2012-05-21 15:12:37 +04:00
|
|
|
# This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
# License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
|
|
# file, You can obtain one at http://mozilla.org/MPL/2.0/.
|
2010-06-24 13:32:01 +04:00
|
|
|
|
2015-07-09 21:30:01 +03:00
|
|
|
import datetime
|
2014-08-11 21:55:28 +04:00
|
|
|
import glob
|
2010-06-24 13:32:01 +04:00
|
|
|
import time
|
2012-11-02 22:57:50 +04:00
|
|
|
import re
|
2010-06-24 13:32:01 +04:00
|
|
|
import os
|
2016-01-25 17:55:57 +03:00
|
|
|
import posixpath
|
2011-10-06 18:51:03 +04:00
|
|
|
import tempfile
|
|
|
|
import shutil
|
2012-08-14 18:41:11 +04:00
|
|
|
import subprocess
|
2014-08-11 21:55:28 +04:00
|
|
|
import sys
|
2010-06-24 13:32:01 +04:00
|
|
|
|
|
|
|
from automation import Automation
|
2016-02-10 00:19:44 +03:00
|
|
|
from mozdevice import DMError, DeviceManager
|
2015-07-16 17:38:40 +03:00
|
|
|
from mozlog import get_default_logger
|
2016-12-13 21:28:06 +03:00
|
|
|
from mozscreenshot import dump_screen
|
2013-10-16 19:18:29 +04:00
|
|
|
import mozcrash
|
2010-06-24 13:32:01 +04:00
|
|
|
|
2012-11-13 01:57:13 +04:00
|
|
|
# signatures for logcat messages that we don't care about much
|
|
|
|
fennecLogcatFilters = [ "The character encoding of the HTML document was not declared",
|
2013-11-17 21:23:15 +04:00
|
|
|
"Use of Mutation Events is deprecated. Use MutationObserver instead.",
|
|
|
|
"Unexpected value from nativeGetEnabledTags: 0" ]
|
2012-11-13 01:57:13 +04:00
|
|
|
|
2010-06-24 13:32:01 +04:00
|
|
|
class RemoteAutomation(Automation):
|
|
|
|
_devicemanager = None
|
2012-08-14 18:41:11 +04:00
|
|
|
|
2015-05-30 03:18:07 +03:00
|
|
|
# Part of a hack for Robocop: "am COMMAND" is handled specially if COMMAND
|
|
|
|
# is in this set. See usages below.
|
|
|
|
_specialAmCommands = ('instrument', 'start')
|
|
|
|
|
2014-07-17 11:02:00 +04:00
|
|
|
def __init__(self, deviceManager, appName = '', remoteLog = None,
|
|
|
|
processArgs=None):
|
2010-06-24 13:32:01 +04:00
|
|
|
self._devicemanager = deviceManager
|
|
|
|
self._appName = appName
|
|
|
|
self._remoteProfile = None
|
2010-09-18 04:18:06 +04:00
|
|
|
self._remoteLog = remoteLog
|
2014-07-17 11:02:00 +04:00
|
|
|
self._processArgs = processArgs or {};
|
2010-09-18 04:18:06 +04:00
|
|
|
|
2010-06-24 13:32:01 +04:00
|
|
|
# Default our product to fennec
|
|
|
|
self._product = "fennec"
|
2012-11-02 22:57:50 +04:00
|
|
|
self.lastTestSeen = "remoteautomation.py"
|
2010-06-24 13:32:01 +04:00
|
|
|
Automation.__init__(self)
|
|
|
|
|
|
|
|
def setDeviceManager(self, deviceManager):
|
|
|
|
self._devicemanager = deviceManager
|
2012-08-14 18:41:11 +04:00
|
|
|
|
2010-06-24 13:32:01 +04:00
|
|
|
def setAppName(self, appName):
|
|
|
|
self._appName = appName
|
|
|
|
|
|
|
|
def setRemoteProfile(self, remoteProfile):
|
|
|
|
self._remoteProfile = remoteProfile
|
|
|
|
|
|
|
|
def setProduct(self, product):
|
|
|
|
self._product = product
|
2012-08-14 18:41:11 +04:00
|
|
|
|
2010-09-18 04:18:06 +04:00
|
|
|
def setRemoteLog(self, logfile):
|
|
|
|
self._remoteLog = logfile
|
2010-06-24 13:32:01 +04:00
|
|
|
|
2010-12-17 02:28:35 +03:00
|
|
|
# Set up what we need for the remote environment
|
2017-11-28 02:10:48 +03:00
|
|
|
def environment(self, env=None, xrePath=None, crashreporter=True, debugger=False, lsanPath=None, ubsanPath=None):
|
2010-12-17 02:28:35 +03:00
|
|
|
# Because we are running remote, we don't want to mimic the local env
|
|
|
|
# so no copying of os.environ
|
|
|
|
if env is None:
