85d4789719
This test actually belongs with the adb python wrapper, since it's not affected by changes to adb itself. Bug: http://b/64260633 Test: python test_device.py Change-Id: I58e5dff760f35923f8dbbdc7de6ffd75254880dc
1276 lines
48 KiB
Python
1276 lines
48 KiB
Python
#!/usr/bin/env python
|
|
# -*- coding: utf-8 -*-
|
|
#
|
|
# Copyright (C) 2015 The Android Open Source Project
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
# you may not use this file except in compliance with the License.
|
|
# You may obtain a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
# See the License for the specific language governing permissions and
|
|
# limitations under the License.
|
|
#
|
|
from __future__ import print_function
|
|
|
|
import contextlib
|
|
import hashlib
|
|
import os
|
|
import posixpath
|
|
import random
|
|
import re
|
|
import shlex
|
|
import shutil
|
|
import signal
|
|
import socket
|
|
import string
|
|
import subprocess
|
|
import sys
|
|
import tempfile
|
|
import time
|
|
import unittest
|
|
|
|
import adb
|
|
|
|
def requires_root(func):
|
|
def wrapper(self, *args):
|
|
if self.device.get_prop('ro.debuggable') != '1':
|
|
raise unittest.SkipTest('requires rootable build')
|
|
|
|
was_root = self.device.shell(['id', '-un'])[0].strip() == 'root'
|
|
if not was_root:
|
|
self.device.root()
|
|
self.device.wait()
|
|
|
|
try:
|
|
func(self, *args)
|
|
finally:
|
|
if not was_root:
|
|
self.device.unroot()
|
|
self.device.wait()
|
|
|
|
return wrapper
|
|
|
|
|
|
def requires_non_root(func):
|
|
def wrapper(self, *args):
|
|
was_root = self.device.shell(['id', '-un'])[0].strip() == 'root'
|
|
if was_root:
|
|
self.device.unroot()
|
|
self.device.wait()
|
|
|
|
try:
|
|
func(self, *args)
|
|
finally:
|
|
if was_root:
|
|
self.device.root()
|
|
self.device.wait()
|
|
|
|
return wrapper
|
|
|
|
|
|
class DeviceTest(unittest.TestCase):
|
|
def setUp(self):
|
|
self.device = adb.get_device()
|
|
|
|
|
|
class ForwardReverseTest(DeviceTest):
|
|
def _test_no_rebind(self, description, direction_list, direction,
|
|
direction_no_rebind, direction_remove_all):
|
|
msg = direction_list()
|
|
self.assertEqual('', msg.strip(),
|
|
description + ' list must be empty to run this test.')
|
|
|
|
# Use --no-rebind with no existing binding
|
|
direction_no_rebind('tcp:5566', 'tcp:6655')
|
|
msg = direction_list()
|
|
self.assertTrue(re.search(r'tcp:5566.+tcp:6655', msg))
|
|
|
|
# Use --no-rebind with existing binding
|
|
with self.assertRaises(subprocess.CalledProcessError):
|
|
direction_no_rebind('tcp:5566', 'tcp:6677')
|
|
msg = direction_list()
|
|
self.assertFalse(re.search(r'tcp:5566.+tcp:6677', msg))
|
|
self.assertTrue(re.search(r'tcp:5566.+tcp:6655', msg))
|
|
|
|
# Use the absence of --no-rebind with existing binding
|
|
direction('tcp:5566', 'tcp:6677')
|
|
msg = direction_list()
|
|
self.assertFalse(re.search(r'tcp:5566.+tcp:6655', msg))
|
|
self.assertTrue(re.search(r'tcp:5566.+tcp:6677', msg))
|
|
|
|
direction_remove_all()
|
|
msg = direction_list()
|
|
self.assertEqual('', msg.strip())
|
|
|
|
def test_forward_no_rebind(self):
|
|
self._test_no_rebind('forward', self.device.forward_list,
|
|
self.device.forward, self.device.forward_no_rebind,
|
|
self.device.forward_remove_all)
|
|
|
|
def test_reverse_no_rebind(self):
|
|
self._test_no_rebind('reverse', self.device.reverse_list,
|
|
self.device.reverse, self.device.reverse_no_rebind,
|
|
self.device.reverse_remove_all)
|
|
|
|
def test_forward(self):
|
|
msg = self.device.forward_list()
|
|
self.assertEqual('', msg.strip(),
|
|
'Forwarding list must be empty to run this test.')
