mirror of
https://github.com/klzgrad/naiveproxy.git
synced 2024-11-28 00:06:09 +03:00
562 lines
22 KiB
Python
562 lines
22 KiB
Python
|
#!/usr/bin/env python
|
||
|
#
|
||
|
# Copyright (c) 2013 The Chromium Authors. All rights reserved.
|
||
|
# Use of this source code is governed by a BSD-style license that can be
|
||
|
# found in the LICENSE file.
|
||
|
|
||
|
"""Provisions Android devices with settings required for bots.
|
||
|
|
||
|
Usage:
|
||
|
./provision_devices.py [-d <device serial number>]
|
||
|
"""
|
||
|
|
||
|
import argparse
|
||
|
import datetime
|
||
|
import json
|
||
|
import logging
|
||
|
import os
|
||
|
import posixpath
|
||
|
import re
|
||
|
import subprocess
|
||
|
import sys
|
||
|
import time
|
||
|
|
||
|
# Import _strptime before threaded code. datetime.datetime.strptime is
|
||
|
# threadsafe except for the initial import of the _strptime module.
|
||
|
# See crbug.com/584730 and https://bugs.python.org/issue7980.
|
||
|
import _strptime # pylint: disable=unused-import
|
||
|
|
||
|
import devil_chromium
|
||
|
from devil.android import battery_utils
|
||
|
from devil.android import device_blacklist
|
||
|
from devil.android import device_errors
|
||
|
from devil.android import device_temp_file
|
||
|
from devil.android import device_utils
|
||
|
from devil.android.sdk import keyevent
|
||
|
from devil.android.sdk import version_codes
|
||
|
from devil.constants import exit_codes
|
||
|
from devil.utils import run_tests_helper
|
||
|
from devil.utils import timeout_retry
|
||
|
from pylib import constants
|
||
|
from pylib import device_settings
|
||
|
from pylib.constants import host_paths
|
||
|
|
||
|
_SYSTEM_WEBVIEW_PATHS = ['/system/app/webview', '/system/app/WebViewGoogle']
|
||
|
_CHROME_PACKAGE_REGEX = re.compile('.*chrom.*')
|
||
|
_TOMBSTONE_REGEX = re.compile('tombstone.*')
|
||
|
|
||
|
|
||
|
class _DEFAULT_TIMEOUTS(object):
|
||
|
# L can take a while to reboot after a wipe.
|
||
|
LOLLIPOP = 600
|
||
|
PRE_LOLLIPOP = 180
|
||
|
|
||
|
HELP_TEXT = '{}s on L, {}s on pre-L'.format(LOLLIPOP, PRE_LOLLIPOP)
|
||
|
|
||
|
|
||
|
class _PHASES(object):
|
||
|
WIPE = 'wipe'
|
||
|
PROPERTIES = 'properties'
|
||
|
FINISH = 'finish'
|
||
|
|
||
|
ALL = [WIPE, PROPERTIES, FINISH]
|
||
|
|
||
|
|
||
|
def ProvisionDevices(args):
|
||
|
blacklist = (device_blacklist.Blacklist(args.blacklist_file)
|
||
|
if args.blacklist_file
|
||
|
else None)
|
||
|
devices = [d for d in device_utils.DeviceUtils.HealthyDevices(blacklist)
|
||
|
if not args.emulators or d.adb.is_emulator]
|
||
|
if args.device:
|
||
|
devices = [d for d in devices if d == args.device]
|
||
|
if not devices:
|
||
|
raise device_errors.DeviceUnreachableError(args.device)
|
||
|
parallel_devices = device_utils.DeviceUtils.parallel(devices)
|
||
|
if args.emulators:
|
||
|
parallel_devices.pMap(SetProperties, args)
|
||
|
else:
|
||
|
parallel_devices.pMap(ProvisionDevice, blacklist, args)
|
||
|
if args.auto_reconnect:
|
||
|
_LaunchHostHeartbeat()
|
||
|
blacklisted_devices = blacklist.Read() if blacklist else []
|
||
|
if args.output_device_blacklist:
|
||
|
with open(args.output_device_blacklist, 'w') as f:
|
||
|
json.dump(blacklisted_devices, f)
|
||
|
if all(d in blacklisted_devices for d in devices):
|
||
|
raise device_errors.NoDevicesError
|
||
|
return 0
|
||
|
|
||
|
|
||
|
def ProvisionDevice(device, blacklist, options):
|
||
|
def should_run_phase(phase_name):
|
||
|
return not options.phases or phase_name in options.phases
|
||
|
|
||
|
def run_phase(phase_func, reboot_timeout, reboot=True):
|
||
|
try:
|
||
|
device.WaitUntilFullyBooted(timeout=reboot_timeout, retries=0)
|
||
|
except device_errors.CommandTimeoutError:
|
||
|
logging.error('Device did not finish booting. Will try to reboot.')