|
|
|
|
env = {}
|
|
|
|
|
2011-07-27 03:13:20 +04:00
|
|
|
# Except for the mochitest results table hiding option, which isn't
|
|
|
|
# passed to runtestsremote.py as an actual option, but through the
|
2013-09-16 22:44:25 +04:00
|
|
|
# MOZ_HIDE_RESULTS_TABLE environment variable.
|
2011-07-27 03:13:20 +04:00
|
|
|
if 'MOZ_HIDE_RESULTS_TABLE' in os.environ:
|
|
|
|
env['MOZ_HIDE_RESULTS_TABLE'] = os.environ['MOZ_HIDE_RESULTS_TABLE']
|
|
|
|
|
2013-09-16 22:44:25 +04:00
|
|
|
if crashreporter and not debugger:
|
2010-12-17 02:28:35 +03:00
|
|
|
env['MOZ_CRASHREPORTER_NO_REPORT'] = '1'
|
|
|
|
env['MOZ_CRASHREPORTER'] = '1'
|
|
|
|
else:
|
|
|
|
env['MOZ_CRASHREPORTER_DISABLE'] = '1'
|
|
|
|
|
2014-09-22 17:48:00 +04:00
|
|
|
# Crash on non-local network connections by default.
|
|
|
|
# MOZ_DISABLE_NONLOCAL_CONNECTIONS can be set to "0" to temporarily
|
|
|
|
# enable non-local connections for the purposes of local testing.
|
|
|
|
# Don't override the user's choice here. See bug 1049688.
|
|
|
|
env.setdefault('MOZ_DISABLE_NONLOCAL_CONNECTIONS', '1')
|
2014-06-17 18:49:57 +04:00
|
|
|
|
2016-06-02 02:46:44 +03:00
|
|
|
# Send an env var noting that we are in automation. Passing any
|
|
|
|
# value except the empty string will declare the value to exist.
|
|
|
|
#
|
|
|
|
# This may be used to disabled network connections during testing, e.g.
|
|
|
|
# Switchboard & telemetry uploads.
|
|
|
|
env.setdefault('MOZ_IN_AUTOMATION', '1')
|
2016-06-01 03:04:40 +03:00
|
|
|
|
2015-05-02 01:34:36 +03:00
|
|
|
# Set WebRTC logging in case it is not set yet.
|
|
|
|
# On Android, environment variables cannot contain ',' so the
|
|
|
|
# standard WebRTC setting for NSPR_LOG_MODULES is not available.
|
|
|
|
# env.setdefault('NSPR_LOG_MODULES', 'signaling:5,mtransport:5,datachannel:5,jsep:5,MediaPipelineFactory:5')
|
|
|
|
env.setdefault('R_LOG_LEVEL', '6')
|
|
|
|
env.setdefault('R_LOG_DESTINATION', 'stderr')
|
|
|
|
env.setdefault('R_LOG_VERBOSE', '1')
|
|
|
|
|
2010-12-17 02:28:35 +03:00
|
|
|
return env
|
|
|
|
|
2016-02-05 23:44:20 +03:00
|
|
|
def waitForFinish(self, proc, utilityPath, timeout, maxTime, startTime, debuggerInfo, symbolsPath, outputHandler=None):
|
2014-02-02 19:11:23 +04:00
|
|
|
""" Wait for tests to finish.
|
|
|
|
If maxTime seconds elapse or no output is detected for timeout
|
|
|
|
seconds, kill the process and fail the test.
|
2012-11-02 22:57:50 +04:00
|
|
|
"""
|
2016-12-13 21:28:06 +03:00
|
|
|
proc.utilityPath = utilityPath
|
2010-06-24 13:32:01 +04:00
|
|
|
# maxTime is used to override the default timeout, we should honor that
|
2014-02-02 19:11:23 +04:00
|
|
|
status = proc.wait(timeout = maxTime, noOutputTimeout = timeout)
|
2012-11-02 22:57:50 +04:00
|
|
|
self.lastTestSeen = proc.getLastTestSeen
|
2010-06-24 13:32:01 +04:00
|
|
|
|
2014-02-02 19:11:23 +04:00
|
|
|
topActivity = self._devicemanager.getTopActivity()
|
|
|
|
if topActivity == proc.procName:
|
2017-11-01 00:58:31 +03:00
|
|
|
print "Browser unexpectedly found running. Killing..."