|
|
self.device.forward('tcp:5566', 'tcp:6655')
|
|
msg = self.device.forward_list()
|
|
self.assertTrue(re.search(r'tcp:5566.+tcp:6655', msg))
|
|
self.device.forward('tcp:7788', 'tcp:8877')
|
|
msg = self.device.forward_list()
|
|
self.assertTrue(re.search(r'tcp:5566.+tcp:6655', msg))
|
|
self.assertTrue(re.search(r'tcp:7788.+tcp:8877', msg))
|
|
self.device.forward_remove('tcp:5566')
|
|
msg = self.device.forward_list()
|
|
self.assertFalse(re.search(r'tcp:5566.+tcp:6655', msg))
|
|
self.assertTrue(re.search(r'tcp:7788.+tcp:8877', msg))
|
|
self.device.forward_remove_all()
|
|
msg = self.device.forward_list()
|
|
self.assertEqual('', msg.strip())
|
|
|
|
def test_forward_tcp_port_0(self):
|
|
self.assertEqual('', self.device.forward_list().strip(),
|
|
'Forwarding list must be empty to run this test.')
|
|
|
|
try:
|
|
# If resolving TCP port 0 is supported, `adb forward` will print
|
|
# the actual port number.
|
|
port = self.device.forward('tcp:0', 'tcp:8888').strip()
|
|
if not port:
|
|
raise unittest.SkipTest('Forwarding tcp:0 is not available.')
|
|
|
|
self.assertTrue(re.search(r'tcp:{}.+tcp:8888'.format(port),
|
|
self.device.forward_list()))
|
|
finally:
|
|
self.device.forward_remove_all()
|
|
|
|
def test_reverse(self):
|
|
msg = self.device.reverse_list()
|
|
self.assertEqual('', msg.strip(),
|
|
'Reverse forwarding list must be empty to run this test.')
|
|
self.device.reverse('tcp:5566', 'tcp:6655')
|
|
msg = self.device.reverse_list()
|
|
self.assertTrue(re.search(r'tcp:5566.+tcp:6655', msg))
|
|
self.device.reverse('tcp:7788', 'tcp:8877')
|
|
msg = self.device.reverse_list()
|
|
self.assertTrue(re.search(r'tcp:5566.+tcp:6655', msg))
|
|
self.assertTrue(re.search(r'tcp:7788.+tcp:8877', msg))
|
|
self.device.reverse_remove('tcp:5566')
|
|
msg = self.device.reverse_list()
|
|
self.assertFalse(re.search(r'tcp:5566.+tcp:6655', msg))
|
|
self.assertTrue(re.search(r'tcp:7788.+tcp:8877', msg))
|
|
self.device.reverse_remove_all()
|
|
msg = self.device.reverse_list()
|
|
self.assertEqual('', msg.strip())
|
|
|
|
def test_reverse_tcp_port_0(self):
|
|
self.assertEqual('', self.device.reverse_list().strip(),
|
|
'Reverse list must be empty to run this test.')
|
|
|
|
try:
|
|
# If resolving TCP port 0 is supported, `adb reverse` will print
|
|
# the actual port number.
|
|
port = self.device.reverse('tcp:0', 'tcp:8888').strip()
|
|
if not port:
|
|
raise unittest.SkipTest('Reversing tcp:0 is not available.')