|
||
|
device.Reboot(timeout=reboot_timeout)
|
||
|
phase_func(device, options)
|
||
|
if reboot:
|
||
|
device.Reboot(False, retries=0)
|
||
|
device.adb.WaitForDevice()
|
||
|
|
||
|
try:
|
||
|
if options.reboot_timeout:
|
||
|
reboot_timeout = options.reboot_timeout
|
||
|
elif device.build_version_sdk >= version_codes.LOLLIPOP:
|
||
|
reboot_timeout = _DEFAULT_TIMEOUTS.LOLLIPOP
|
||
|
else:
|
||
|
reboot_timeout = _DEFAULT_TIMEOUTS.PRE_LOLLIPOP
|
||
|
|
||
|
if should_run_phase(_PHASES.WIPE):
|
||
|
if (options.chrome_specific_wipe or device.IsUserBuild() or
|
||
|
device.build_version_sdk >= version_codes.MARSHMALLOW):
|
||
|
run_phase(WipeChromeData, reboot_timeout)
|
||
|
else:
|
||
|
run_phase(WipeDevice, reboot_timeout)
|
||
|
|
||
|
if should_run_phase(_PHASES.PROPERTIES):
|
||
|
run_phase(SetProperties, reboot_timeout)
|
||
|
|
||
|
if should_run_phase(_PHASES.FINISH):
|
||
|
run_phase(FinishProvisioning, reboot_timeout, reboot=False)
|
||
|
|
||
|
if options.chrome_specific_wipe:
|
||
|
package = "com.google.android.gms"
|
||
|
version_name = device.GetApplicationVersion(package)
|
||
|
logging.info("Version name for %s is %s", package, version_name)
|
||
|
|
||
|
CheckExternalStorage(device)
|
||
|
|
||
|
except device_errors.CommandTimeoutError:
|
||
|
logging.exception('Timed out waiting for device %s. Adding to blacklist.',
|
||
|
str(device))
|
||
|
if blacklist:
|
||
|
blacklist.Extend([str(device)], reason='provision_timeout')
|
||
|
|
||
|
except (device_errors.CommandFailedError,
|
||
|
device_errors.DeviceUnreachableError):
|
||
|
logging.exception('Failed to provision device %s. Adding to blacklist.',
|
||
|
str(device))
|
||
|
if blacklist:
|
||
|
blacklist.Extend([str(device)], reason='provision_failure')
|
||
|
|
||
|
def CheckExternalStorage(device):
|
||
|
"""Checks that storage is writable and if not makes it writable.
|
||
|
|
||
|
Arguments:
|
||
|
device: The device to check.
