | 
 | # Use of this source code is governed by a BSD-style license that can be | 
 | # found in the LICENSE file. | 
 |  | 
 | """Provisions Android devices with settings required for bots. | 
 |  | 
 | Usage: | 
 |   ./provision_devices.py [-d <device serial number>] | 
 | """ | 
 |  | 
 | import argparse | 
 | import datetime | 
 | import json | 
 | import logging | 
 | import os | 
 | import posixpath | 
 | import re | 
 | import subprocess | 
 | import sys | 
 | import time | 
 |  | 
 | # Import _strptime before threaded code. datetime.datetime.strptime is | 
 | # threadsafe except for the initial import of the _strptime module. | 
 | # See crbug.com/584730 and https://bugs.python.org/issue7980. | 
 | import _strptime  # pylint: disable=unused-import | 
 |  | 
 | import devil_chromium | 
 | from devil.android import battery_utils | 
 | from devil.android import device_denylist | 
 | from devil.android import device_errors | 
 | from devil.android import device_temp_file | 
 | from devil.android import device_utils | 
 | from devil.android.sdk import keyevent | 
 | from devil.android.sdk import version_codes | 
 | from devil.constants import exit_codes | 
 | from devil.utils import run_tests_helper | 
 | from devil.utils import timeout_retry | 
 | from pylib import constants | 
 | from pylib import device_settings | 
 | from pylib.constants import host_paths | 
 |  | 
 | _SYSTEM_WEBVIEW_PATHS = ['/system/app/webview', '/system/app/WebViewGoogle'] | 
 | _CHROME_PACKAGE_REGEX = re.compile('.*chrom.*') | 
 | _TOMBSTONE_REGEX = re.compile('tombstone.*') | 
 |  | 
 |  | 
 | class _DEFAULT_TIMEOUTS: | 
 |   # L can take a while to reboot after a wipe. | 
 |   LOLLIPOP = 600 | 
 |   PRE_LOLLIPOP = 180 | 
 |  | 
 |   HELP_TEXT = '{}s on L, {}s on pre-L'.format(LOLLIPOP, PRE_LOLLIPOP) | 
 |  | 
 |  | 
 | class _PHASES: | 
 |   WIPE = 'wipe' | 
 |   PROPERTIES = 'properties' | 
 |   FINISH = 'finish' | 
 |  | 
 |   ALL = [WIPE, PROPERTIES, FINISH] | 
 |  | 
 |  | 
 | def ProvisionDevices(args): | 
 |   denylist = (device_denylist.Denylist(args.denylist_file) | 
 |               if args.denylist_file else None) | 
 |   devices = [ | 
 |       d for d in device_utils.DeviceUtils.HealthyDevices(denylist) | 
 |       if not args.emulators or d.is_emulator | 
 |   ] | 
 |   if args.device: | 
 |     devices = [d for d in devices if d == args.device] | 
 |   if not devices: | 
 |     raise device_errors.DeviceUnreachableError(args.device) | 
 |   parallel_devices = device_utils.DeviceUtils.parallel(devices) | 
 |   if args.emulators: | 
 |     parallel_devices.pMap(SetProperties, args) | 
 |   else: | 
 |     parallel_devices.pMap(ProvisionDevice, denylist, args) | 
 |   if args.auto_reconnect: | 
 |     _LaunchHostHeartbeat() | 
 |   denylisted_devices = denylist.Read() if denylist else [] | 
 |   if args.output_device_denylist: | 
 |     with open(args.output_device_denylist, 'w') as f: | 
 |       json.dump(denylisted_devices, f) | 
 |   if all(d in denylisted_devices for d in devices): | 
 |     raise device_errors.NoDevicesError | 
 |   return 0 | 
 |  | 
 |  | 
 | def ProvisionDevice(device, denylist, options): | 
 |   def should_run_phase(phase_name): | 
 |     return not options.phases or phase_name in options.phases | 
 |  | 
 |   def run_phase(phase_func, reboot_timeout, reboot=True): | 
 |     try: | 
 |       device.WaitUntilFullyBooted(timeout=reboot_timeout, retries=0) | 
 |     except device_errors.CommandTimeoutError: | 
 |       logging.error('Device did not finish booting. Will try to reboot.') | 
 |       device.Reboot(timeout=reboot_timeout) | 
 |     phase_func(device, options) | 
