2012-05-21 15:12:37 +04:00
|
|
|
# This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
# License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
|
|
# file, You can obtain one at http://mozilla.org/MPL/2.0/.
|
2010-06-24 13:32:01 +04:00
|
|
|
|
2015-07-09 21:30:01 +03:00
|
|
|
import datetime
|
2014-08-11 21:55:28 +04:00
|
|
|
import glob
|
2010-06-24 13:32:01 +04:00
|
|
|
import time
|
2012-11-02 22:57:50 +04:00
|
|
|
import re
|
2010-06-24 13:32:01 +04:00
|
|
|
import os
|
2016-01-25 17:55:57 +03:00
|
|
|
import posixpath
|
2011-10-06 18:51:03 +04:00
|
|
|
import tempfile
|
|
|
|
import shutil
|
2014-08-11 21:55:28 +04:00
|
|
|
import sys
|
2010-06-24 13:32:01 +04:00
|
|
|
|
|
|
|
from automation import Automation
|
2018-07-27 18:27:16 +03:00
|
|
|
from mozdevice import ADBTimeoutError
|
2015-07-16 17:38:40 +03:00
|
|
|
from mozlog import get_default_logger
|
2018-08-18 20:47:12 +03:00
|
|
|
from mozscreenshot import dump_screen, dump_device_screen
|
2013-10-16 19:18:29 +04:00
|
|
|
import mozcrash
|
2010-06-24 13:32:01 +04:00
|
|
|
|
2012-11-13 01:57:13 +04:00
|
|
|
# signatures for logcat messages that we don't care about much
|
2018-05-22 00:56:34 +03:00
|
|
|
fennecLogcatFilters = ["The character encoding of the HTML document was not declared",
|
|
|
|
"Use of Mutation Events is deprecated. Use MutationObserver instead.",
|
|
|
|
"Unexpected value from nativeGetEnabledTags: 0"]
|
|
|
|
|
2012-11-13 01:57:13 +04:00
|
|
|
|
2010-06-24 13:32:01 +04:00
|
|
|
class RemoteAutomation(Automation):
|
2012-08-14 18:41:11 +04:00
|
|
|
|
2018-05-22 00:56:34 +03:00
|
|
|
def __init__(self, device, appName='', remoteProfile=None, remoteLog=None,
|
2014-07-17 11:02:00 +04:00
|
|
|
processArgs=None):
|
2018-03-24 03:06:27 +03:00
|
|
|
self._device = device
|
2010-06-24 13:32:01 +04:00
|
|
|
self._appName = appName
|
2018-03-24 03:06:27 +03:00
|
|
|
self._remoteProfile = remoteProfile
|
2010-09-18 04:18:06 +04:00
|
|
|
self._remoteLog = remoteLog
|
2018-05-22 00:56:34 +03:00
|
|
|
self._processArgs = processArgs or {}
|
2010-09-18 04:18:06 +04:00
|
|
|
|
2012-11-02 22:57:50 +04:00
|
|
|
self.lastTestSeen = "remoteautomation.py"
|
2010-06-24 13:32:01 +04:00
|
|
|
Automation.__init__(self)
|
|
|
|
|
2010-12-17 02:28:35 +03:00
|
|
|
# Set up what we need for the remote environment
|
2018-05-22 00:58:19 +03:00
|
|
|
def environment(self, env=None, xrePath=None, crashreporter=True, debugger=False,
|
|
|
|
lsanPath=None, ubsanPath=None):
|
2010-12-17 02:28:35 +03:00
|
|
|
# Because we are running remote, we don't want to mimic the local env
|
|
|
|
# so no copying of os.environ
|
|
|
|
if env is None:
|
|
|
|
env = {}
|
|
|
|
|
2013-09-16 22:44:25 +04:00
|
|
|
if crashreporter and not debugger:
|
2010-12-17 02:28:35 +03:00
|
|
|
env['MOZ_CRASHREPORTER_NO_REPORT'] = '1'
|
|
|
|
env['MOZ_CRASHREPORTER'] = '1'
|
2018-03-28 21:43:52 +03:00
|
|
|
env['MOZ_CRASHREPORTER_SHUTDOWN'] = '1'
|
2010-12-17 02:28:35 +03:00
|
|
|
else:
|
|
|
|
env['MOZ_CRASHREPORTER_DISABLE'] = '1'
