Merge changes If7c8d38f,I7117dd19,Iaa5006e3,I3a568361,I37df06e4, ...

* changes:
  adb: report connection status when we're unauthorized.
  adb: disable test_device.FileOperationsTest.test_pull_symlink_dir.
  adb: fix test_device.FileOperationsTest.test_push_empty
  adb: switch test_adb.py over to double quotes.
  adb: make test_adb.py work on windows.
  adb: switch test_adb.py to python3.
This commit is contained in:
Josh Gao 2018-08-09 22:12:46 +00:00 committed by Gerrit Code Review
commit 18eae78c09
7 changed files with 151 additions and 133 deletions

View file

@ -455,17 +455,14 @@ python_test_host {
srcs: [
"test_adb.py",
],
libs: [
"adb_py",
],
test_config: "adb_integration_test_adb.xml",
test_suites: ["general-tests"],
version: {
py2: {
enabled: true,
enabled: false,
},
py3: {
enabled: false,
enabled: true,
},
},
}

View file

@ -465,6 +465,7 @@ void send_auth_response(const char* token, size_t token_size, atransport* t) {
if (key == nullptr) {
// No more private keys to try, send the public key.
t->SetConnectionState(kCsUnauthorized);
t->SetConnectionEstablished(true);
send_auth_publickey(t);
return;
}