|
||
|
"""
|
||
|
try:
|
||
|
with device_temp_file.DeviceTempFile(
|
||
|
device.adb, suffix='.sh', dir=device.GetExternalStoragePath()) as f:
|
||
|
device.WriteFile(f.name, 'test')
|
||
|
except device_errors.CommandFailedError:
|
||
|
logging.info('External storage not writable. Remounting / as RW')
|
||
|
device.RunShellCommand(['mount', '-o', 'remount,rw', '/'],
|
||
|
check_return=True, as_root=True)
|
||
|
device.EnableRoot()
|
||
|
with device_temp_file.DeviceTempFile(
|
||
|
device.adb, suffix='.sh', dir=device.GetExternalStoragePath()) as f:
|
||
|
device.WriteFile(f.name, 'test')
|
||
|
|
||
|
def WipeChromeData(device, options):
|
||
|
"""Wipes chrome specific data from device
|
||
|
|
||
|
(1) uninstall any app whose name matches *chrom*, except
|
||
|
com.android.chrome, which is the chrome stable package. Doing so also
|
||
|
removes the corresponding dirs under /data/data/ and /data/app/
|
||
|
(2) remove any dir under /data/app-lib/ whose name matches *chrom*
|
||
|
(3) remove any files under /data/tombstones/ whose name matches "tombstone*"
|
||
|
(4) remove /data/local.prop if there is any
|
||
|
(5) remove /data/local/chrome-command-line if there is any
|
||
|
(6) remove anything under /data/local/.config/ if the dir exists
|
||
|
(this is telemetry related)
|
||
|
(7) remove anything under /data/local/tmp/
|
||
|
|
||
|
Arguments:
|
||
|
device: the device to wipe
|
||
|
"""
|
||
|
if options.skip_wipe:
|
||
|
return
|
||
|
|
||
|
try:
|
||
|
if device.IsUserBuild():
|
||
|
_UninstallIfMatch(device, _CHROME_PACKAGE_REGEX,
|
||
|
constants.PACKAGE_INFO['chrome_stable'].package)
|
||
|
device.RunShellCommand('rm -rf %s/*' % device.GetExternalStoragePath(),
|
||
|
check_return=True)
|
||
|
device.RunShellCommand('rm -rf /data/local/tmp/*', check_return=True)
|
||
|
else:
|
||
|
device.EnableRoot()
|
||
|
_UninstallIfMatch(device, _CHROME_PACKAGE_REGEX,
|
||
|
constants.PACKAGE_INFO['chrome_stable'].package)
|
||
|
_WipeUnderDirIfMatch(device, '/data/app-lib/', _CHROME_PACKAGE_REGEX)
|
||
|
_WipeUnderDirIfMatch(device, '/data/tombstones/', _TOMBSTONE_REGEX)
|
||
|
|
||
|
_WipeFileOrDir(device, '/data/local.prop')
|
||
|
_WipeFileOrDir(device, '/data/local/chrome-command-line')
|
||
|
_WipeFileOrDir(device, '/data/local/.config/')
|
||
|
_WipeFileOrDir(device, '/data/local/tmp/')
|
||
|
device.RunShellCommand('rm -rf %s/*' % device.GetExternalStoragePath(),
|
||
|
check_return=True)
|
||
|
except device_errors.CommandFailedError:
|
||
|
logging.exception('Possible failure while wiping the device. '
|
||
|
'Attempting to continue.')
|
||
|
|
||
|
|
||
|
def WipeDevice(device, options):
|
||
|
"""Wipes data from device, keeping only the adb_keys for authorization.
|
||
|
|
||
|
After wiping data on a device that has been authorized, adb can still
|
||
|
communicate with the device, but after reboot the device will need to be
|
||
|
re-authorized because the adb keys file is stored in /data/misc/adb/.
|
||
|
Thus, adb_keys file is rewritten so the device does not need to be
|
||
|
re-authorized.
|
||
|
|
||
|
Arguments:
|
||
|
device: the device to wipe
|
||
|
"""
|
||
|
if options.skip_wipe:
|
||
|
return
|
||
|
|
||
|
try:
|
||
|
device.EnableRoot()
|
||
|
device_authorized = device.FileExists(constants.ADB_KEYS_FILE)
|
||
|
if device_authorized:
|
||
|
adb_keys = device.ReadFile(constants.ADB_KEYS_FILE,
|
||
|
as_root=True).splitlines()
|
||
|
device.RunShellCommand(['wipe', 'data'],
|
||
|
as_root=True, check_return=True)
|
||
|
device.adb.WaitForDevice()
|
||
|
|
||
|
if device_authorized:
|
||
|
adb_keys_set = set(adb_keys)
|
||
|
for adb_key_file in options.adb_key_files or []:
|
||
|
try:
|
||
|
with open(adb_key_file, 'r') as f:
|
||
|
adb_public_keys = f.readlines()
|
||
|
adb_keys_set.update(adb_public_keys)
|
||
|
except IOError:
|
||
|
logging.warning('Unable to find adb keys file %s.', adb_key_file)
|
||
|
_WriteAdbKeysFile(device, '\n'.join(adb_keys_set))
|
||
|
except device_errors.CommandFailedError:
|
||
|
logging.exception('Possible failure while wiping the device. '
|
||
|
'Attempting to continue.')