|
2014-07-04 08:11:41 +04:00
|
|
|
proc.kill(True)
|
2014-02-02 19:11:23 +04:00
|
|
|
if status == 1:
|
2012-11-29 00:43:58 +04:00
|
|
|
if maxTime:
|
|
|
|
print "TEST-UNEXPECTED-FAIL | %s | application ran for longer than " \
|
|
|
|
"allowed maximum time of %s seconds" % (self.lastTestSeen, maxTime)
|
|
|
|
else:
|
|
|
|
print "TEST-UNEXPECTED-FAIL | %s | application ran for longer than " \
|
|
|
|
"allowed maximum time" % (self.lastTestSeen)
|
2014-02-02 19:11:23 +04:00
|
|
|
if status == 2:
|
|
|
|
print "TEST-UNEXPECTED-FAIL | %s | application timed out after %d seconds with no output" \
|
|
|
|
% (self.lastTestSeen, int(timeout))
|
2010-06-24 13:32:01 +04:00
|
|
|
|
|
|
|
return status
|
|
|
|
|
2013-05-17 00:32:52 +04:00
|
|
|
def deleteANRs(self):
|
2014-04-29 06:20:52 +04:00
|
|
|
# empty ANR traces.txt file; usually need root permissions
|
|
|
|
# we make it empty and writable so we can test the ANR reporter later
|
2013-05-17 00:32:52 +04:00
|
|
|
traces = "/data/anr/traces.txt"
|
|
|
|
try:
|
2015-06-21 22:58:34 +03:00
|
|
|
self._devicemanager.shellCheckOutput(['echo', '', '>', traces], root=True,
|
|
|
|
timeout=DeviceManager.short_timeout)
|
|
|
|
self._devicemanager.shellCheckOutput(['chmod', '666', traces], root=True,
|
|
|
|
timeout=DeviceManager.short_timeout)
|
2013-05-17 00:32:52 +04:00
|
|
|
except DMError:
|
|
|
|
print "Error deleting %s" % traces
|
|
|
|
pass
|
|
|
|
|
|
|
|
def checkForANRs(self):
|
|
|
|
traces = "/data/anr/traces.txt"
|
|
|
|
if self._devicemanager.fileExists(traces):
|
|
|
|
try:
|
|
|
|
t = self._devicemanager.pullFile(traces)
|
2015-07-09 21:30:01 +03:00
|
|
|
if t:
|
|
|
|
stripped = t.strip()
|
|
|
|
if len(stripped) > 0:
|
|
|
|
print "Contents of %s:" % traces
|
|
|
|
print t
|
2013-05-17 00:32:52 +04:00
|
|
|
# Once reported, delete traces
|
|
|
|
self.deleteANRs()
|
|
|
|
except DMError:
|
|
|
|
print "Error pulling %s" % traces
|
2014-09-09 03:23:10 +04:00
|
|
|
except IOError:
|
|
|
|
print "Error pulling %s" % traces
|
2013-05-17 00:32:52 +04:00
|
|
|
else:
|
|
|
|
print "%s not found" % traces
|
|
|
|
|
2014-08-11 21:55:28 +04:00
|
|
|
def deleteTombstones(self):
|
|
|
|
# delete any existing tombstone files from device
|
2017-11-13 11:10:35 +03:00
|
|
|
tombstones = "/data/tombstones/*"
|
2014-08-11 21:55:28 +04:00
|
|
|
try:
|
2017-11-13 11:10:35 +03:00
|
|
|
self._devicemanager.shellCheckOutput(['rm', '-r', tombstones], root=True,
|
2015-06-21 22:58:34 +03:00
|
|
|
timeout=DeviceManager.short_timeout)
|
2014-08-11 21:55:28 +04:00
|
|
|
except DMError:
|
|
|
|
# This may just indicate that the tombstone directory is missing
|
|
|
|
pass
|
|
|
|
|
|
|
|
def checkForTombstones(self):
|
|
|
|