227
adb/test_adb.py Normal file → Executable file
View file

@ -1,4 +1,4 @@
#!/usr/bin/env python
#!/usr/bin/env python3
#
# Copyright (C) 2015 The Android Open Source Project
#
@ -19,9 +19,7 @@
This differs from things in test_device.py in that there is no API for these
things. Most of these tests involve specific error messages or the help text.
"""
from __future__ import print_function
import binascii
import contextlib
import os
import random
@ -32,8 +30,6 @@ import subprocess
import threading
import unittest
import adb
@contextlib.contextmanager
def fake_adbd(protocol=socket.AF_INET, port=0):
@ -42,61 +38,61 @@ def fake_adbd(protocol=socket.AF_INET, port=0):
serversock = socket.socket(protocol, socket.SOCK_STREAM)
serversock.setsockopt(socket.SOL_SOCKET, socket.SO_REUSEADDR, 1)
if protocol == socket.AF_INET:
serversock.bind(('127.0.0.1', port))
serversock.bind(("127.0.0.1", port))
else:
serversock.bind(('::1', port))
serversock.bind(("::1", port))
serversock.listen(1)
# A pipe that is used to signal the thread that it should terminate.
readpipe, writepipe = os.pipe()
readsock, writesock = socket.socketpair()
def _adb_packet(command, arg0, arg1, data):
bin_command = struct.unpack('I', command)[0]
buf = struct.pack('IIIIII', bin_command, arg0, arg1, len(data), 0,
def _adb_packet(command: bytes, arg0: int, arg1: int, data: bytes) -> bytes:
bin_command = struct.unpack("I", command)[0]
buf = struct.pack("IIIIII", bin_command, arg0, arg1, len(data), 0,
bin_command ^ 0xffffffff)
buf += data
return buf
def _handle():
rlist = [readpipe, serversock]
cnxn_sent = {}
while True:
read_ready, _, _ = select.select(rlist, [], [])
for ready in read_ready:
if ready == readpipe:
# Closure pipe
os.close(ready)
serversock.shutdown(socket.SHUT_RDWR)
serversock.close()
return
elif ready == serversock:
# Server socket
conn, _ = ready.accept()
rlist.append(conn)
else:
# Client socket
data = ready.recv(1024)
if not data or data.startswith('OPEN'):
def _handle(sock):
with contextlib.closing(sock) as serversock:
rlist = [readsock, serversock]
cnxn_sent = {}
while True:
read_ready, _, _ = select.select(rlist, [], [])
for ready in read_ready:
if ready == readsock:
# Closure pipe
for f in rlist:
f.close()
return
elif ready == serversock:
# Server socket
conn, _ = ready.accept()
rlist.append(conn)
else:
# Client socket
data = ready.recv(1024)
if not data or data.startswith(b"OPEN"):
if ready in cnxn_sent:
del cnxn_sent[ready]
ready.shutdown(socket.SHUT_RDWR)
ready.close()
rlist.remove(ready)
continue
if ready in cnxn_sent:
del cnxn_sent[ready]
ready.shutdown(socket.SHUT_RDWR)
ready.close()
rlist.remove(ready)
continue
if ready in cnxn_sent:
continue
cnxn_sent[ready] = True
ready.sendall(_adb_packet('CNXN', 0x01000001, 1024 * 1024,
'device::ro.product.name=fakeadb'))
continue
cnxn_sent[ready] = True
ready.sendall(_adb_packet(b"CNXN", 0x01000001, 1024 * 1024,
b"device::ro.product.name=fakeadb"))
port = serversock.getsockname()[1]
server_thread = threading.Thread(target=_handle)
server_thread = threading.Thread(target=_handle, args=(serversock,))
server_thread.start()
try:
yield port
finally:
os.close(writepipe)
writesock.close()
server_thread.join()
@ -107,14 +103,15 @@ def adb_connect(unittest, serial):
This automatically disconnects when done with the connection.
"""
output = subprocess.check_output(['adb', 'connect', serial])
unittest.assertEqual(output.strip(), 'connected to {}'.format(serial))
output = subprocess.check_output(["adb", "connect", serial])
unittest.assertEqual(output.strip(),
"connected to {}".format(serial).encode("utf8"))
try:
yield
finally:
# Perform best-effort disconnection. Discard the output.
subprocess.Popen(['adb', 'disconnect', serial],
subprocess.Popen(["adb", "disconnect", serial],