|
||
|
|
||
|
|
||
|
def _WriteAdbKeysFile(device, adb_keys_string):
|
||
|
dir_path = posixpath.dirname(constants.ADB_KEYS_FILE)
|
||
|
device.RunShellCommand(['mkdir', '-p', dir_path],
|
||
|
as_root=True, check_return=True)
|
||
|
device.RunShellCommand(['restorecon', dir_path],
|
||
|
as_root=True, check_return=True)
|
||
|
device.WriteFile(constants.ADB_KEYS_FILE, adb_keys_string, as_root=True)
|
||
|
device.RunShellCommand(['restorecon', constants.ADB_KEYS_FILE],
|
||
|
as_root=True, check_return=True)
|
||
|
|
||
|
|
||
|
def SetProperties(device, options):
|
||
|
try:
|
||
|
device.EnableRoot()
|
||
|
except device_errors.CommandFailedError as e:
|
||
|
logging.warning(str(e))
|
||
|
|
||
|
if not device.IsUserBuild():
|
||
|
_ConfigureLocalProperties(device, options.enable_java_debug)
|
||
|
else:
|
||
|
logging.warning('Cannot configure properties in user builds.')
|
||
|
device_settings.ConfigureContentSettings(
|
||
|
device, device_settings.DETERMINISTIC_DEVICE_SETTINGS)
|
||
|
if options.disable_location:
|
||
|
device_settings.ConfigureContentSettings(
|
||
|
device, device_settings.DISABLE_LOCATION_SETTINGS)
|
||
|
else:
|
||
|
device_settings.ConfigureContentSettings(
|
||
|
device, device_settings.ENABLE_LOCATION_SETTINGS)
|
||
|
|
||
|
if options.disable_mock_location:
|
||
|
device_settings.ConfigureContentSettings(
|
||
|
device, device_settings.DISABLE_MOCK_LOCATION_SETTINGS)
|
||
|
else:
|
||
|
device_settings.ConfigureContentSettings(
|
||
|
device, device_settings.ENABLE_MOCK_LOCATION_SETTINGS)
|
||
|
|
||
|
device_settings.SetLockScreenSettings(device)
|
||
|
if options.disable_network:
|
||
|
device_settings.ConfigureContentSettings(
|
||
|
device, device_settings.NETWORK_DISABLED_SETTINGS)
|
||
|
if device.build_version_sdk >= version_codes.MARSHMALLOW:
|
||
|
# Ensure that NFC is also switched off.
|
||
|
device.RunShellCommand(['svc', 'nfc', 'disable'],
|
||
|
as_root=True, check_return=True)
|
||
|
|
||
|
if options.disable_system_chrome:
|
||
|
# The system chrome version on the device interferes with some tests.
|
||
|
device.RunShellCommand(['pm', 'disable', 'com.android.chrome'],
|
||
|
check_return=True)
|
||
|
|
||
|
if options.remove_system_webview:
|
||
|
if any(device.PathExists(p) for p in _SYSTEM_WEBVIEW_PATHS):
|
||
|
logging.info('System WebView exists and needs to be removed')
|
||
|
if device.HasRoot():
|
||
|
# Disabled Marshmallow's Verity security feature
|
||
|
if device.build_version_sdk >= version_codes.MARSHMALLOW:
|
||
|
device.adb.DisableVerity()
|
||
|
device.Reboot()
|
||
|
device.WaitUntilFullyBooted()
|
||
|
device.EnableRoot()
|
||
|
|
||
|
# This is required, e.g., to replace the system webview on a device.
|
||
|
device.adb.Remount()
|
||
|
device.RunShellCommand(['stop'], check_return=True)
|
||
|
device.RunShellCommand(['rm', '-rf'] + _SYSTEM_WEBVIEW_PATHS,
|
||
|
check_return=True)
|
||
|
device.RunShellCommand(['start'], check_return=True)
|
||
|
else:
|
||
|
logging.warning('Cannot remove system webview from a non-rooted device')
|
||
|
else:
|
||
|
logging.info('System WebView already removed')
|
||
|
|
||
|
# Some device types can momentarily disappear after setting properties.
|
||
|
device.adb.WaitForDevice()
|
||
|
|
||
|
|
||
|
def _ConfigureLocalProperties(device, java_debug=True):
|
||
|
"""Set standard readonly testing device properties prior to reboot."""