|
|
|
|
self.assertTrue(re.search(r'tcp:{}.+tcp:8888'.format(port),
|
|
self.device.reverse_list()))
|
|
finally:
|
|
self.device.reverse_remove_all()
|
|
|
|
# Note: If you run this test when adb connect'd to a physical device over
|
|
# TCP, it will fail in adb reverse due to https://code.google.com/p/android/issues/detail?id=189821
|
|
def test_forward_reverse_echo(self):
|
|
"""Send data through adb forward and read it back via adb reverse"""
|
|
forward_port = 12345
|
|
reverse_port = forward_port + 1
|
|
forward_spec = 'tcp:' + str(forward_port)
|
|
reverse_spec = 'tcp:' + str(reverse_port)
|
|
forward_setup = False
|
|
reverse_setup = False
|
|
|
|
try:
|
|
# listen on localhost:forward_port, connect to remote:forward_port
|
|
self.device.forward(forward_spec, forward_spec)
|
|
forward_setup = True
|
|
# listen on remote:forward_port, connect to localhost:reverse_port
|
|
self.device.reverse(forward_spec, reverse_spec)
|
|
reverse_setup = True
|
|
|
|
listener = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
|
|
with contextlib.closing(listener):
|
|
# Use SO_REUSEADDR so that subsequent runs of the test can grab
|
|
# the port even if it is in TIME_WAIT.
|
|
listener.setsockopt(socket.SOL_SOCKET, socket.SO_REUSEADDR, 1)
|
|
|
|
# Listen on localhost:reverse_port before connecting to
|
|
# localhost:forward_port because that will cause adb to connect
|
|
# back to localhost:reverse_port.
|
|
listener.bind(('127.0.0.1', reverse_port))
|
|
listener.listen(4)
|
|
|
|
client = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
|
|
with contextlib.closing(client):
|
|
# Connect to the listener.
|
|
client.connect(('127.0.0.1', forward_port))
|
|
|
|
# Accept the client connection.
|
|
accepted_connection, addr = listener.accept()
|
|
with contextlib.closing(accepted_connection) as server:
|
|
data = 'hello'
|
|
|
|
# Send data into the port setup by adb forward.
|
|
client.sendall(data)
|
|
# Explicitly close() so that server gets EOF.
|
|
client.close()
|
|
|
|
# Verify that the data came back via adb reverse.
|
|
self.assertEqual(data, server.makefile().read())
|
|
finally:
|
|
if reverse_setup:
|
|
self.device.reverse_remove(forward_spec)
|
|
if forward_setup:
|
|
self.device.forward_remove(forward_spec)
|
|
|
|
|
|
class ShellTest(DeviceTest):
|
|
def _interactive_shell(self, shell_args, input):
|
|
"""Runs an interactive adb shell.
|
|
|
|
Args:
|
|
shell_args: List of string arguments to `adb shell`.
|
|
input: String input to send to the interactive shell.
|
|
|
|
Returns:
|
|
The remote exit code.
|
|
|
|
Raises:
|
|
unittest.SkipTest: The device doesn't support exit codes.
|
|
"""
|
|
if not self.device.has_shell_protocol():
|
|
raise unittest.SkipTest('exit codes are unavailable on this device')
|
|
|
|
proc = subprocess.Popen(
|
|
self.device.adb_cmd + ['shell'] + shell_args,
|
|
stdin=subprocess.PIPE, stdout=subprocess.PIPE,
|
|
stderr=subprocess.PIPE)
|
|
# Closing host-side stdin doesn't trigger a PTY shell to exit so we need
|
|
# to explicitly add an exit command to close the session from the device
|
|
# side, plus the necessary newline to complete the interactive command.
|
|
proc.communicate(input + '; exit\n')
|
|
return proc.returncode
|
|
|
|
def test_cat(self):
|
|
"""Check that we can at least cat a file."""