|
|
|
|
|
2014-09-22 17:48:00 +04:00
|
|
|
# Crash on non-local network connections by default.
|
|
|
|
# MOZ_DISABLE_NONLOCAL_CONNECTIONS can be set to "0" to temporarily
|
|
|
|
# enable non-local connections for the purposes of local testing.
|
|
|
|
# Don't override the user's choice here. See bug 1049688.
|
|
|
|
env.setdefault('MOZ_DISABLE_NONLOCAL_CONNECTIONS', '1')
|
2014-06-17 18:49:57 +04:00
|
|
|
|
2016-06-02 02:46:44 +03:00
|
|
|
# Send an env var noting that we are in automation. Passing any
|
|
|
|
# value except the empty string will declare the value to exist.
|
|
|
|
#
|
|
|
|
# This may be used to disabled network connections during testing, e.g.
|
|
|
|
# Switchboard & telemetry uploads.
|
|
|
|
env.setdefault('MOZ_IN_AUTOMATION', '1')
|
2016-06-01 03:04:40 +03:00
|
|
|
|
2015-05-02 01:34:36 +03:00
|
|
|
# Set WebRTC logging in case it is not set yet.
|
|
|
|
# On Android, environment variables cannot contain ',' so the
|
|
|
|
# standard WebRTC setting for NSPR_LOG_MODULES is not available.
|
2018-05-22 00:58:19 +03:00
|
|
|
# env.setdefault('NSPR_LOG_MODULES', 'signaling:5,mtransport:5,datachannel:5,jsep:5,MediaPipelineFactory:5') # NOQA: E501
|
2015-05-02 01:34:36 +03:00
|
|
|
env.setdefault('R_LOG_LEVEL', '6')
|
|
|
|
env.setdefault('R_LOG_DESTINATION', 'stderr')
|
|
|
|
env.setdefault('R_LOG_VERBOSE', '1')
|
|
|
|
|
2010-12-17 02:28:35 +03:00
|
|
|
return env
|
|
|
|
|
2018-05-22 00:58:19 +03:00
|
|
|
def waitForFinish(self, proc, utilityPath, timeout, maxTime, startTime, debuggerInfo,
|
|
|
|
symbolsPath, outputHandler=None):
|
2014-02-02 19:11:23 +04:00
|
|
|
""" Wait for tests to finish.
|
|
|
|
If maxTime seconds elapse or no output is detected for timeout
|
|
|
|
seconds, kill the process and fail the test.
|
2012-11-02 22:57:50 +04:00
|
|
|
"""
|
2016-12-13 21:28:06 +03:00
|
|
|
proc.utilityPath = utilityPath
|
2010-06-24 13:32:01 +04:00
|
|
|
# maxTime is used to override the default timeout, we should honor that
|
2018-05-22 00:56:34 +03:00
|
|
|
status = proc.wait(timeout=maxTime, noOutputTimeout=timeout)
|
2012-11-02 22:57:50 +04:00
|
|
|
self.lastTestSeen = proc.getLastTestSeen
|
2010-06-24 13:32:01 +04:00
|
|
|
|
2018-03-24 03:06:27 +03:00
|
|
|
topActivity = self._device.get_top_activity(timeout=60)
|
2014-02-02 19:11:23 +04:00
|
|
|
if topActivity == proc.procName:
|
2018-05-22 00:58:19 +03:00
|
|
|
print("Browser unexpectedly found running. Killing...")
|
2014-07-04 08:11:41 +04:00
|
|
|
proc.kill(True)
|
2014-02-02 19:11:23 +04:00
|
|
|
if status == 1:
|
2012-11-29 00:43:58 +04:00
|
|
|
if maxTime:
|
2018-05-22 00:58:19 +03:00
|
|
|
print("TEST-UNEXPECTED-FAIL | %s | application ran for longer than "
|
2018-05-22 00:56:34 +03:00
|
|
|
"allowed maximum time of %s seconds" % (
|
2018-05-22 00:58:19 +03:00
|
|
|
self.lastTestSeen, maxTime))
|
2012-11-29 00:43:58 +04:00
|
|
|
else:
|
2018-05-22 00:58:19 +03:00
|
|
|
print("TEST-UNEXPECTED-FAIL | %s | application ran for longer than "
|
|
|
|
"allowed maximum time" % (self.lastTestSeen))
|
2014-02-02 19:11:23 +04:00
|
|
|
if status == 2:
|
2018-05-28 20:29:34 +03:00
|
|
|
print("TEST-UNEXPECTED-FAIL | %s | application timed out after %d "
|
|
|
|
"seconds with no output"
|
2018-05-22 00:58:19 +03:00
|
|
|
% (self.lastTestSeen, int(timeout)))
|
2010-06-24 13:32:01 +04:00
|
|
|
|
|
|
|
return status
|
|
|
|
|
2013-05-17 00:32:52 +04:00
|
|
|
def deleteANRs(self):