|
||
|
local_props = [
|
||
|
'persist.sys.usb.config=adb',
|
||
|
'ro.monkey=1',
|
||
|
'ro.test_harness=1',
|
||
|
'ro.audio.silent=1',
|
||
|
'ro.setupwizard.mode=DISABLED',
|
||
|
]
|
||
|
if java_debug:
|
||
|
local_props.append(
|
||
|
'%s=all' % device_utils.DeviceUtils.JAVA_ASSERT_PROPERTY)
|
||
|
local_props.append('debug.checkjni=1')
|
||
|
try:
|
||
|
device.WriteFile(
|
||
|
device.LOCAL_PROPERTIES_PATH,
|
||
|
'\n'.join(local_props), as_root=True)
|
||
|
# Android will not respect the local props file if it is world writable.
|
||
|
device.RunShellCommand(
|
||
|
['chmod', '644', device.LOCAL_PROPERTIES_PATH],
|
||
|
as_root=True, check_return=True)
|
||
|
except device_errors.CommandFailedError:
|
||
|
logging.exception('Failed to configure local properties.')
|
||
|
|
||
|
|
||
|
def FinishProvisioning(device, options):
|
||
|
# The lockscreen can't be disabled on user builds, so send a keyevent
|
||
|
# to unlock it.
|
||
|
if device.IsUserBuild():
|
||
|
device.SendKeyEvent(keyevent.KEYCODE_MENU)
|
||
|
|
||
|
if options.min_battery_level is not None:
|
||
|
battery = battery_utils.BatteryUtils(device)
|
||
|
try:
|
||
|
battery.ChargeDeviceToLevel(options.min_battery_level)
|
||
|
except device_errors.DeviceChargingError:
|
||
|
device.Reboot()
|
||
|
battery.ChargeDeviceToLevel(options.min_battery_level)
|
||
|
|
||
|
if options.max_battery_temp is not None:
|
||
|
try:
|
||
|
battery = battery_utils.BatteryUtils(device)
|
||
|
battery.LetBatteryCoolToTemperature(options.max_battery_temp)
|
||
|
except device_errors.CommandFailedError:
|
||
|
logging.exception('Unable to let battery cool to specified temperature.')
|
||
|
|
||
|
def _set_and_verify_date():
|
||
|
if device.build_version_sdk >= version_codes.MARSHMALLOW:
|
||
|
date_format = '%m%d%H%M%Y.%S'
|
||
|
set_date_command = ['date', '-u']
|
||
|
get_date_command = ['date', '-u']
|
||
|
else:
|
||
|
date_format = '%Y%m%d.%H%M%S'
|
||
|
set_date_command = ['date', '-s']
|
||
|
get_date_command = ['date']
|
||
|
|
||
|
# TODO(jbudorick): This is wrong on pre-M devices -- get/set are
|
||
|
# dealing in local time, but we're setting based on GMT.
|
||
|
strgmtime = time.strftime(date_format, time.gmtime())
|
||
|
set_date_command.append(strgmtime)
|
||
|
device.RunShellCommand(set_date_command, as_root=True, check_return=True)
|
||
|
|
||
|
get_date_command.append('+"%Y%m%d.%H%M%S"')
|
||
|
device_time = device.RunShellCommand(
|
||
|
get_date_command, as_root=True, single_line=True).replace('"', '')
|
||
|
device_time = datetime.datetime.strptime(device_time, "%Y%m%d.%H%M%S")
|
||
|
correct_time = datetime.datetime.strptime(strgmtime, date_format)
|
||
|
tdelta = (correct_time - device_time).seconds
|
||
|
if tdelta <= 1:
|
||
|
logging.info('Date/time successfully set on %s', device)
|
||
|
return True
|
||
|
else:
|
||
|
logging.error('Date mismatch. Device: %s Correct: %s',
|
||
|
device_time.isoformat(), correct_time.isoformat())
|
||
|
return False
|
||
|
|
||
|
# Sometimes the date is not set correctly on the devices. Retry on failure.
|
||
|
if device.IsUserBuild():