# pull any tombstones from device and move to MOZ_UPLOAD_DIR
|
|
|
|
remoteDir = "/data/tombstones"
|
|
|
|
blobberUploadDir = os.environ.get('MOZ_UPLOAD_DIR', None)
|
|
|
|
if blobberUploadDir:
|
|
|
|
if not os.path.exists(blobberUploadDir):
|
|
|
|
os.mkdir(blobberUploadDir)
|
|
|
|
if self._devicemanager.dirExists(remoteDir):
|
|
|
|
# copy tombstone files from device to local blobber upload directory
|
|
|
|
try:
|
2015-06-21 22:58:34 +03:00
|
|
|
self._devicemanager.shellCheckOutput(['chmod', '777', remoteDir], root=True,
|
|
|
|
timeout=DeviceManager.short_timeout)
|
|
|
|
self._devicemanager.shellCheckOutput(['chmod', '666', os.path.join(remoteDir, '*')], root=True,
|
|
|
|
timeout=DeviceManager.short_timeout)
|
2014-08-11 21:55:28 +04:00
|
|
|
self._devicemanager.getDirectory(remoteDir, blobberUploadDir, False)
|
|
|
|
except DMError:
|
|
|
|
# This may just indicate that no tombstone files are present
|
|
|
|
pass
|
|
|
|
self.deleteTombstones()
|
|
|
|
# add a .txt file extension to each tombstone file name, so
|
|
|
|
# that blobber will upload it
|
|
|
|
for f in glob.glob(os.path.join(blobberUploadDir, "tombstone_??")):
|
|
|
|
# add a unique integer to the file name, in case there are
|
|
|
|
# multiple tombstones generated with the same name, for
|
|
|
|
# instance, after multiple robocop tests
|
|
|
|
for i in xrange(1, sys.maxint):
|
|
|
|
newname = "%s.%d.txt" % (f, i)
|
|
|
|
if not os.path.exists(newname):
|
|
|
|
os.rename(f, newname)
|
|
|
|
break
|
|
|
|
else:
|
|
|
|
print "%s does not exist; tombstone check skipped" % remoteDir
|
|
|
|
else:
|
|
|
|
print "MOZ_UPLOAD_DIR not defined; tombstone check skipped"
|
|
|
|
|
2011-10-06 18:51:03 +04:00
|
|
|
def checkForCrashes(self, directory, symbolsPath):
|
2013-05-17 00:32:52 +04:00
|
|
|
self.checkForANRs()
|
2014-08-11 21:55:28 +04:00
|
|
|
self.checkForTombstones()
|
2013-05-17 00:32:52 +04:00
|
|
|
|
2015-06-21 22:58:34 +03:00
|
|
|
logcat = self._devicemanager.getLogcat(filterOutRegexps=fennecLogcatFilters)
|
2015-04-22 01:44:42 +03:00
|
|
|
|
2016-10-26 20:31:41 +03:00
|
|
|
javaException = mozcrash.check_for_java_exception(logcat, test_name=self.lastTestSeen)
|
2013-02-13 22:42:15 +04:00
|
|
|
if javaException:
|
|
|
|
return True
|
2013-04-20 02:31:16 +04:00
|
|
|
|
|
|
|
# If crash reporting is disabled (MOZ_CRASHREPORTER!=1), we can't say
|
|
|
|
# anything.
|
|
|
|
if not self.CRASHREPORTER:
|
|
|
|
return False
|
|
|
|
|
2012-11-20 19:24:28 +04:00
|
|
|
try:
|
2013-02-26 18:19:58 +04:00
|
|
|
dumpDir = tempfile.mkdtemp()
|
2016-01-25 17:55:57 +03:00
|
|
|
remoteCrashDir = posixpath.join(self._remoteProfile, 'minidumps')
|
2013-02-08 20:32:07 +04:00
|
|
|
if not self._devicemanager.dirExists(remoteCrashDir):