 |     if reboot: | 
 |       device.Reboot(False, retries=0) | 
 |       device.adb.WaitForDevice() | 
 |  | 
 |   try: | 
 |     if options.reboot_timeout: | 
 |       reboot_timeout = options.reboot_timeout | 
 |     elif device.build_version_sdk >= version_codes.LOLLIPOP: | 
 |       reboot_timeout = _DEFAULT_TIMEOUTS.LOLLIPOP | 
 |     else: | 
 |       reboot_timeout = _DEFAULT_TIMEOUTS.PRE_LOLLIPOP | 
 |  | 
 |     if should_run_phase(_PHASES.WIPE): | 
 |       if (options.chrome_specific_wipe or device.IsUserBuild() or | 
 |           device.build_version_sdk >= version_codes.MARSHMALLOW): | 
 |         run_phase(WipeChromeData, reboot_timeout) | 
 |       else: | 
 |         run_phase(WipeDevice, reboot_timeout) | 
 |  | 
 |     if should_run_phase(_PHASES.PROPERTIES): | 
 |       run_phase(SetProperties, reboot_timeout) | 
 |  | 
 |     if should_run_phase(_PHASES.FINISH): | 
 |       run_phase(FinishProvisioning, reboot_timeout, reboot=False) | 
 |  | 
 |     if options.chrome_specific_wipe: | 
 |       package = "com.google.android.gms" | 
 |       version_name = device.GetApplicationVersion(package) | 
 |       logging.info("Version name for %s is %s", package, version_name) | 
 |  | 
 |     CheckExternalStorage(device) | 
 |  | 
 |   except device_errors.CommandTimeoutError: | 
 |     logging.exception('Timed out waiting for device %s. Adding to denylist.', | 
 |                       str(device)) | 
 |     if denylist: | 
 |       denylist.Extend([str(device)], reason='provision_timeout') | 
 |  | 
 |   except (device_errors.CommandFailedError, | 
 |           device_errors.DeviceUnreachableError): | 
 |     logging.exception('Failed to provision device %s. Adding to denylist.', | 
 |                       str(device)) | 
 |     if denylist: | 
 |       denylist.Extend([str(device)], reason='provision_failure') | 
 |  | 
 |  | 
 | def CheckExternalStorage(device): | 
 |   """Checks that storage is writable and if not makes it writable. | 
 |  | 
 |   Arguments: | 
 |     device: The device to check. | 
 |   """ | 
 |   try: | 
 |     with device_temp_file.DeviceTempFile( | 
 |         device.adb, suffix='.sh', dir=device.GetExternalStoragePath()) as f: | 
 |       device.WriteFile(f.name, 'test') | 
 |   except device_errors.CommandFailedError: | 
 |     logging.info('External storage not writable. Remounting / as RW') | 
 |     device.RunShellCommand(['mount', '-o', 'remount,rw', '/'], | 
 |                            check_return=True, as_root=True) | 
 |     device.EnableRoot() | 
 |     with device_temp_file.DeviceTempFile( | 
 |         device.adb, suffix='.sh', dir=device.GetExternalStoragePath()) as f: | 
 |       device.WriteFile(f.name, 'test') | 
 |  | 
 | def WipeChromeData(device, options): | 
 |   """Wipes chrome specific data from device | 
 |  | 
 |   (1) uninstall any app whose name matches *chrom*, except | 
 |       com.android.chrome, which is the chrome stable package. Doing so also | 
 |       removes the corresponding dirs under /data/data/ and /data/app/ | 
 |   (2) remove any dir under /data/app-lib/ whose name matches *chrom* | 
 |   (3) remove any files under /data/tombstones/ whose name matches "tombstone*" | 
 |   (4) remove /data/local.prop if there is any | 
 |   (5) remove /data/local/chrome-command-line if there is any | 
 |   (6) remove anything under /data/local/.config/ if the dir exists | 
 |       (this is telemetry related) | 
 |   (7) remove anything under /data/local/tmp/ | 
 |  | 
 |   Arguments: | 
 |     device: the device to wipe | 
 |   """ | 
 |   if options.skip_wipe: | 
 |     return | 
 |  | 
 |   try: | 
 |     if device.IsUserBuild(): | 