|
||
|
# TODO(bpastene): Figure out how to set the date & time on user builds.
|
||
|
pass
|
||
|
else:
|
||
|
if not timeout_retry.WaitFor(
|
||
|
_set_and_verify_date, wait_period=1, max_tries=2):
|
||
|
raise device_errors.CommandFailedError(
|
||
|
'Failed to set date & time.', device_serial=str(device))
|
||
|
|
||
|
props = device.RunShellCommand('getprop', check_return=True)
|
||
|
for prop in props:
|
||
|
logging.info(' %s', prop)
|
||
|
if options.auto_reconnect:
|
||
|
_PushAndLaunchAdbReboot(device, options.target)
|
||
|
|
||
|
|
||
|
def _UninstallIfMatch(device, pattern, app_to_keep):
|
||
|
installed_packages = device.RunShellCommand(['pm', 'list', 'packages'])
|
||
|
installed_system_packages = [
|
||
|
pkg.split(':')[1] for pkg in device.RunShellCommand(['pm', 'list',
|
||
|
'packages', '-s'])]
|
||
|
for package_output in installed_packages:
|
||
|
package = package_output.split(":")[1]
|
||
|
if pattern.match(package) and not package == app_to_keep:
|
||
|
if not device.IsUserBuild() or package not in installed_system_packages:
|
||
|
device.Uninstall(package)
|
||
|
|
||
|
|
||
|
def _WipeUnderDirIfMatch(device, path, pattern):
|
||
|
for filename in device.ListDirectory(path):
|
||
|
if pattern.match(filename):
|
||
|
_WipeFileOrDir(device, posixpath.join(path, filename))
|
||
|
|
||
|
|
||
|
def _WipeFileOrDir(device, path):
|
||
|
if device.PathExists(path):
|
||
|
device.RunShellCommand(['rm', '-rf', path], check_return=True)
|
||
|
|
||
|
|
||
|
def _PushAndLaunchAdbReboot(device, target):
|
||
|
"""Pushes and launches the adb_reboot binary on the device.
|
||
|
|
||
|
Arguments:
|
||
|
device: The DeviceUtils instance for the device to which the adb_reboot
|
||
|
binary should be pushed.
|
||
|
target: The build target (example, Debug or Release) which helps in
|
||
|
locating the adb_reboot binary.
|
||
|
"""
|
||
|
logging.info('Will push and launch adb_reboot on %s', str(device))
|
||
|
# Kill if adb_reboot is already running.
|
||
|
device.KillAll('adb_reboot', blocking=True, timeout=2, quiet=True)
|
||
|
# Push adb_reboot
|
||
|
logging.info(' Pushing adb_reboot ...')
|
||
|
adb_reboot = os.path.join(host_paths.DIR_SOURCE_ROOT,
|
||
|
'out/%s/adb_reboot' % target)
|
||
|
device.PushChangedFiles([(adb_reboot, '/data/local/tmp/')])
|
||
|
# Launch adb_reboot
|
||
|
logging.info(' Launching adb_reboot ...')
|
||
|
device.RunShellCommand(
|
||
|
['/data/local/tmp/adb_reboot'],
|
||
|
check_return=True)
|
||
|
|
||
|
|
||
|
def _LaunchHostHeartbeat():
|
||
|
# Kill if existing host_heartbeat
|
||
|
KillHostHeartbeat()
|
||
|
# Launch a new host_heartbeat
|
||
|
logging.info('Spawning host heartbeat...')
|
||
|
subprocess.Popen([os.path.join(host_paths.DIR_SOURCE_ROOT,
|
||
|
'build/android/host_heartbeat.py')])
|
||
|
|
||
|
def KillHostHeartbeat():
|
||
|
ps = subprocess.Popen(['ps', 'aux'], stdout=subprocess.PIPE)
|
||
|
stdout, _ = ps.communicate()
|
||
|
matches = re.findall('\\n.*host_heartbeat.*', stdout)
|
||
|
for match in matches:
|
||
|
logging.info('An instance of host heart beart running... will kill')
|
||
|
pid = re.findall(r'(\S+)', match)[1]
|
||
|
subprocess.call(['kill', str(pid)])
|
||
|
|
||
|
def main():
|
||
|
# Recommended options on perf bots:
|
||
|
# --disable-network
|
||
|
# TODO(tonyg): We eventually want network on. However, currently radios
|
||
|
# can cause perfbots to drain faster than they charge.
|
||
|
# --min-battery-level 95
|
||
|
# Some perf bots run benchmarks with USB charging disabled which leads
|
||
|
# to gradual draining of the battery. We must wait for a full charge
|
||
|
# before starting a run in order to keep the devices online.
|
||
|
|
||
|
parser = argparse.ArgumentParser(
|
||
|
description='Provision Android devices with settings required for bots.')