|
2013-04-20 02:31:16 +04:00
|
|
|
# If crash reporting is enabled (MOZ_CRASHREPORTER=1), the
|
|
|
|
# minidumps directory is automatically created when Fennec
|
|
|
|
# (first) starts, so its lack of presence is a hint that
|
|
|
|
# something went wrong.
|
2013-02-08 20:32:07 +04:00
|
|
|
print "Automation Error: No crash directory (%s) found on remote device" % remoteCrashDir
|
|
|
|
# Whilst no crash was found, the run should still display as a failure
|
|
|
|
return True
|
|
|
|
self._devicemanager.getDirectory(remoteCrashDir, dumpDir)
|
2014-09-24 04:33:31 +04:00
|
|
|
|
|
|
|
logger = get_default_logger()
|
|
|
|
if logger is not None:
|
|
|
|
crashed = mozcrash.log_crashes(logger, dumpDir, symbolsPath, test=self.lastTestSeen)
|
|
|
|
else:
|
|
|
|
crashed = Automation.checkForCrashes(self, dumpDir, symbolsPath)
|
2013-03-21 17:19:34 +04:00
|
|
|
|
2013-02-08 20:32:07 +04:00
|
|
|
finally:
|
|
|
|
try:
|
|
|
|
shutil.rmtree(dumpDir)
|
|
|
|
except:
|
|
|
|
print "WARNING: unable to remove directory: %s" % dumpDir
|
2012-11-20 19:24:28 +04:00
|
|
|
return crashed
|
2011-10-06 18:51:03 +04:00
|
|
|
|
2010-06-24 13:32:01 +04:00
|
|
|
def buildCommandLine(self, app, debuggerInfo, profileDir, testURL, extraArgs):
|
|
|
|
# If remote profile is specified, use that instead
|
|
|
|
if (self._remoteProfile):
|
|
|
|
profileDir = self._remoteProfile
|
|
|
|
|
2012-08-14 18:41:11 +04:00
|
|
|
# Hack for robocop, if app & testURL == None and extraArgs contains the rest of the stuff, lets
|
2012-01-08 03:41:08 +04:00
|
|
|
# assume extraArgs is all we need
|
2015-05-30 03:18:07 +03:00
|
|
|
if app == "am" and extraArgs[0] in RemoteAutomation._specialAmCommands:
|
2012-01-08 03:41:08 +04:00
|
|
|
return app, extraArgs
|
2012-08-14 18:41:11 +04:00
|
|
|
|
2010-06-24 13:32:01 +04:00
|
|
|
cmd, args = Automation.buildCommandLine(self, app, debuggerInfo, profileDir, testURL, extraArgs)
|
|
|
|
# Remove -foreground if it exists, if it doesn't this just returns
|
|
|
|
try:
|
|
|
|
args.remove('-foreground')
|
|
|
|
except:
|
|
|
|
pass
|
|
|
|
#TODO: figure out which platform require NO_EM_RESTART
|
|
|
|
# return app, ['--environ:NO_EM_RESTART=1'] + args
|
|
|
|
return app, args
|
|
|
|
|
2012-02-28 21:20:56 +04:00
|
|
|
def Process(self, cmd, stdout = None, stderr = None, env = None, cwd = None):
|
2011-02-26 21:19:55 +03:00
|
|
|
if stdout == None or stdout == -1 or stdout == subprocess.PIPE:
|
2014-02-02 19:11:22 +04:00
|
|
|
stdout = self._remoteLog
|
2010-09-18 04:18:06 +04:00
|
|
|
|
2014-07-17 11:02:00 +04:00
|
|
|
return self.RProcess(self._devicemanager, cmd, stdout, stderr, env, cwd, self._appName,
|
|
|
|
**self._processArgs)
|
2010-06-24 13:32:01 +04:00
|
|
|
|
2012-08-14 18:41:11 +04:00
|
|
|
# be careful here as this inner class doesn't have access to outer class members
|
2010-06-24 13:32:01 +04:00
|
|
|
class RProcess(object):
|
|
|
|
# device manager process
|
|
|
|
dm = None
|
2014-07-17 11:02:00 +04:00
|
|
|
def __init__(self, dm, cmd, stdout=None, stderr=None, env=None, cwd=None, app=None,
|
2018-02-07 23:33:43 +03:00
|
|
|
messageLogger=None, counts=None):
|
2010-06-24 13:32:01 +04:00
|
|
|
self.dm = dm
|
2011-02-26 21:19:55 +03:00
|
|
|
self.stdoutlen = 0
|
2012-11-02 22:57:50 +04:00
|
|
|
self.lastTestSeen = "remoteautomation.py"
|
2011-02-24 22:45:42 +03:00
|
|
|
self.proc = dm.launchProcess(cmd, stdout, cwd, env, True)
|
2014-07-17 11:02:00 +04:00
|
|
|
self.messageLogger = messageLogger
|
2016-12-13 21:28:06 +03:00
|
|
|
self.utilityPath = None
|
2014-07-17 11:02:00 +04:00
|
|
|
|
2018-02-07 23:33:43 +03:00
|
|
|
self.counts = counts
|
|
|
|
if self.counts is not None:
|
|
|
|
self.counts['pass'] = 0
|
|
|
|
self.counts['fail'] = 0
|
|
|
|
self.counts['todo'] = 0
|
|
|
|
|
2011-02-24 22:45:42 +03:00
|
|
|
if (self.proc is None):
|
2014-02-02 19:11:22 +04:00
|
|
|
if cmd[0] == 'am':
|
|
|
|
self.proc = stdout
|
|
|
|
else:
|
|
|
|
raise Exception("unable to launch process")
|
|
|
|
self.procName = cmd[0].split('/')[-1]
|
2015-05-30 03:18:07 +03:00
|
|
|
if cmd[0] == 'am' and cmd[1] in RemoteAutomation._specialAmCommands:
|
2014-02-02 19:11:22 +04:00
|
|
|
self.procName = app
|
2010-06-24 13:32:01 +04:00
|
|
|
|
2015-05-04 19:32:46 +03:00
|
|
|
# Setting timeout at 1 hour since on a remote device this takes much longer.
|
2015-08-27 20:29:00 +03:00
|
|
|
# Temporarily increased to 90 minutes because no more chunks can be created.
|
|
|
|
self.timeout = 5400
|
2012-08-08 18:25:27 +04:00
|
|
|
# The benefit of the following sleep is unclear; it was formerly 15 seconds
|
|
|
|
time.sleep(1)
|
2010-06-24 13:32:01 +04:00
|
|
|
|
2014-07-17 11:02:00 +04:00
|
|
|
# Used to buffer log messages until we meet a line break
|
|
|
|
self.logBuffer = ""
|
|
|
|
|
2010-06-24 13:32:01 +04:00
|
|
|
@property
|
|
|
|
def pid(self):
|
Bug 795496 - Make mozdevice raise exceptions on error;r=ahal,jmaher
It turns out that relying on the user to check return codes for every
command was non-intuitive and resulted in many hard to trace bugs.
Now most functinos just return "None", and raise a DMError when there's an
exception. The exception to this are functions like dirExists, which now return
booleans, and throw exceptions on error. This is a fairly major refactor,
and also involved the following internal changes:
* Removed FileError and AgentError exceptions, replaced with DMError
(having to manage three different types of exceptions was confusing,
all the more so when we're raising them)
* Docstrings updated to remove references to return values where no
longer relevant
* pushFile no longer will create a directory to accomodate the file
if it doesn't exist (this makes it consistent with devicemanagerADB)
* dmSUT we validate the file, but assume that we get something back
from the agent, instead of falling back to manual validation in the
case that we didn't
* isDir and dirExists had the same intention, but different
implementations for dmSUT. Replaced the dmSUT impl of getDirectory
with that of isDir's (which was much simpler). Removed
isDir from devicemanager.py, since it wasn't used externally
* killProcess modified to check for process existence before running
(since the actual internal kill command will throw an exception
if the process doesn't exist)
In addition to all this, more unit tests have been added to test these
changes for devicemanagerSUT.
2012-10-04 19:28:07 +04:00
|
|
|
pid = self.dm.processExist(self.procName)
|
|
|
|
# HACK: we should probably be more sophisticated about monitoring
|
|
|
|
# running processes for the remote case, but for now we'll assume
|
|
|
|
# that this method can be called when nothing exists and it is not
|
|
|
|
# an error
|
|
|
|
if pid is None:
|
|
|
|
return 0
|
|
|
|
return pid
|
2012-08-14 18:41:11 +04:00
|
|
|
|
2014-07-17 11:02:00 +04:00
|
|
|
def read_stdout(self):
|
2016-02-05 23:44:20 +03:00
|
|
|
"""
|
|
|
|
Fetch the full remote log file using devicemanager, process them and
|
|
|
|
return whether there were any new log entries since the last call.