 |       _UninstallIfMatch(device, _CHROME_PACKAGE_REGEX, | 
 |                         constants.PACKAGE_INFO['chrome_stable'].package) | 
 |       device.RunShellCommand('rm -rf %s/*' % device.GetExternalStoragePath(), | 
 |                              check_return=True) | 
 |       device.RunShellCommand('rm -rf /data/local/tmp/*', check_return=True) | 
 |     else: | 
 |       device.EnableRoot() | 
 |       _UninstallIfMatch(device, _CHROME_PACKAGE_REGEX, | 
 |                         constants.PACKAGE_INFO['chrome_stable'].package) | 
 |       _WipeUnderDirIfMatch(device, '/data/app-lib/', _CHROME_PACKAGE_REGEX) | 
 |       _WipeUnderDirIfMatch(device, '/data/tombstones/', _TOMBSTONE_REGEX) | 
 |  | 
 |       _WipeFileOrDir(device, '/data/local.prop') | 
 |       _WipeFileOrDir(device, '/data/local/chrome-command-line') | 
 |       _WipeFileOrDir(device, '/data/local/.config/') | 
 |       _WipeFileOrDir(device, '/data/local/tmp/') | 
 |       device.RunShellCommand('rm -rf %s/*' % device.GetExternalStoragePath(), | 
 |                              check_return=True) | 
 |   except device_errors.CommandFailedError: | 
 |     logging.exception('Possible failure while wiping the device. ' | 
 |                       'Attempting to continue.') | 
 |  | 
 |  | 
 | def WipeDevice(device, options): | 
 |   """Wipes data from device, keeping only the adb_keys for authorization. | 
 |  | 
 |   After wiping data on a device that has been authorized, adb can still | 
 |   communicate with the device, but after reboot the device will need to be | 
 |   re-authorized because the adb keys file is stored in /data/misc/adb/. | 
 |   Thus, adb_keys file is rewritten so the device does not need to be | 
 |   re-authorized. | 
 |  | 
 |   Arguments: | 
 |     device: the device to wipe | 
 |   """ | 
 |   if options.skip_wipe: | 
 |     return | 
 |  | 
 |   try: | 
 |     device.EnableRoot() | 
 |     device_authorized = device.FileExists(constants.ADB_KEYS_FILE) | 
 |     if device_authorized: | 
 |       adb_keys = device.ReadFile(constants.ADB_KEYS_FILE, | 
 |                                  as_root=True).splitlines() | 
 |     device.RunShellCommand(['wipe', 'data'], | 
 |                            as_root=True, check_return=True) | 
 |     device.adb.WaitForDevice() | 
 |  | 
 |     if device_authorized: | 
 |       adb_keys_set = set(adb_keys) | 
 |       for adb_key_file in options.adb_key_files or []: | 
 |         try: | 
 |           with open(adb_key_file, 'r') as f: | 
 |             adb_public_keys = f.readlines() | 
 |           adb_keys_set.update(adb_public_keys) | 
 |         except IOError: | 
 |           logging.warning('Unable to find adb keys file %s.', adb_key_file) | 
 |       _WriteAdbKeysFile(device, '\n'.join(adb_keys_set)) | 
 |   except device_errors.CommandFailedError: | 
 |     logging.exception('Possible failure while wiping the device. ' | 
 |                       'Attempting to continue.') | 
 |  | 
 |  | 
 | def _WriteAdbKeysFile(device, adb_keys_string): | 
 |   dir_path = posixpath.dirname(constants.ADB_KEYS_FILE) | 
 |   device.RunShellCommand(['mkdir', '-p', dir_path], | 
 |                          as_root=True, check_return=True) | 
 |   device.RunShellCommand(['restorecon', dir_path], | 
 |                          as_root=True, check_return=True) | 
 |   device.WriteFile(constants.ADB_KEYS_FILE, adb_keys_string, as_root=True) | 
 |   device.RunShellCommand(['restorecon', constants.ADB_KEYS_FILE], | 
 |                          as_root=True, check_return=True) | 
 |  | 
 |  | 
 | def SetProperties(device, options): | 
 |   try: | 