stdout=subprocess.PIPE,
stderr=subprocess.PIPE).communicate()
@ -123,21 +120,22 @@ def adb_connect(unittest, serial):
def adb_server():
"""Context manager for an ADB server.
This creates an ADB server and returns the port it's listening on.
This creates an ADB server and returns the port it"s listening on.
"""
port = 5038
# Kill any existing server on this non-default port.
subprocess.check_output(['adb', '-P', str(port), 'kill-server'],
subprocess.check_output(["adb", "-P", str(port), "kill-server"],
stderr=subprocess.STDOUT)
read_pipe, write_pipe = os.pipe()
proc = subprocess.Popen(['adb', '-L', 'tcp:localhost:{}'.format(port),
'fork-server', 'server',
'--reply-fd', str(write_pipe)])
os.set_inheritable(write_pipe, True)
proc = subprocess.Popen(["adb", "-L", "tcp:localhost:{}".format(port),
"fork-server", "server",
"--reply-fd", str(write_pipe)], close_fds=False)
try:
os.close(write_pipe)
greeting = os.read(read_pipe, 1024)
assert greeting == 'OK\n', repr(greeting)
assert greeting == b"OK\n", repr(greeting)
yield port
finally:
proc.terminate()
@ -150,35 +148,37 @@ class CommandlineTest(unittest.TestCase):
def test_help(self):
"""Make sure we get _something_ out of help."""
out = subprocess.check_output(
['adb', 'help'], stderr=subprocess.STDOUT)
["adb", "help"], stderr=subprocess.STDOUT)
self.assertGreater(len(out), 0)
def test_version(self):
"""Get a version number out of the output of adb."""
lines = subprocess.check_output(['adb', 'version']).splitlines()
lines = subprocess.check_output(["adb", "version"]).splitlines()
version_line = lines[0]
self.assertRegexpMatches(
version_line, r'^Android Debug Bridge version \d+\.\d+\.\d+$')
self.assertRegex(
version_line, rb"^Android Debug Bridge version \d+\.\d+\.\d+$")
if len(lines) == 2:
# Newer versions of ADB have a second line of output for the
# version that includes a specific revision (git SHA).
revision_line = lines[1]
self.assertRegexpMatches(
revision_line, r'^Revision [0-9a-f]{12}-android$')
self.assertRegex(
revision_line, rb"^Revision [0-9a-f]{12}-android$")
def test_tcpip_error_messages(self):
"""Make sure 'adb tcpip' parsing is sane."""
proc = subprocess.Popen(['adb', 'tcpip'], stdout=subprocess.PIPE,
proc = subprocess.Popen(["adb", "tcpip"],
stdout=subprocess.PIPE,
stderr=subprocess.STDOUT)
out, _ = proc.communicate()
self.assertEqual(1, proc.returncode)
self.assertIn('requires an argument', out)
self.assertIn(b"requires an argument", out)
proc = subprocess.Popen(['adb', 'tcpip', 'foo'], stdout=subprocess.PIPE,
proc = subprocess.Popen(["adb", "tcpip", "foo"],
stdout=subprocess.PIPE,
stderr=subprocess.STDOUT)
out, _ = proc.communicate()
self.assertEqual(1, proc.returncode)
self.assertIn('invalid port', out)
self.assertIn(b"invalid port", out)
class ServerTest(unittest.TestCase):
@ -214,12 +214,12 @@ class ServerTest(unittest.TestCase):
port = 5038
# Kill any existing server on this non-default port.
subprocess.check_output(['adb', '-P', str(port), 'kill-server'],
subprocess.check_output(["adb", "-P", str(port), "kill-server"],
stderr=subprocess.STDOUT)
try:
# Run the adb client and have it start the adb server.
proc = subprocess.Popen(['adb', '-P', str(port), 'start-server'],
proc = subprocess.Popen(["adb", "-P", str(port), "start-server"],
stdin=subprocess.PIPE,
stdout=subprocess.PIPE,
stderr=subprocess.PIPE)
@ -229,14 +229,12 @@ class ServerTest(unittest.TestCase):
stdout_thread = threading.Thread(
target=ServerTest._read_pipe_and_set_event,
args=(proc.stdout, stdout_event))
stdout_thread.daemon = True
stdout_thread.start()
stderr_event = threading.Event()
stderr_thread = threading.Thread(
target=ServerTest._read_pipe_and_set_event,
args=(proc.stderr, stderr_event))
stderr_thread.daemon = True
stderr_thread.start()