|
2012-11-02 22:57:50 +04:00
|
|
|
"""
|
2014-07-17 11:02:00 +04:00
|
|
|
if not self.dm.fileExists(self.proc):
|
2016-02-05 23:44:20 +03:00
|
|
|
return False
|
2014-07-17 11:02:00 +04:00
|
|
|
try:
|
|
|
|
newLogContent = self.dm.pullFile(self.proc, self.stdoutlen)
|
|
|
|
except DMError:
|
2016-02-05 23:44:20 +03:00
|
|
|
return False
|
2014-07-17 11:02:00 +04:00
|
|
|
if not newLogContent:
|
2016-02-05 23:44:20 +03:00
|
|
|
return False
|
2014-07-17 11:02:00 +04:00
|
|
|
|
|
|
|
self.stdoutlen += len(newLogContent)
|
|
|
|
|
|
|
|
if self.messageLogger is None:
|
2012-11-02 22:57:50 +04:00
|
|
|
testStartFilenames = re.findall(r"TEST-START \| ([^\s]*)", newLogContent)
|
|
|
|
if testStartFilenames:
|
|
|
|
self.lastTestSeen = testStartFilenames[-1]
|
2014-07-17 11:02:00 +04:00
|
|
|
print newLogContent
|
2016-02-05 23:44:20 +03:00
|
|
|
return True
|
2014-07-17 11:02:00 +04:00
|
|
|
|
|
|
|
self.logBuffer += newLogContent
|
|
|
|
lines = self.logBuffer.split('\n')
|
2016-03-09 22:38:13 +03:00
|
|
|
lines = [l for l in lines if l]
|
2016-02-05 23:44:20 +03:00
|
|
|
|
|
|
|
if lines:
|
2016-07-29 17:29:53 +03:00
|
|
|
if self.logBuffer.endswith('\n'):
|
|
|
|
# all lines are complete; no need to buffer
|
|
|
|
self.logBuffer = ""
|
|
|
|
else:
|
|
|
|
# keep the last (unfinished) line in the buffer
|
|
|
|
self.logBuffer = lines[-1]
|
|
|
|
del lines[-1]
|
2016-02-05 23:44:20 +03:00
|
|
|
|
2014-07-17 11:02:00 +04:00
|
|
|
if not lines:
|
2016-02-05 23:44:20 +03:00
|
|
|
return False
|
2014-07-17 11:02:00 +04:00
|
|
|
|
|
|
|
for line in lines:
|
|
|
|
# This passes the line to the logger (to be logged or buffered)
|
|
|
|
parsed_messages = self.messageLogger.write(line)
|
|
|
|
for message in parsed_messages:
|
2016-02-05 23:44:20 +03:00
|
|
|
if isinstance(message, dict) and message.get('action') == 'test_start':
|
2014-07-17 11:02:00 +04:00
|
|
|
self.lastTestSeen = message['test']
|
2018-02-07 23:33:43 +03:00
|
|
|
if isinstance(message, dict) and message.get('action') == 'log':
|
|
|
|
line = message['message'].strip()
|
|
|
|
if self.counts:
|
|
|
|
m = re.match(".*:\s*(\d*)", line)
|
|
|
|
if m:
|
|
|
|
try:
|
|
|
|
val = int(m.group(1))
|
|
|
|
if "Passed:" in line:
|
|
|
|
self.counts['pass'] += val
|
|
|
|
elif "Failed:" in line:
|
|
|
|
self.counts['fail'] += val
|
|
|
|
elif "Todo:" in line:
|
|
|
|
self.counts['todo'] += val
|
|
|
|
except:
|
|
|
|
pass
|
|
|
|
|
2016-02-05 23:44:20 +03:00
|
|
|
return True
|
2012-08-14 18:41:11 +04:00
|
|
|
|
2012-11-02 22:57:50 +04:00
|
|
|
@property
|
|
|
|
def getLastTestSeen(self):