|
2018-08-18 20:47:12 +03:00
|
|
|
# Remove files from the dalvik stack-trace directory.
|
|
|
|
if not self._device.is_dir(self._device.stack_trace_dir, root=True):
|
|
|
|
return
|
2013-05-17 00:32:52 +04:00
|
|
|
try:
|
2018-08-18 20:47:12 +03:00
|
|
|
for trace_file in self._device.ls(self._device.stack_trace_dir, root=True):
|
|
|
|
trace_path = posixpath.join(self._device.stack_trace_dir, trace_file)
|
|
|
|
self._device.chmod(trace_path, root=True)
|
|
|
|
self._device.rm(trace_path, root=True)
|
2018-03-24 03:06:27 +03:00
|
|
|
except Exception as e:
|
2018-08-18 20:47:12 +03:00
|
|
|
print("Error deleting %s: %s" % (self._device.stack_trace_dir, str(e)))
|
2013-05-17 00:32:52 +04:00
|
|
|
|
|
|
|
def checkForANRs(self):
|
2018-08-18 20:47:12 +03:00
|
|
|
if not self._device.is_dir(self._device.stack_trace_dir):
|
|
|
|
print("%s not found" % self._device.stack_trace_dir)
|
|
|
|
return
|
|
|
|
try:
|
|
|
|
for trace_file in self._device.ls(self._device.stack_trace_dir, root=True):
|
|
|
|
trace_path = posixpath.join(self._device.stack_trace_dir, trace_file)
|
|
|
|
t = self._device.get_file(trace_path)
|
2015-07-09 21:30:01 +03:00
|
|
|
if t:
|
|
|
|
stripped = t.strip()
|
|
|
|
if len(stripped) > 0:
|
2018-08-18 20:47:12 +03:00
|
|
|
print("Contents of %s:" % trace_path)
|
2018-05-22 00:58:19 +03:00
|
|
|
print(t)
|
2018-08-18 20:47:12 +03:00
|
|
|
# Once reported, delete traces
|
|
|
|
self.deleteANRs()
|
|
|
|
except Exception as e:
|
|
|
|
print("Error pulling %s: %s" % (self._device.stack_trace_dir, str(e)))
|
2013-05-17 00:32:52 +04:00
|
|
|
|
2014-08-11 21:55:28 +04:00
|
|
|
def deleteTombstones(self):
|
2018-02-23 19:47:57 +03:00
|
|
|
# delete any tombstone files from device
|
2018-05-22 00:56:34 +03:00
|
|
|
self._device.rm("/data/tombstones", force=True,
|
|
|
|
recursive=True, root=True)
|
2014-08-11 21:55:28 +04:00
|
|
|
|
|
|
|
def checkForTombstones(self):
|
|
|
|
# pull any tombstones from device and move to MOZ_UPLOAD_DIR
|
|
|
|
remoteDir = "/data/tombstones"
|
2018-02-23 19:47:57 +03:00
|
|
|
uploadDir = os.environ.get('MOZ_UPLOAD_DIR', None)
|
|
|
|
if uploadDir:
|
|
|
|
if not os.path.exists(uploadDir):
|
|
|
|
os.mkdir(uploadDir)
|
2018-03-24 03:06:27 +03:00
|
|
|
if self._device.is_dir(remoteDir):
|
2018-02-23 19:47:57 +03:00
|
|
|
# copy tombstone files from device to local upload directory
|
2018-03-24 03:06:27 +03:00
|
|
|
self._device.chmod(remoteDir, recursive=True, root=True)
|
|
|
|
self._device.pull(remoteDir, uploadDir)
|
2014-08-11 21:55:28 +04:00
|
|
|
self.deleteTombstones()
|
2018-02-23 19:47:57 +03:00
|
|
|
for f in glob.glob(os.path.join(uploadDir, "tombstone_??")):
|
2014-08-11 21:55:28 +04:00
|
|
|
# add a unique integer to the file name, in case there are
|
|
|
|
# multiple tombstones generated with the same name, for
|
|
|
|
# instance, after multiple robocop tests
|
|
|
|
for i in xrange(1, sys.maxint):
|
|
|
|
newname = "%s.%d.txt" % (f, i)
|
|
|
|
if not os.path.exists(newname):
|
|
|
|
os.rename(f, newname)
|
|
|
|
break
|
|
|
|
else:
|
2018-05-22 00:58:19 +03:00
|
|
|
print("%s does not exist; tombstone check skipped" % remoteDir)
|
2014-08-11 21:55:28 +04:00
|
|
|
else:
|
2018-05-22 00:58:19 +03:00
|
|
|
print("MOZ_UPLOAD_DIR not defined; tombstone check skipped")
|
2014-08-11 21:55:28 +04:00
|
|
|
|
2011-10-06 18:51:03 +04:00
|
|
|
def checkForCrashes(self, directory, symbolsPath):
|
2013-05-17 00:32:52 +04:00
|
|
|
self.checkForANRs()
|
2014-08-11 21:55:28 +04:00
|
|
|
self.checkForTombstones()
|
2013-05-17 00:32:52 +04:00
|
|
|
|
2018-05-22 00:56:34 +03:00
|
|
|
logcat = self._device.get_logcat(
|
|
|
|
filter_out_regexps=fennecLogcatFilters)
|
2015-04-22 01:44:42 +03:00
|
|
|
|
2018-05-22 00:56:34 +03:00
|
|
|
javaException = mozcrash.check_for_java_exception(
|
|
|
|
logcat, test_name=self.lastTestSeen)
|
2013-02-13 22:42:15 +04:00
|
|
|
if javaException:
|
|
|
|
return True
|
2013-04-20 02:31:16 +04:00
|
|
|
|
|
|
|
# If crash reporting is disabled (MOZ_CRASHREPORTER!=1), we can't say
|
|
|
|
# anything.
|
|
|
|
if not self.CRASHREPORTER:
|
|
|
|
return False
|
|
|
|
|
2012-11-20 19:24:28 +04:00
|
|
|
try:
|
2013-02-26 18:19:58 +04:00
|
|
|
dumpDir = tempfile.mkdtemp()
|
2016-01-25 17:55:57 +03:00
|
|
|
remoteCrashDir = posixpath.join(self._remoteProfile, 'minidumps')
|
2018-03-24 03:06:27 +03:00
|
|
|
if not self._device.is_dir(remoteCrashDir):
|
2013-04-20 02:31:16 +04:00
|
|
|
# If crash reporting is enabled (MOZ_CRASHREPORTER=1), the
|
|
|
|
# minidumps directory is automatically created when Fennec
|
|
|
|
# (first) starts, so its lack of presence is a hint that
|
|
|
|
# something went wrong.
|
2018-05-22 00:58:19 +03:00
|
|
|
print("Automation Error: No crash directory (%s) found on remote device" %
|
|
|
|
remoteCrashDir)
|
2013-02-08 20:32:07 +04:00
|
|
|
return True
|
2018-03-24 03:06:27 +03:00
|
|
|
self._device.pull(remoteCrashDir, dumpDir)
|
2014-09-24 04:33:31 +04:00
|
|
|
|
|
|
|
logger = get_default_logger()
|
2018-05-22 00:56:34 +03:00
|
|
|
crashed = mozcrash.log_crashes(
|
|
|
|
logger, dumpDir, symbolsPath, test=self.lastTestSeen)
|
2013-03-21 17:19:34 +04:00
|
|
|
|
2013-02-08 20:32:07 +04:00
|
|
|
finally:
|
|
|
|
try:
|
|
|
|
shutil.rmtree(dumpDir)
|
2018-03-24 03:06:27 +03:00
|
|
|
except Exception as e:
|
2018-05-22 00:58:19 +03:00
|
|
|
print("WARNING: unable to remove directory %s: %s" % (
|
|
|
|
dumpDir, str(e)))
|
2012-11-20 19:24:28 +04:00
|
|
|
return crashed
|
2011-10-06 18:51:03 +04:00
|
|
|
|
2010-06-24 13:32:01 +04:00
|
|
|
def buildCommandLine(self, app, debuggerInfo, profileDir, testURL, extraArgs):
|
|
|
|
# If remote profile is specified, use that instead
|
2018-02-23 19:47:57 +03:00
|
|
|
if self._remoteProfile:
|
2010-06-24 13:32:01 +04:00
|
|
|
profileDir = self._remoteProfile
|
|
|
|
|
2018-03-24 03:06:27 +03:00
|
|
|
# Hack for robocop, if app is "am" and extraArgs contains the rest of the stuff, lets
|
2012-01-08 03:41:08 +04:00
|
|
|
# assume extraArgs is all we need
|
2018-02-23 19:47:57 +03:00
|
|
|
if app == "am" and extraArgs[0] in ('instrument', 'start'):
|
2012-01-08 03:41:08 +04:00
|
|
|
return app, extraArgs
|
2012-08-14 18:41:11 +04:00
|
|
|
|
2018-05-22 00:56:34 +03:00
|
|
|
cmd, args = Automation.buildCommandLine(
|
|
|
|
self, app, debuggerInfo, profileDir, testURL, extraArgs)
|
2010-06-24 13:32:01 +04:00
|
|
|
try:
|
|
|
|
args.remove('-foreground')
|
2018-05-22 00:58:19 +03:00
|
|
|
except Exception:
|
2010-06-24 13:32:01 +04:00
|
|
|
pass
|
|
|
|
return app, args
|
|
|
|
|
2018-05-22 00:56:34 +03:00
|
|
|
def Process(self, cmd, stdout=None, stderr=None, env=None, cwd=None):
|
2018-03-24 03:06:27 +03:00
|
|
|
return self.RProcess(self._device, cmd, self._remoteLog, env, cwd, self._appName,
|
2014-07-17 11:02:00 +04:00
|
|
|
**self._processArgs)
|
2010-06-24 13:32:01 +04:00
|
|
|
|
|
|
|
class RProcess(object):
|
2018-03-24 03:06:27 +03:00
|
|
|
def __init__(self, device, cmd, stdout=None, env=None, cwd=None, app=None,
|
2018-02-07 23:33:43 +03:00
|
|
|
messageLogger=None, counts=None):
|
2018-03-24 03:06:27 +03:00
|
|
|
self.device = device
|
2012-11-02 22:57:50 +04:00
|
|
|
self.lastTestSeen = "remoteautomation.py"
|
2014-07-17 11:02:00 +04:00
|
|
|
self.messageLogger = messageLogger
|
2018-05-22 00:56:34 +03:00
|
|
|
self.proc = stdout
|
2018-03-24 03:06:27 +03:00
|
|
|
self.procName = cmd[0].split(posixpath.sep)[-1]
|
|
|
|
self.stdoutlen = 0
|
2016-12-13 21:28:06 +03:00
|
|
|
self.utilityPath = None
|
2014-07-17 11:02:00 +04:00
|
|
|
|
2018-08-18 20:47:12 +03:00
|
|
|
if app and self.device.process_exist(app):
|
|
|
|
print("remoteautomation.py %s is already running. Stopping...")