 |     device.EnableRoot() | 
 |   except device_errors.CommandFailedError as e: | 
 |     logging.warning(str(e)) | 
 |  | 
 |   if not device.IsUserBuild(): | 
 |     _ConfigureLocalProperties(device, options.enable_java_debug) | 
 |   else: | 
 |     logging.warning('Cannot configure properties in user builds.') | 
 |   device_settings.ConfigureContentSettings( | 
 |       device, device_settings.DETERMINISTIC_DEVICE_SETTINGS) | 
 |   if options.disable_location: | 
 |     device_settings.ConfigureContentSettings( | 
 |         device, device_settings.DISABLE_LOCATION_SETTINGS) | 
 |   else: | 
 |     device_settings.ConfigureContentSettings( | 
 |         device, device_settings.ENABLE_LOCATION_SETTINGS) | 
 |  | 
 |   if options.disable_mock_location: | 
 |     device_settings.ConfigureContentSettings( | 
 |         device, device_settings.DISABLE_MOCK_LOCATION_SETTINGS) | 
 |   else: | 
 |     device_settings.ConfigureContentSettings( | 
 |         device, device_settings.ENABLE_MOCK_LOCATION_SETTINGS) | 
 |  | 
 |   device_settings.SetLockScreenSettings(device) | 
 |   if options.disable_network: | 
 |     device_settings.ConfigureContentSettings( | 
 |         device, device_settings.NETWORK_DISABLED_SETTINGS) | 
 |     if device.build_version_sdk >= version_codes.MARSHMALLOW: | 
 |       # Ensure that NFC is also switched off. | 
 |       device.RunShellCommand(['svc', 'nfc', 'disable'], | 
 |                              as_root=True, check_return=True) | 
 |  | 
 |   if options.disable_system_chrome: | 
 |     # The system chrome version on the device interferes with some tests. | 
 |     device.RunShellCommand(['pm', 'disable', 'com.android.chrome'], | 
 |                            check_return=True) | 
 |  | 
 |   if options.remove_system_webview: | 
 |     if any(device.PathExists(p) for p in _SYSTEM_WEBVIEW_PATHS): | 
 |       logging.info('System WebView exists and needs to be removed') | 
 |       if device.HasRoot(): | 
 |         # Disabled Marshmallow's Verity security feature | 
 |         if device.build_version_sdk >= version_codes.MARSHMALLOW: | 
 |           device.adb.DisableVerity() | 
 |           device.Reboot() | 
 |           device.WaitUntilFullyBooted() | 
 |           device.EnableRoot() | 
 |  | 
 |         # This is required, e.g., to replace the system webview on a device. | 
 |         device.adb.Remount() | 
 |         device.RunShellCommand(['stop'], check_return=True) | 
 |         device.RunShellCommand(['rm', '-rf'] + _SYSTEM_WEBVIEW_PATHS, | 
 |                                check_return=True) | 
 |         device.RunShellCommand(['start'], check_return=True) | 
 |       else: | 
 |         logging.warning('Cannot remove system webview from a non-rooted device') | 
 |     else: | 
 |       logging.info('System WebView already removed') | 
 |  | 
 |   # Some device types can momentarily disappear after setting properties. | 
 |   device.adb.WaitForDevice() | 
 |  | 
 |  | 
 | def _ConfigureLocalProperties(device, java_debug=True): | 
 |   """Set standard readonly testing device properties prior to reboot.""" | 
 |   local_props = [ | 
 |       'persist.sys.usb.config=adb', | 
 |       'ro.monkey=1', | 
 |       'ro.test_harness=1', | 
 |       'ro.audio.silent=1', | 
 |       'ro.setupwizard.mode=DISABLED', | 
 |       ] | 
 |   if java_debug: | 
 |     local_props.append( | 
 |         '%s=all' % device_utils.DeviceUtils.JAVA_ASSERT_PROPERTY) | 
 |     local_props.append('debug.checkjni=1') | 
 |   try: | 
 |     device.WriteFile( | 
 |         device.LOCAL_PROPERTIES_PATH, | 
 |         '\n'.join(local_props), as_root=True) | 