|
|
|
|
return self.lastTestSeen
|
|
|
|
|
2014-02-02 19:11:23 +04:00
|
|
|
# Wait for the remote process to end (or for its activity to go to background).
|
|
|
|
# While waiting, periodically retrieve the process output and print it.
|
|
|
|
# If the process is still running after *timeout* seconds, return 1;
|
|
|
|
# If the process is still running but no output is received in *noOutputTimeout*
|
|
|
|
# seconds, return 2;
|
|
|
|
# Else, once the process exits/goes to background, return 0.
|
|
|
|
def wait(self, timeout = None, noOutputTimeout = None):
|
2010-06-24 13:32:01 +04:00
|
|
|
timer = 0
|
2014-02-02 19:11:23 +04:00
|
|
|
noOutputTimer = 0
|
2015-07-09 21:30:01 +03:00
|
|
|
interval = 10
|
2010-06-24 13:32:01 +04:00
|
|
|
if timeout == None:
|
|
|
|
timeout = self.timeout
|
2014-02-02 19:11:23 +04:00
|
|
|
status = 0
|
2015-07-09 21:30:01 +03:00
|
|
|
top = self.procName
|
|
|
|
slowLog = False
|
2017-09-22 20:32:38 +03:00
|
|
|
endTime = datetime.datetime.now() + datetime.timedelta(seconds = timeout)
|
2015-07-09 21:30:01 +03:00
|
|
|
while (top == self.procName):
|
|
|
|
# Get log updates on each interval, but if it is taking
|
|
|
|
# too long, only do it every 60 seconds
|
2017-01-07 02:35:29 +03:00
|
|
|
hasOutput = False
|
2015-07-09 21:30:01 +03:00
|
|
|
if (not slowLog) or (timer % 60 == 0):
|
|
|
|
startRead = datetime.datetime.now()
|
2016-02-05 23:44:20 +03:00
|
|
|
hasOutput = self.read_stdout()
|
2015-07-09 21:30:01 +03:00
|
|
|
if (datetime.datetime.now() - startRead) > datetime.timedelta(seconds=5):
|
|
|
|
slowLog = True
|
2016-02-05 23:44:20 +03:00
|
|
|
if hasOutput:
|
2014-02-02 19:11:23 +04:00
|
|
|
noOutputTimer = 0
|
2018-02-07 23:33:44 +03:00
|
|
|
if self.counts and 'pass' in self.counts and self.counts['pass'] > 0:
|
|
|
|
interval = 0.5
|
2010-06-24 13:32:01 +04:00
|
|
|
time.sleep(interval)
|
|
|
|
timer += interval
|
2014-02-02 19:11:23 +04:00
|
|
|
noOutputTimer += interval
|
2017-09-22 20:32:38 +03:00
|
|
|
if datetime.datetime.now() > endTime:
|
2014-02-02 19:11:23 +04:00
|
|
|
status = 1
|
|
|
|
break
|
|
|
|
if (noOutputTimeout and noOutputTimer > noOutputTimeout):
|
|
|
|
status = 2
|
2010-06-24 13:32:01 +04:00
|
|
|
break
|
2017-01-07 02:35:29 +03:00
|
|
|
if not hasOutput:
|
|
|
|
top = self.dm.getTopActivity()
|
2017-11-01 00:58:31 +03:00
|
|
|
if top == "":
|
|
|
|
print "Failed to get top activity, retrying, once..."
|
|
|
|
top = self.dm.getTopActivity()
|
2012-11-02 22:57:50 +04:00
|
|
|
# Flush anything added to stdout during the sleep
|
2014-07-17 11:02:00 +04:00
|
|
|
self.read_stdout()
|
2014-02-02 19:11:23 +04:00
|
|
|
return status
|
2012-08-14 18:41:11 +04:00
|
|
|
|
2014-07-04 08:11:41 +04:00
|
|
|
def kill(self, stagedShutdown = False):
|
2016-12-13 21:28:06 +03:00
|
|
|
if self.utilityPath:
|
|
|
|
# Take a screenshot to capture the screen state just before
|
|
|
|
# the application is killed. There are on-device screenshot
|
|
|
|
# options but they rarely work well with Firefox on the
|
|
|
|
# Android emulator. dump_screen provides an effective
|
|
|
|
# screenshot of the emulator and its host desktop.
|
|
|
|
dump_screen(self.utilityPath, get_default_logger())
|
2014-07-04 08:11:41 +04:00
|
|
|
if stagedShutdown:
|
|
|
|
# Trigger an ANR report with "kill -3" (SIGQUIT)
|
|
|
|
self.dm.killProcess(self.procName, 3)
|
|
|
|
time.sleep(3)
|
|
|
|
# Trigger a breakpad dump with "kill -6" (SIGABRT)
|
|
|
|
self.dm.killProcess(self.procName, 6)
|
|
|
|
# Wait for process to end
|
|
|
|
retries = 0
|
|
|
|
while retries < 3:
|
|
|
|
pid = self.dm.processExist(self.procName)
|
|
|
|
if pid and pid > 0:
|
|
|
|
print "%s still alive after SIGABRT: waiting..." % self.procName
|
|
|
|
time.sleep(5)
|
|
|
|
else:
|
|
|
|
return
|
|
|
|
retries += 1
|
|
|
|
self.dm.killProcess(self.procName, 9)
|
|
|
|
pid = self.dm.processExist(self.procName)
|
|
|
|
if pid and pid > 0:
|
|
|
|
self.dm.killProcess(self.procName)
|
|
|
|
else:
|
|
|
|
self.dm.killProcess(self.procName)
|