|
|
|
|
self.device.stop_application(app, root=True)
|
|
|
|
|
2018-02-07 23:33:43 +03:00
|
|
|
self.counts = counts
|
|
|
|
if self.counts is not None:
|
|
|
|
self.counts['pass'] = 0
|
|
|
|
self.counts['fail'] = 0
|
|
|
|
self.counts['todo'] = 0
|
|
|
|
|
2018-03-24 03:06:27 +03:00
|
|
|
if cmd[0] == 'am':
|
|
|
|
cmd = ' '.join(cmd)
|
2014-02-02 19:11:22 +04:00
|
|
|
self.procName = app
|
2018-03-24 03:06:27 +03:00
|
|
|
if not self.device.shell_bool(cmd):
|
2018-05-22 00:58:19 +03:00
|
|
|
print("remote_automation.py failed to launch %s" % cmd)
|
2018-03-24 03:06:27 +03:00
|
|
|
else:
|
|
|
|
args = cmd
|
|
|
|
if args[0] == app:
|
|
|
|
args = args[1:]
|
|
|
|
url = args[-1:][0]
|
|
|
|
if url.startswith('/'):
|
|
|
|
# this is probably a reftest profile directory, not a url
|
|
|
|
url = None
|
|
|
|
else:
|
|
|
|
args = args[:-1]
|
|
|
|
if 'geckoview' in app:
|
2018-04-10 22:26:11 +03:00
|
|
|
activity = "TestRunnerActivity"
|
|
|
|
self.device.launch_activity(app, activity, e10s=True, moz_env=env,
|
|
|
|
extra_args=args, url=url)
|
2018-03-24 03:06:27 +03:00
|
|
|
else:
|
2018-05-22 00:56:34 +03:00
|
|
|
self.device.launch_fennec(
|
|
|
|
app, moz_env=env, extra_args=args, url=url)
|
2010-06-24 13:32:01 +04:00
|
|
|
|
2015-05-04 19:32:46 +03:00
|
|
|
# Setting timeout at 1 hour since on a remote device this takes much longer.
|
2018-06-30 01:05:58 +03:00
|
|
|
# Temporarily increased to 110 minutes because no more chunks can be created.
|
|
|
|
self.timeout = 6600
|
2010-06-24 13:32:01 +04:00
|
|
|
|
2014-07-17 11:02:00 +04:00
|
|
|
# Used to buffer log messages until we meet a line break
|
|
|
|
self.logBuffer = ""
|
|
|
|
|
2010-06-24 13:32:01 +04:00
|
|
|
@property
|
|
|
|
def pid(self):
|
2018-03-24 03:06:27 +03:00
|
|
|
procs = self.device.get_process_list()
|
|
|
|
# limit the comparison to the first 75 characters due to a
|
|
|
|
# limitation in processname length in android.
|
|
|
|
pids = [proc[0] for proc in procs if proc[1] == self.procName[:75]]
|
|
|
|
|
|
|
|
if pids is None or len(pids) < 1:
|
Bug 795496 - Make mozdevice raise exceptions on error;r=ahal,jmaher
It turns out that relying on the user to check return codes for every
command was non-intuitive and resulted in many hard to trace bugs.