# Wait for the adb client to finish. Once that has occurred, if
@ -250,7 +248,8 @@ class ServerTest(unittest.TestCase):
# probably letting the adb server inherit stdin which would be
# wrong.
with self.assertRaises(IOError):
proc.stdin.write('x')
proc.stdin.write(b"x")
proc.stdin.flush()
# Wait a few seconds for stdout/stderr to be closed (in the success
# case, this won't wait at all). If there is a timeout, that means
@ -259,9 +258,11 @@ class ServerTest(unittest.TestCase):
# inherit stdout/stderr which would be wrong.
self.assertTrue(stdout_event.wait(5), "adb stdout not closed")
self.assertTrue(stderr_event.wait(5), "adb stderr not closed")
stdout_thread.join()
stderr_thread.join()
finally:
# If we started a server, kill it.
subprocess.check_output(['adb', '-P', str(port), 'kill-server'],
subprocess.check_output(["adb", "-P", str(port), "kill-server"],
stderr=subprocess.STDOUT)
@ -271,7 +272,7 @@ class EmulatorTest(unittest.TestCase):
def _reset_socket_on_close(self, sock):
"""Use SO_LINGER to cause TCP RST segment to be sent on socket close."""
# The linger structure is two shorts on Windows, but two ints on Unix.
linger_format = 'hh' if os.name == 'nt' else 'ii'
linger_format = "hh" if os.name == "nt" else "ii"
l_onoff = 1
l_linger = 0
@ -292,33 +293,33 @@ class EmulatorTest(unittest.TestCase):
# Use SO_REUSEADDR so subsequent runs of the test can grab the port
# even if it is in TIME_WAIT.
listener.setsockopt(socket.SOL_SOCKET, socket.SO_REUSEADDR, 1)
listener.bind(('127.0.0.1', 0))
listener.bind(("127.0.0.1", 0))
listener.listen(4)
port = listener.getsockname()[1]
# Now that listening has started, start adb emu kill, telling it to
# connect to our mock emulator.
proc = subprocess.Popen(
['adb', '-s', 'emulator-' + str(port), 'emu', 'kill'],
["adb", "-s", "emulator-" + str(port), "emu", "kill"],
stderr=subprocess.STDOUT)
accepted_connection, addr = listener.accept()
with contextlib.closing(accepted_connection) as conn:
# If WSAECONNABORTED (10053) is raised by any socket calls,
# then adb probably isn't reading the data that we sent it.
conn.sendall('Android Console: type \'help\' for a list ' +
'of commands\r\n')
conn.sendall('OK\r\n')
conn.sendall(("Android Console: type 'help' for a list "
"of commands\r\n").encode("utf8"))
conn.sendall(b"OK\r\n")
with contextlib.closing(conn.makefile()) as connf:
line = connf.readline()
if line.startswith('auth'):
if line.startswith("auth"):
# Ignore the first auth line.
line = connf.readline()
self.assertEqual('kill\n', line)
self.assertEqual('quit\n', connf.readline())
self.assertEqual("kill\n", line)
self.assertEqual("quit\n", connf.readline())
conn.sendall('OK: killing emulator, bye bye\r\n')
conn.sendall(b"OK: killing emulator, bye bye\r\n")
# Use SO_LINGER to send TCP RST segment to test whether adb
# ignores WSAECONNRESET on Windows. This happens with the
@ -342,31 +343,31 @@ class EmulatorTest(unittest.TestCase):
"""
with adb_server() as server_port:
with fake_adbd() as port:
serial = 'emulator-{}'.format(port - 1)
serial = "emulator-{}".format(port - 1)
# Ensure that the emulator is not there.
try:
subprocess.check_output(['adb', '-P', str(server_port),
'-s', serial, 'get-state'],
subprocess.check_output(["adb", "-P", str(server_port),
"-s", serial, "get-state"],
stderr=subprocess.STDOUT)
self.fail('Device should not be available')
self.fail("Device should not be available")
except subprocess.CalledProcessError as err:
self.assertEqual(
err.output.strip(),
'error: device \'{}\' not found'.format(serial))
"error: device '{}' not found".format(serial).encode("utf8"))
# Let the ADB server know that the emulator has started.
with contextlib.closing(
socket.socket(socket.AF_INET, socket.SOCK_STREAM)) as sock:
sock.connect(('localhost', server_port))
command = 'host:emulator:{}'.format(port)
sock.sendall('%04x%s' % (len(command), command))
socket.socket(socket.AF_INET, socket.SOCK_STREAM)) as sock:
sock.connect(("localhost", server_port))
command = "host:emulator:{}".format(port).encode("utf8")
sock.sendall(b"%04x%s" % (len(command), command))
# Ensure the emulator is there.
subprocess.check_call(['adb', '-P', str(server_port),
'-s', serial, 'wait-for-device'])
output = subprocess.check_output(['adb', '-P', str(server_port),
'-s', serial, 'get-state'])
self.assertEqual(output.strip(), 'device')
subprocess.check_call(["adb", "-P", str(server_port),
"-s", serial, "wait-for-device"])
output = subprocess.check_output(["adb", "-P", str(server_port),
"-s", serial, "get-state"])
self.assertEqual(output.strip(), b"device")
class ConnectionTest(unittest.TestCase):
@ -380,7 +381,7 @@ class ConnectionTest(unittest.TestCase):
for protocol in (socket.AF_INET, socket.AF_INET6):
try:
with fake_adbd(protocol=protocol) as port:
serial = 'localhost:{}'.format(port)
serial = "localhost:{}".format(port)
with adb_connect(self, serial):
pass
except socket.error:
@ -391,49 +392,51 @@ class ConnectionTest(unittest.TestCase):
"""Ensure that an already-connected device stays connected."""
with fake_adbd() as port:
serial = 'localhost:{}'.format(port)
serial = "localhost:{}".format(port)
with adb_connect(self, serial):
# b/31250450: this always returns 0 but probably shouldn't.
output = subprocess.check_output(['adb', 'connect', serial])
output = subprocess.check_output(["adb", "connect", serial])
self.assertEqual(
output.strip(), 'already connected to {}'.format(serial))
output.strip(),
"already connected to {}".format(serial).encode("utf8"))
def test_reconnect(self):
"""Ensure that a disconnected device reconnects."""
with fake_adbd() as port:
serial = 'localhost:{}'.format(port)
serial = "localhost:{}".format(port)
with adb_connect(self, serial):
output = subprocess.check_output(['adb', '-s', serial,
'get-state'])
self.assertEqual(output.strip(), 'device')
output = subprocess.check_output(["adb", "-s", serial,
"get-state"])
self.assertEqual(output.strip(), b"device")
# This will fail.
proc = subprocess.Popen(['adb', '-s', serial, 'shell', 'true'],
proc = subprocess.Popen(["adb", "-s", serial, "shell", "true"],
stdout=subprocess.PIPE,
stderr=subprocess.STDOUT)
output, _ = proc.communicate()
self.assertEqual(output.strip(), 'error: closed')
self.assertEqual(output.strip(), b"error: closed")
subprocess.check_call(['adb', '-s', serial, 'wait-for-device'])
subprocess.check_call(["adb", "-s", serial, "wait-for-device"])
output = subprocess.check_output(['adb', '-s', serial,
'get-state'])
self.assertEqual(output.strip(), 'device')
output = subprocess.check_output(["adb", "-s", serial,
"get-state"])
self.assertEqual(output.strip(), b"device")
# Once we explicitly kick a device, it won't attempt to
# reconnect.
output = subprocess.check_output(['adb', 'disconnect', serial])
output = subprocess.check_output(["adb", "disconnect", serial])
self.assertEqual(
output.strip(), 'disconnected {}'.format(serial))
output.strip(),
"disconnected {}".format(serial).encode("utf8"))
try:
subprocess.check_output(['adb', '-s', serial, 'get-state'],
subprocess.check_output(["adb", "-s", serial, "get-state"],
stderr=subprocess.STDOUT)
self.fail('Device should not be available')
self.fail("Device should not be available")
except subprocess.CalledProcessError as err:
self.assertEqual(
err.output.strip(),
'error: device \'{}\' not found'.format(serial))
"error: device '{}' not found".format(serial).encode("utf8"))
def main():
@ -442,5 +445,5 @@ def main():
unittest.main(verbosity=3)
if __name__ == '__main__':
if __name__ == "__main__":
main()