 |     # Android will not respect the local props file if it is world writable. | 
 |     device.RunShellCommand( | 
 |         ['chmod', '644', device.LOCAL_PROPERTIES_PATH], | 
 |         as_root=True, check_return=True) | 
 |   except device_errors.CommandFailedError: | 
 |     logging.exception('Failed to configure local properties.') | 
 |  | 
 |  | 
 | def FinishProvisioning(device, options): | 
 |   # The lockscreen can't be disabled on user builds, so send a keyevent | 
 |   # to unlock it. | 
 |   if device.IsUserBuild(): | 
 |     device.SendKeyEvent(keyevent.KEYCODE_MENU) | 
 |  | 
 |   if options.min_battery_level is not None: | 
 |     battery = battery_utils.BatteryUtils(device) | 
 |     try: | 
 |       battery.ChargeDeviceToLevel(options.min_battery_level) | 
 |     except device_errors.DeviceChargingError: | 
 |       device.Reboot() | 
 |       battery.ChargeDeviceToLevel(options.min_battery_level) | 
 |  | 
 |   if options.max_battery_temp is not None: | 
 |     try: | 
 |       battery = battery_utils.BatteryUtils(device) | 
 |       battery.LetBatteryCoolToTemperature(options.max_battery_temp) | 
 |     except device_errors.CommandFailedError: | 
 |       logging.exception('Unable to let battery cool to specified temperature.') | 
 |  | 
 |   def _set_and_verify_date(): | 
 |     if device.build_version_sdk >= version_codes.MARSHMALLOW: | 
 |       date_format = '%m%d%H%M%Y.%S' | 
 |       set_date_command = ['date', '-u'] | 
 |       get_date_command = ['date', '-u'] | 
 |     else: | 
 |       date_format = '%Y%m%d.%H%M%S' | 
 |       set_date_command = ['date', '-s'] | 
 |       get_date_command = ['date'] | 
 |  | 
 |     # TODO(jbudorick): This is wrong on pre-M devices -- get/set are | 
 |     # dealing in local time, but we're setting based on GMT. | 
 |     strgmtime = time.strftime(date_format, time.gmtime()) | 
 |     set_date_command.append(strgmtime) | 
 |     device.RunShellCommand(set_date_command, as_root=True, check_return=True) | 
 |  | 
 |     get_date_command.append('+"%Y%m%d.%H%M%S"') | 
 |     device_time = device.RunShellCommand( | 
 |         get_date_command, as_root=True, single_line=True).replace('"', '') | 
 |     device_time = datetime.datetime.strptime(device_time, "%Y%m%d.%H%M%S") | 
 |     correct_time = datetime.datetime.strptime(strgmtime, date_format) | 
 |     tdelta = abs(correct_time - device_time).seconds | 
 |     if tdelta <= 1: | 
 |       logging.info('Date/time successfully set on %s', device) | 
 |       return True | 
 |     logging.error('Date mismatch. Device: %s Correct: %s', | 
 |                   device_time.isoformat(), correct_time.isoformat()) | 
 |     return False | 
 |  | 
 |   # Sometimes the date is not set correctly on the devices. Retry on failure. | 
 |   if device.IsUserBuild(): | 
 |     # TODO(bpastene): Figure out how to set the date & time on user builds. | 
 |     pass | 
 |   else: | 
 |     if not timeout_retry.WaitFor( | 
 |         _set_and_verify_date, wait_period=1, max_tries=2): | 
 |       raise device_errors.CommandFailedError( | 
 |           'Failed to set date & time.', device_serial=str(device)) | 
 |  | 
 |   props = device.RunShellCommand('getprop', check_return=True) | 
 |   for prop in props: | 
 |     logging.info('  %s', prop) | 
 |   if options.auto_reconnect: | 
 |     _PushAndLaunchAdbReboot(device, options.target) | 
 |  | 
 |  | 
 | def _UninstallIfMatch(device, pattern, app_to_keep): | 
 |   installed_packages = device.RunShellCommand(['pm', 'list', 'packages']) | 
 |   installed_system_packages = [ | 
 |       pkg.split(':')[1] for pkg in device.RunShellCommand(['pm', 'list', | 