Now most functinos just return "None", and raise a DMError when there's an
exception. The exception to this are functions like dirExists, which now return
booleans, and throw exceptions on error. This is a fairly major refactor,
and also involved the following internal changes:
* Removed FileError and AgentError exceptions, replaced with DMError
(having to manage three different types of exceptions was confusing,
all the more so when we're raising them)
* Docstrings updated to remove references to return values where no
longer relevant
* pushFile no longer will create a directory to accomodate the file
if it doesn't exist (this makes it consistent with devicemanagerADB)
* dmSUT we validate the file, but assume that we get something back
from the agent, instead of falling back to manual validation in the
case that we didn't
* isDir and dirExists had the same intention, but different
implementations for dmSUT. Replaced the dmSUT impl of getDirectory
with that of isDir's (which was much simpler). Removed
isDir from devicemanager.py, since it wasn't used externally
* killProcess modified to check for process existence before running
(since the actual internal kill command will throw an exception
if the process doesn't exist)
In addition to all this, more unit tests have been added to test these
changes for devicemanagerSUT.
2012-10-04 19:28:07 +04:00
|
|
|
return 0
|
2018-03-24 03:06:27 +03:00
|
|
|
return pids[0]
|
2012-08-14 18:41:11 +04:00
|
|
|
|
2014-07-17 11:02:00 +04:00
|
|
|
def read_stdout(self):
|
2016-02-05 23:44:20 +03:00
|
|
|
"""
|
2018-03-24 03:06:27 +03:00
|
|
|
Fetch the full remote log file, log any new content and return True if new
|
|
|
|
content processed.
|
2012-11-02 22:57:50 +04:00
|
|
|
"""
|
2018-03-24 03:06:27 +03:00
|
|
|
if not self.device.is_file(self.proc):
|
2016-02-05 23:44:20 +03:00
|
|
|
return False
|
2014-07-17 11:02:00 +04:00
|
|
|
try:
|
2018-05-22 00:56:34 +03:00
|
|
|
newLogContent = self.device.get_file(
|
|
|
|
self.proc, offset=self.stdoutlen)
|
2018-07-27 18:27:16 +03:00
|
|
|
except ADBTimeoutError:
|
|
|
|
raise
|
2018-03-24 03:06:27 +03:00
|
|
|
except Exception:
|
2016-02-05 23:44:20 +03:00
|
|
|
return False
|
2014-07-17 11:02:00 +04:00
|
|
|
if not newLogContent:
|
2016-02-05 23:44:20 +03:00
|
|
|
return False
|
2014-07-17 11:02:00 +04:00
|
|
|
|
|
|
|
self.stdoutlen += len(newLogContent)
|
|
|
|
|
|
|
|
if self.messageLogger is None:
|
2018-05-22 00:56:34 +03:00
|
|
|
testStartFilenames = re.findall(
|
|
|
|
r"TEST-START \| ([^\s]*)", newLogContent)
|
2012-11-02 22:57:50 +04:00
|
|
|
if testStartFilenames:
|
|
|
|
self.lastTestSeen = testStartFilenames[-1]
|
2018-05-22 00:58:19 +03:00
|
|
|
print(newLogContent)
|
2016-02-05 23:44:20 +03:00
|
|
|
return True
|
2014-07-17 11:02:00 +04:00
|
|
|
|
|
|
|
self.logBuffer += newLogContent
|
|
|
|
lines = self.logBuffer.split('\n')
|
2016-03-09 22:38:13 +03:00
|
|
|
lines = [l for l in lines if l]
|
2016-02-05 23:44:20 +03:00
|
|
|
|
|
|
|
if lines:
|
2016-07-29 17:29:53 +03:00
|
|
|
if self.logBuffer.endswith('\n'):
|
|
|
|
# all lines are complete; no need to buffer
|
|
|
|
self.logBuffer = ""
|
|
|
|
else:
|
|
|
|
# keep the last (unfinished) line in the buffer
|
|
|
|
self.logBuffer = lines[-1]
|
|
|
|
del lines[-1]
|
2016-02-05 23:44:20 +03:00
|
|
|
|
2014-07-17 11:02:00 +04:00
|
|
|
if not lines:
|
2016-02-05 23:44:20 +03:00
|
|
|
return False
|
2014-07-17 11:02:00 +04:00
|
|
|
|
|
|
|
for line in lines:
|
|
|
|
# This passes the line to the logger (to be logged or buffered)
|
|
|
|
parsed_messages = self.messageLogger.write(line)
|
|
|
|
for message in parsed_messages:
|
2016-02-05 23:44:20 +03:00
|
|
|
if isinstance(message, dict) and message.get('action') == 'test_start':
|
2014-07-17 11:02:00 +04:00
|
|
|
self.lastTestSeen = message['test']
|
2018-02-07 23:33:43 +03:00
|
|
|
if isinstance(message, dict) and message.get('action') == 'log':
|
|
|
|
line = message['message'].strip()
|
|
|
|
if self.counts:
|
|
|
|
m = re.match(".*:\s*(\d*)", line)
|
|
|
|
if m:
|
|
|
|
try:
|
|
|
|
val = int(m.group(1))
|
|
|
|
if "Passed:" in line:
|
|
|
|
self.counts['pass'] += val
|
|
|
|
elif "Failed:" in line:
|
|
|
|
self.counts['fail'] += val
|
|
|
|
elif "Todo:" in line:
|
|
|
|
self.counts['todo'] += val
|
2018-07-27 18:27:16 +03:00
|
|
|
except ADBTimeoutError:
|
|
|
|
raise
|
2018-05-22 00:58:19 +03:00
|
|
|
except Exception:
|
2018-02-07 23:33:43 +03:00
|
|
|
pass
|
|
|
|
|
2016-02-05 23:44:20 +03:00
|
|
|
return True
|
2012-08-14 18:41:11 +04:00
|
|
|
|
2012-11-02 22:57:50 +04:00
|
|
|
@property
|
|
|
|
def getLastTestSeen(self):