View file

@ -762,9 +762,10 @@ class FileOperationsTest(DeviceTest):
os.chmod(host_dir, 0o700)
# Create an empty directory.
os.mkdir(os.path.join(host_dir, 'empty'))
empty_dir_path = os.path.join(host_dir, 'empty')
os.mkdir(empty_dir_path);
self.device.push(host_dir, self.DEVICE_TEMP_DIR)
self.device.push(empty_dir_path, self.DEVICE_TEMP_DIR)
test_empty_cmd = ['[', '-d',
os.path.join(self.DEVICE_TEMP_DIR, 'empty')]
@ -1032,7 +1033,8 @@ class FileOperationsTest(DeviceTest):
if host_dir is not None:
shutil.rmtree(host_dir)
def test_pull_symlink_dir(self):
# selinux prevents adbd from accessing symlinks on /data/local/tmp.
def disabled_test_pull_symlink_dir(self):
"""Pull a symlink to a directory of symlinks to files."""
try:
host_dir = tempfile.mkdtemp()

View file

@ -1190,14 +1190,15 @@ void close_usb_devices() {
}
#endif // ADB_HOST
int register_socket_transport(unique_fd s, std::string serial, int port, int local,
atransport::ReconnectCallback reconnect) {
bool register_socket_transport(unique_fd s, std::string serial, int port, int local,
atransport::ReconnectCallback reconnect, int* error) {
atransport* t = new atransport(std::move(reconnect), kCsOffline);
D("transport: %s init'ing for socket %d, on port %d", serial.c_str(), s.get(), port);
if (init_socket_transport(t, std::move(s), port, local) < 0) {
delete t;
return -1;
if (error) *error = errno;
return false;
}
std::unique_lock<std::recursive_mutex> lock(transport_lock);
@ -1206,7 +1207,8 @@ int register_socket_transport(unique_fd s, std::string serial, int port, int loc
VLOG(TRANSPORT) << "socket transport " << transport->serial
<< " is already in pending_list and fails to register";
delete t;
return -EALREADY;
if (error) *error = EALREADY;
return false;
}
}
@ -1215,7 +1217,8 @@ int register_socket_transport(unique_fd s, std::string serial, int port, int loc
VLOG(TRANSPORT) << "socket transport " << transport->serial
<< " is already in transport_list and fails to register";
delete t;
return -EALREADY;
if (error) *error = EALREADY;
return false;
}
}
@ -1229,10 +1232,20 @@ int register_socket_transport(unique_fd s, std::string serial, int port, int loc
if (local == 1) {
// Do not wait for emulator transports.
return 0;
return true;
}
return waitable->WaitForConnection(std::chrono::seconds(10)) ? 0 : -1;
if (!waitable->WaitForConnection(std::chrono::seconds(10))) {
if (error) *error = ETIMEDOUT;
return false;
}
if (t->GetConnectionState() == kCsUnauthorized) {
if (error) *error = EPERM;
return false;
}
return true;
}
#if ADB_HOST

View file

@ -364,8 +364,8 @@ void register_usb_transport(usb_handle* h, const char* serial,
void connect_device(const std::string& address, std::string* response);
/* cause new transports to be init'd and added to the list */
int register_socket_transport(unique_fd s, std::string serial, int port, int local,
atransport::ReconnectCallback reconnect);
bool register_socket_transport(unique_fd s, std::string serial, int port, int local,
atransport::ReconnectCallback reconnect, int* error = nullptr);
// This should only be used for transports with connection_state == kCsNoPerm.
void unregister_usb_transport(usb_handle* usb);

View file

@ -125,10 +125,12 @@ void connect_device(const std::string& address, std::string* response) {
return init_socket_transport(t, std::move(fd), port, 0) >= 0;
};
int ret = register_socket_transport(std::move(fd), serial, port, 0, std::move(reconnect));
if (ret < 0) {
if (ret == -EALREADY) {
int error;
if (!register_socket_transport(std::move(fd), serial, port, 0, std::move(reconnect), &error)) {
if (error == EALREADY) {
*response = android::base::StringPrintf("already connected to %s", serial.c_str());
} else if (error == EPERM) {
*response = android::base::StringPrintf("failed to authenticate to %s", serial.c_str());
} else {
*response = android::base::StringPrintf("failed to connect to %s", serial.c_str());
}
@ -162,7 +164,7 @@ int local_connect_arbitrary_ports(int console_port, int adb_port, std::string* e
disable_tcp_nagle(fd.get());
std::string serial = getEmulatorSerialString(console_port);
if (register_socket_transport(std::move(fd), std::move(serial), adb_port, 1,
[](atransport*) { return false; }) == 0) {
[](atransport*) { return false; })) {
return 0;
}
}