|
|
out = self.device.shell(['cat', '/proc/uptime'])[0].strip()
|
|
elements = out.split()
|
|
self.assertEqual(len(elements), 2)
|
|
|
|
uptime, idle = elements
|
|
self.assertGreater(float(uptime), 0.0)
|
|
self.assertGreater(float(idle), 0.0)
|
|
|
|
def test_throws_on_failure(self):
|
|
self.assertRaises(adb.ShellError, self.device.shell, ['false'])
|
|
|
|
def test_output_not_stripped(self):
|
|
out = self.device.shell(['echo', 'foo'])[0]
|
|
self.assertEqual(out, 'foo' + self.device.linesep)
|
|
|
|
def test_shell_command_length(self):
|
|
# Devices that have shell_v2 should be able to handle long commands.
|
|
if self.device.has_shell_protocol():
|
|
rc, out, err = self.device.shell_nocheck(['echo', 'x' * 16384])
|
|
self.assertEqual(rc, 0)
|
|
self.assertTrue(out == ('x' * 16384 + '\n'))
|
|
|
|
def test_shell_nocheck_failure(self):
|
|
rc, out, _ = self.device.shell_nocheck(['false'])
|
|
self.assertNotEqual(rc, 0)
|
|
self.assertEqual(out, '')
|
|
|
|
def test_shell_nocheck_output_not_stripped(self):
|
|
rc, out, _ = self.device.shell_nocheck(['echo', 'foo'])
|
|
self.assertEqual(rc, 0)
|
|
self.assertEqual(out, 'foo' + self.device.linesep)
|
|
|
|
def test_can_distinguish_tricky_results(self):
|
|
# If result checking on ADB shell is naively implemented as
|
|
# `adb shell <cmd>; echo $?`, we would be unable to distinguish the
|
|
# output from the result for a cmd of `echo -n 1`.
|
|
rc, out, _ = self.device.shell_nocheck(['echo', '-n', '1'])
|
|
self.assertEqual(rc, 0)
|
|
self.assertEqual(out, '1')
|
|
|
|
def test_line_endings(self):
|
|
"""Ensure that line ending translation is not happening in the pty.
|
|
|
|
Bug: http://b/19735063
|
|
"""
|
|
output = self.device.shell(['uname'])[0]
|
|
self.assertEqual(output, 'Linux' + self.device.linesep)
|
|
|
|
def test_pty_logic(self):
|
|
"""Tests that a PTY is allocated when it should be.
|
|
|
|
PTY allocation behavior should match ssh.
|
|
"""
|
|
def check_pty(args):
|
|
"""Checks adb shell PTY allocation.
|
|
|
|
Tests |args| for terminal and non-terminal stdin.
|
|
|
|
Args:
|
|
args: -Tt args in a list (e.g. ['-t', '-t']).
|
|
|
|
Returns:
|
|
A tuple (<terminal>, <non-terminal>). True indicates
|
|
the corresponding shell allocated a remote PTY.
|
|
"""
|
|
test_cmd = self.device.adb_cmd + ['shell'] + args + ['[ -t 0 ]']
|
|
|
|
terminal = subprocess.Popen(
|
|
test_cmd, stdin=None,
|
|
stdout=subprocess.PIPE, stderr=subprocess.PIPE)
|
|
terminal.communicate()
|
|
|
|
non_terminal = subprocess.Popen(
|
|
test_cmd, stdin=subprocess.PIPE,
|
|
stdout=subprocess.PIPE, stderr=subprocess.PIPE)
|
|
non_terminal.communicate()
|
|
|
|
return (terminal.returncode == 0, non_terminal.returncode == 0)
|
|
|
|
# -T: never allocate PTY.
|
|
self.assertEqual((False, False), check_pty(['-T']))
|
|
|
|
# These tests require a new device.
|
|
if self.device.has_shell_protocol() and os.isatty(sys.stdin.fileno()):
|
|
# No args: PTY only if stdin is a terminal and shell is interactive,
|
|
# which is difficult to reliably test from a script.
|
|
self.assertEqual((False, False), check_pty([]))
|
|
|
|
# -t: PTY if stdin is a terminal.
|
|
self.assertEqual((True, False), check_pty(['-t']))
|
|
|
|
# -t -t: always allocate PTY.
|
|
self.assertEqual((True, True), check_pty(['-t', '-t']))
|
|
|
|
# -tt: always allocate PTY, POSIX style (http://b/32216152).
|
|
self.assertEqual((True, True), check_pty(['-tt']))