 |                                                            'packages', '-s'])] | 
 |   for package_output in installed_packages: | 
 |     package = package_output.split(":")[1] | 
 |     if pattern.match(package) and not package == app_to_keep: | 
 |       if not device.IsUserBuild() or package not in installed_system_packages: | 
 |         device.Uninstall(package) | 
 |  | 
 |  | 
 | def _WipeUnderDirIfMatch(device, path, pattern): | 
 |   for filename in device.ListDirectory(path): | 
 |     if pattern.match(filename): | 
 |       _WipeFileOrDir(device, posixpath.join(path, filename)) | 
 |  | 
 |  | 
 | def _WipeFileOrDir(device, path): | 
 |   if device.PathExists(path): | 
 |     device.RunShellCommand(['rm', '-rf', path], check_return=True) | 
 |  | 
 |  | 
 | def _PushAndLaunchAdbReboot(device, target): | 
 |   """Pushes and launches the adb_reboot binary on the device. | 
 |  | 
 |   Arguments: | 
 |     device: The DeviceUtils instance for the device to which the adb_reboot | 
 |             binary should be pushed. | 
 |     target: The build target (example, Debug or Release) which helps in | 
 |             locating the adb_reboot binary. | 
 |   """ | 
 |   logging.info('Will push and launch adb_reboot on %s', str(device)) | 
 |   # Kill if adb_reboot is already running. | 
 |   device.KillAll('adb_reboot', blocking=True, timeout=2, quiet=True) | 
 |   # Push adb_reboot | 
 |   logging.info('  Pushing adb_reboot ...') | 
 |   adb_reboot = os.path.join(host_paths.DIR_SOURCE_ROOT, | 
 |                             'out/%s/adb_reboot' % target) | 
 |   device.PushChangedFiles([(adb_reboot, '/data/local/tmp/')]) | 
 |   # Launch adb_reboot | 
 |   logging.info('  Launching adb_reboot ...') | 
 |   device.RunShellCommand( | 
 |       ['/data/local/tmp/adb_reboot'], | 
 |       check_return=True) | 
 |  | 
 |  | 
 | def _LaunchHostHeartbeat(): | 
 |   # Kill if existing host_heartbeat | 
 |   KillHostHeartbeat() | 
 |   # Launch a new host_heartbeat | 
 |   logging.info('Spawning host heartbeat...') | 
 |   subprocess.Popen([os.path.join(host_paths.DIR_SOURCE_ROOT, | 
 |                                  'build/android/host_heartbeat.py')]) | 
 |  | 
 | def KillHostHeartbeat(): | 
 |   ps = subprocess.Popen(['ps', 'aux'], stdout=subprocess.PIPE) | 
 |   stdout, _ = ps.communicate() | 
 |   matches = re.findall('\\n.*host_heartbeat.*', stdout) | 
 |   for match in matches: | 
 |     logging.info('An instance of host heart beart running... will kill') | 
 |     pid = re.findall(r'(\S+)', match)[1] | 
 |     subprocess.call(['kill', str(pid)]) | 
 |  | 
 | def main(): | 
 |   # Recommended options on perf bots: | 
 |   # --disable-network | 
 |   #     TODO(tonyg): We eventually want network on. However, currently radios | 
 |   #     can cause perfbots to drain faster than they charge. | 
 |   # --min-battery-level 95 | 
 |   #     Some perf bots run benchmarks with USB charging disabled which leads | 
 |   #     to gradual draining of the battery. We must wait for a full charge | 
 |   #     before starting a run in order to keep the devices online. | 
 |  | 
 |   parser = argparse.ArgumentParser( | 
 |       description='Provision Android devices with settings required for bots.') | 
 |   parser.add_argument('-d', '--device', metavar='SERIAL', | 
 |                       help='the serial number of the device to be provisioned' | 
 |                       ' (the default is to provision all devices attached)') | 
 |   parser.add_argument('--adb-path', | 
 |                       help='Absolute path to the adb binary to use.') | 
 |   parser.add_argument('--denylist-file', help='Device denylist JSON file.') | 