|
|
|
|
return self.lastTestSeen
|
|
|
|
|
2014-02-02 19:11:23 +04:00
|
|
|
# Wait for the remote process to end (or for its activity to go to background).
|
|
|
|
# While waiting, periodically retrieve the process output and print it.
|
|
|
|
# If the process is still running after *timeout* seconds, return 1;
|
|
|
|
# If the process is still running but no output is received in *noOutputTimeout*
|
|
|
|
# seconds, return 2;
|
|
|
|
# Else, once the process exits/goes to background, return 0.
|
2018-05-22 00:56:34 +03:00
|
|
|
def wait(self, timeout=None, noOutputTimeout=None):
|
2010-06-24 13:32:01 +04:00
|
|
|
timer = 0
|
2014-02-02 19:11:23 +04:00
|
|
|
noOutputTimer = 0
|
2015-07-09 21:30:01 +03:00
|
|
|
interval = 10
|
2018-05-22 00:58:19 +03:00
|
|
|
if timeout is None:
|
2010-06-24 13:32:01 +04:00
|
|
|
timeout = self.timeout
|
2014-02-02 19:11:23 +04:00
|
|
|
status = 0
|
2015-07-09 21:30:01 +03:00
|
|
|
top = self.procName
|
|
|
|
slowLog = False
|
2018-05-22 00:56:34 +03:00
|
|
|
endTime = datetime.datetime.now() + datetime.timedelta(seconds=timeout)
|
2018-03-24 03:06:27 +03:00
|
|
|
while top == self.procName:
|
2015-07-09 21:30:01 +03:00
|
|
|
# Get log updates on each interval, but if it is taking
|
|
|
|
# too long, only do it every 60 seconds
|
2017-01-07 02:35:29 +03:00
|
|
|
hasOutput = False
|
2015-07-09 21:30:01 +03:00
|
|
|
if (not slowLog) or (timer % 60 == 0):
|
|
|
|
startRead = datetime.datetime.now()
|
2016-02-05 23:44:20 +03:00
|
|
|
hasOutput = self.read_stdout()
|
2015-07-09 21:30:01 +03:00
|
|
|
if (datetime.datetime.now() - startRead) > datetime.timedelta(seconds=5):
|
|
|
|
slowLog = True
|
2016-02-05 23:44:20 +03:00
|
|
|
if hasOutput:
|
2014-02-02 19:11:23 +04:00
|
|
|
noOutputTimer = 0
|
2018-02-07 23:33:44 +03:00
|
|
|
if self.counts and 'pass' in self.counts and self.counts['pass'] > 0:
|
|
|
|
interval = 0.5
|
2010-06-24 13:32:01 +04:00
|
|
|
time.sleep(interval)
|
|
|
|
timer += interval
|
2014-02-02 19:11:23 +04:00
|
|
|
noOutputTimer += interval
|
2017-09-22 20:32:38 +03:00
|
|
|
if datetime.datetime.now() > endTime:
|
2014-02-02 19:11:23 +04:00
|
|
|
status = 1
|
|
|
|
break
|
|
|
|
if (noOutputTimeout and noOutputTimer > noOutputTimeout):
|
|
|
|
status = 2
|
2010-06-24 13:32:01 +04:00
|
|
|
break
|
2017-01-07 02:35:29 +03:00
|
|
|
if not hasOutput:
|
2018-03-24 03:06:27 +03:00
|
|
|
top = self.device.get_top_activity(timeout=60)
|
|
|
|
if top is None:
|
2018-05-22 00:58:19 +03:00
|
|
|
print("Failed to get top activity, retrying, once...")