|
|
|
|
# -ttt: ssh has weird even/odd behavior with multiple -t flags, but
|
|
# we follow the man page instead.
|
|
self.assertEqual((True, True), check_pty(['-ttt']))
|
|
|
|
# -ttx: -x and -tt aren't incompatible (though -Tx would be an error).
|
|
self.assertEqual((True, True), check_pty(['-ttx']))
|
|
|
|
# -Ttt: -tt cancels out -T.
|
|
self.assertEqual((True, True), check_pty(['-Ttt']))
|
|
|
|
# -ttT: -T cancels out -tt.
|
|
self.assertEqual((False, False), check_pty(['-ttT']))
|
|
|
|
def test_shell_protocol(self):
|
|
"""Tests the shell protocol on the device.
|
|
|
|
If the device supports shell protocol, this gives us the ability
|
|
to separate stdout/stderr and return the exit code directly.
|
|
|
|
Bug: http://b/19734861
|
|
"""
|
|
if not self.device.has_shell_protocol():
|
|
raise unittest.SkipTest('shell protocol unsupported on this device')
|
|
|
|
# Shell protocol should be used by default.
|
|
result = self.device.shell_nocheck(
|
|
shlex.split('echo foo; echo bar >&2; exit 17'))
|
|
self.assertEqual(17, result[0])
|
|
self.assertEqual('foo' + self.device.linesep, result[1])
|
|
self.assertEqual('bar' + self.device.linesep, result[2])
|
|
|
|
self.assertEqual(17, self._interactive_shell([], 'exit 17'))
|
|
|
|
# -x flag should disable shell protocol.
|
|
result = self.device.shell_nocheck(
|
|
shlex.split('-x echo foo; echo bar >&2; exit 17'))
|
|
self.assertEqual(0, result[0])
|
|
self.assertEqual('foo{0}bar{0}'.format(self.device.linesep), result[1])
|
|
self.assertEqual('', result[2])
|
|
|
|
self.assertEqual(0, self._interactive_shell(['-x'], 'exit 17'))
|
|
|
|
def test_non_interactive_sigint(self):
|
|
"""Tests that SIGINT in a non-interactive shell kills the process.
|
|
|
|
This requires the shell protocol in order to detect the broken
|
|
pipe; raw data transfer mode will only see the break once the
|
|
subprocess tries to read or write.
|
|
|
|
Bug: http://b/23825725
|
|
"""
|
|
if not self.device.has_shell_protocol():
|
|
raise unittest.SkipTest('shell protocol unsupported on this device')
|
|
|
|
# Start a long-running process.
|
|
sleep_proc = subprocess.Popen(
|
|
self.device.adb_cmd + shlex.split('shell echo $$; sleep 60'),
|
|
stdin=subprocess.PIPE, stdout=subprocess.PIPE,
|
|
stderr=subprocess.STDOUT)
|
|
remote_pid = sleep_proc.stdout.readline().strip()
|
|
self.assertIsNone(sleep_proc.returncode, 'subprocess terminated early')
|
|
proc_query = shlex.split('ps {0} | grep {0}'.format(remote_pid))
|
|
|
|
# Verify that the process is running, send signal, verify it stopped.
|
|
self.device.shell(proc_query)
|
|
os.kill(sleep_proc.pid, signal.SIGINT)
|
|
sleep_proc.communicate()
|
|
|
|
# It can take some time for the process to receive the signal and die.
|
|
end_time = time.time() + 3
|
|
while self.device.shell_nocheck(proc_query)[0] != 1:
|
|
self.assertFalse(time.time() > end_time,
|
|
'subprocess failed to terminate in time')
|
|
|
|
def test_non_interactive_stdin(self):
|
|
"""Tests that non-interactive shells send stdin."""