 |   parser.add_argument('--phase', action='append', choices=_PHASES.ALL, | 
 |                       dest='phases', | 
 |                       help='Phases of provisioning to run. ' | 
 |                            '(If omitted, all phases will be run.)') | 
 |   parser.add_argument('--skip-wipe', action='store_true', default=False, | 
 |                       help="don't wipe device data during provisioning") | 
 |   parser.add_argument('--reboot-timeout', metavar='SECS', type=int, | 
 |                       help='when wiping the device, max number of seconds to' | 
 |                       ' wait after each reboot ' | 
 |                       '(default: %s)' % _DEFAULT_TIMEOUTS.HELP_TEXT) | 
 |   parser.add_argument('--min-battery-level', type=int, metavar='NUM', | 
 |                       help='wait for the device to reach this minimum battery' | 
 |                       ' level before trying to continue') | 
 |   parser.add_argument('--disable-location', action='store_true', | 
 |                       help='disable Google location services on devices') | 
 |   parser.add_argument('--disable-mock-location', action='store_true', | 
 |                       default=False, help='Set ALLOW_MOCK_LOCATION to false') | 
 |   parser.add_argument('--disable-network', action='store_true', | 
 |                       help='disable network access on devices') | 
 |   parser.add_argument('--disable-java-debug', action='store_false', | 
 |                       dest='enable_java_debug', default=True, | 
 |                       help='disable Java property asserts and JNI checking') | 
 |   parser.add_argument('--disable-system-chrome', action='store_true', | 
 |                       help='Disable the system chrome from devices.') | 
 |   parser.add_argument('--remove-system-webview', action='store_true', | 
 |                       help='Remove the system webview from devices.') | 
 |   parser.add_argument('-t', '--target', default='Debug', | 
 |                       help='the build target (default: %(default)s)') | 
 |   parser.add_argument('-r', '--auto-reconnect', action='store_true', | 
 |                       help='push binary which will reboot the device on adb' | 
 |                       ' disconnections') | 
 |   parser.add_argument('--adb-key-files', type=str, nargs='+', | 
 |                       help='list of adb keys to push to device') | 
 |   parser.add_argument('-v', '--verbose', action='count', default=1, | 
 |                       help='Log more information.') | 
 |   parser.add_argument('--max-battery-temp', type=int, metavar='NUM', | 
 |                       help='Wait for the battery to have this temp or lower.') | 
 |   parser.add_argument('--output-device-denylist', | 
 |                       help='Json file to output the device denylist.') | 
 |   parser.add_argument('--chrome-specific-wipe', action='store_true', | 
 |                       help='only wipe chrome specific data during provisioning') | 
 |   parser.add_argument('--emulators', action='store_true', | 
 |                       help='provision only emulators and ignore usb devices') | 
 |   args = parser.parse_args() | 
 |   constants.SetBuildType(args.target) | 
 |  | 
 |   run_tests_helper.SetLogLevel(args.verbose) | 
 |  | 
 |   devil_chromium.Initialize(adb_path=args.adb_path) | 
 |  | 
 |   try: | 
 |     return ProvisionDevices(args) | 
 |   except (device_errors.DeviceUnreachableError, device_errors.NoDevicesError): | 
 |     logging.exception('Unable to provision local devices.') | 
 |     return exit_codes.INFRA | 
 |  | 
 |  | 
 | if __name__ == '__main__': | 
 |   sys.exit(main()) |