|
||
|
parser.add_argument('-d', '--device', metavar='SERIAL',
|
||
|
help='the serial number of the device to be provisioned'
|
||
|
' (the default is to provision all devices attached)')
|
||
|
parser.add_argument('--adb-path',
|
||
|
help='Absolute path to the adb binary to use.')
|
||
|
parser.add_argument('--blacklist-file', help='Device blacklist JSON file.')
|
||
|
parser.add_argument('--phase', action='append', choices=_PHASES.ALL,
|
||
|
dest='phases',
|
||
|
help='Phases of provisioning to run. '
|
||
|
'(If omitted, all phases will be run.)')
|
||
|
parser.add_argument('--skip-wipe', action='store_true', default=False,
|
||
|
help="don't wipe device data during provisioning")
|
||
|
parser.add_argument('--reboot-timeout', metavar='SECS', type=int,
|
||
|
help='when wiping the device, max number of seconds to'
|
||
|
' wait after each reboot '
|
||
|
'(default: %s)' % _DEFAULT_TIMEOUTS.HELP_TEXT)
|
||
|
parser.add_argument('--min-battery-level', type=int, metavar='NUM',
|
||
|
help='wait for the device to reach this minimum battery'
|
||
|
' level before trying to continue')
|
||
|
parser.add_argument('--disable-location', action='store_true',
|
||
|
help='disable Google location services on devices')
|
||
|
parser.add_argument('--disable-mock-location', action='store_true',
|
||
|
default=False, help='Set ALLOW_MOCK_LOCATION to false')
|
||
|
parser.add_argument('--disable-network', action='store_true',
|
||
|
help='disable network access on devices')
|
||
|
parser.add_argument('--disable-java-debug', action='store_false',
|
||
|
dest='enable_java_debug', default=True,
|
||
|
help='disable Java property asserts and JNI checking')
|
||
|
parser.add_argument('--disable-system-chrome', action='store_true',
|
||
|
help='Disable the system chrome from devices.')
|
||
|
parser.add_argument('--remove-system-webview', action='store_true',
|
||
|
help='Remove the system webview from devices.')
|
||
|
parser.add_argument('-t', '--target', default='Debug',
|
||
|
help='the build target (default: %(default)s)')
|
||
|
parser.add_argument('-r', '--auto-reconnect', action='store_true',
|
||
|
help='push binary which will reboot the device on adb'
|
||
|
' disconnections')
|
||
|
parser.add_argument('--adb-key-files', type=str, nargs='+',
|
||
|
help='list of adb keys to push to device')
|
||
|
parser.add_argument('-v', '--verbose', action='count', default=1,
|
||
|
help='Log more information.')
|
||
|
parser.add_argument('--max-battery-temp', type=int, metavar='NUM',
|
||
|
help='Wait for the battery to have this temp or lower.')
|
||
|
parser.add_argument('--output-device-blacklist',
|
||
|
help='Json file to output the device blacklist.')
|
||
|
parser.add_argument('--chrome-specific-wipe', action='store_true',
|
||
|
help='only wipe chrome specific data during provisioning')
|
||
|
parser.add_argument('--emulators', action='store_true',
|
||
|
help='provision only emulators and ignore usb devices')
|
||
|
args = parser.parse_args()
|
||
|
constants.SetBuildType(args.target)
|
||
|
|
||
|
run_tests_helper.SetLogLevel(args.verbose)
|
||
|
|
||
|
devil_chromium.Initialize(adb_path=args.adb_path)
|
||
|
|
||
|
try:
|
||
|
return ProvisionDevices(args)
|
||
|
except (device_errors.DeviceUnreachableError, device_errors.NoDevicesError):
|
||
|
logging.exception('Unable to provision local devices.')
|
||
|
return exit_codes.INFRA
|
||
|
|
||
|
|
||
|
if __name__ == '__main__':
|
||
|
sys.exit(main())
|