|
2018-03-24 03:06:27 +03:00
|
|
|
top = self.device.get_top_activity(timeout=60)
|
2012-11-02 22:57:50 +04:00
|
|
|
# Flush anything added to stdout during the sleep
|
2014-07-17 11:02:00 +04:00
|
|
|
self.read_stdout()
|
2018-08-07 19:05:37 +03:00
|
|
|
print("wait for %s complete; top activity=%s" % (self.procName, top))
|
2014-02-02 19:11:23 +04:00
|
|
|
return status
|
2012-08-14 18:41:11 +04:00
|
|
|
|
2018-05-22 00:56:34 +03:00
|
|
|
def kill(self, stagedShutdown=False):
|
2018-08-18 20:47:12 +03:00
|
|
|
# Take a screenshot to capture the screen state just before
|
|
|
|
# the application is killed.
|
|
|
|
if not self.device._device_serial.startswith('emulator-'):
|
|
|
|
dump_device_screen(self.device, get_default_logger())
|
|
|
|
elif self.utilityPath:
|
|
|
|
# Do not use the on-device screenshot options since
|
|
|
|
# they rarely work well with Firefox on the Android
|
|
|
|
# emulator. dump_screen provides an effective
|
2016-12-13 21:28:06 +03:00
|
|
|
# screenshot of the emulator and its host desktop.
|
|
|
|
dump_screen(self.utilityPath, get_default_logger())
|
2014-07-04 08:11:41 +04:00
|
|
|
if stagedShutdown:
|
|
|
|
# Trigger an ANR report with "kill -3" (SIGQUIT)
|
2018-03-24 03:06:27 +03:00
|
|
|
try:
|
2018-11-01 02:23:47 +03:00
|
|
|
self.device.pkill(self.procName, sig=3, attempts=1, root=True)
|
2018-07-27 18:27:16 +03:00
|
|
|
except ADBTimeoutError:
|
|
|
|
raise
|
2018-05-22 00:58:19 +03:00
|
|
|
except: # NOQA: E722
|
2018-03-24 03:06:27 +03:00
|
|
|
pass
|
2014-07-04 08:11:41 +04:00
|
|
|
time.sleep(3)
|
|
|
|
# Trigger a breakpad dump with "kill -6" (SIGABRT)
|
2018-03-24 03:06:27 +03:00
|
|
|
try:
|
2018-11-01 02:23:47 +03:00
|
|
|
self.device.pkill(self.procName, sig=6, attempts=1, root=True)
|
2018-07-27 18:27:16 +03:00
|
|
|
except ADBTimeoutError:
|
|
|
|
raise
|
2018-05-22 00:58:19 +03:00
|
|
|
except: # NOQA: E722
|
2018-03-24 03:06:27 +03:00
|
|
|
pass
|
2014-07-04 08:11:41 +04:00
|
|
|
# Wait for process to end
|
|
|
|
retries = 0
|
|
|
|
while retries < 3:
|
2018-03-24 03:06:27 +03:00
|
|
|
if self.device.process_exist(self.procName):
|
2018-05-22 00:58:19 +03:00
|
|
|
print("%s still alive after SIGABRT: waiting..." % self.procName)
|
2014-07-04 08:11:41 +04:00
|
|
|
time.sleep(5)
|
|
|
|
else:
|
2018-11-01 02:23:47 +03:00
|
|
|
break
|
2014-07-04 08:11:41 +04:00
|
|
|
retries += 1
|
2018-11-01 02:23:47 +03:00
|
|
|
if self.device.process_exist(self.procName):
|
|
|
|
try:
|
|
|
|
self.device.pkill(self.procName, sig=9, attempts=1, root=True)
|
|
|
|
except ADBTimeoutError:
|
|
|
|
raise
|
|
|
|
except: # NOQA: E722
|
|
|
|
print("%s still alive after SIGKILL!" % self.procName)
|
2018-03-24 03:06:27 +03:00
|
|
|
if self.device.process_exist(self.procName):
|
2018-03-26 21:21:46 +03:00
|
|
|
self.device.stop_application(self.procName)
|
2014-07-04 08:11:41 +04:00
|
|
|
else:
|
2018-03-26 21:21:46 +03:00
|
|
|
self.device.stop_application(self.procName)
|
2018-11-01 02:23:47 +03:00
|
|
|
# Test harnesses use the MOZ_CRASHREPORTER environment variables to suppress
|
|
|
|
# the interactive crash reporter, but that may not always be effective;
|
|
|
|
# check for and cleanup errant crashreporters.
|
|
|
|
crashreporter = "%s.CrashReporter" % self.procName
|
|
|
|
if self.device.process_exist(crashreporter):
|
|
|
|
print("Warning: %s unexpectedly found running. Killing..." % crashreporter)
|
|
|
|
try:
|
|
|
|
self.device.pkill(crashreporter, root=True)
|
|
|
|
except ADBTimeoutError:
|
|
|
|
raise
|
|
|
|
except: # NOQA: E722
|
|
|
|
pass
|
|
|
|
if self.device.process_exist(crashreporter):
|
|
|
|
print("ERROR: %s still running!!" % crashreporter)
|