|
|
if not self.device.has_shell_protocol():
|
|
raise unittest.SkipTest('non-interactive stdin unsupported '
|
|
'on this device')
|
|
|
|
# Test both small and large inputs.
|
|
small_input = 'foo'
|
|
large_input = '\n'.join(c * 100 for c in (string.ascii_letters +
|
|
string.digits))
|
|
|
|
for input in (small_input, large_input):
|
|
proc = subprocess.Popen(self.device.adb_cmd + ['shell', 'cat'],
|
|
stdin=subprocess.PIPE,
|
|
stdout=subprocess.PIPE,
|
|
stderr=subprocess.PIPE)
|
|
stdout, stderr = proc.communicate(input)
|
|
self.assertEqual(input.splitlines(), stdout.splitlines())
|
|
self.assertEqual('', stderr)
|
|
|
|
def test_sighup(self):
|
|
"""Ensure that SIGHUP gets sent upon non-interactive ctrl-c"""
|
|
log_path = "/data/local/tmp/adb_signal_test.log"
|
|
|
|
# Clear the output file.
|
|
self.device.shell_nocheck(["echo", ">", log_path])
|
|
|
|
script = """
|
|
trap "echo SIGINT > {path}; exit 0" SIGINT
|
|
trap "echo SIGHUP > {path}; exit 0" SIGHUP
|
|
echo Waiting
|
|
read
|
|
""".format(path=log_path)
|
|
|
|
script = ";".join([x.strip() for x in script.strip().splitlines()])
|
|
|
|
process = self.device.shell_popen([script], kill_atexit=False,
|
|
stdin=subprocess.PIPE,
|
|
stdout=subprocess.PIPE)
|
|
|
|
self.assertEqual("Waiting\n", process.stdout.readline())
|
|
process.send_signal(signal.SIGINT)
|
|
process.wait()
|
|
|
|
# Waiting for the local adb to finish is insufficient, since it hangs
|
|
# up immediately.
|
|
time.sleep(1)
|
|
|
|
stdout, _ = self.device.shell(["cat", log_path])
|
|
self.assertEqual(stdout.strip(), "SIGHUP")
|
|
|
|
|
|
class ArgumentEscapingTest(DeviceTest):
|
|
def test_shell_escaping(self):
|
|
"""Make sure that argument escaping is somewhat sane."""
|
|
|
|
# http://b/19734868
|
|
# Note that this actually matches ssh(1)'s behavior --- it's
|
|
# converted to `sh -c echo hello; echo world` which sh interprets
|
|
# as `sh -c echo` (with an argument to that shell of "hello"),
|
|
# and then `echo world` back in the first shell.
|
|
result = self.device.shell(
|
|
shlex.split("sh -c 'echo hello; echo world'"))[0]
|
|
result = result.splitlines()
|
|
self.assertEqual(['', 'world'], result)
|
|
# If you really wanted "hello" and "world", here's what you'd do:
|
|
result = self.device.shell(
|
|
shlex.split(r'echo hello\;echo world'))[0].splitlines()
|
|
self.assertEqual(['hello', 'world'], result)
|
|
|
|
# http://b/15479704
|
|
result = self.device.shell(shlex.split("'true && echo t'"))[0].strip()
|
|
self.assertEqual('t', result)
|
|
result = self.device.shell(
|
|
shlex.split("sh -c 'true && echo t'"))[0].strip()
|
|
self.assertEqual('t', result)
|
|
|
|
# http://b/20564385
|
|
result = self.device.shell(shlex.split('FOO=a BAR=b echo t'))[0].strip()
|
|
self.assertEqual('t', result)
|
|
result = self.device.shell(
|
|
shlex.split(r'echo -n 123\;uname'))[0].strip()
|
|
self.assertEqual('123Linux', result)
|
|
|
|
def test_install_argument_escaping(self):
|
|
"""Make sure that install argument escaping works."""
|
|
# http://b/20323053, http://b/3090932.
|
|
for file_suffix in ('-text;ls;1.apk', "-Live Hold'em.apk"):
|
|
tf = tempfile.NamedTemporaryFile('wb', suffix=file_suffix,
|
|
delete=False)
|
|
tf.close()
|
|
|
|
# Installing bogus .apks fails if the device supports exit codes.
|
|
try:
|
|
output = self.device.install(tf.name)
|
|
except subprocess.CalledProcessError as e:
|
|
output = e.output
|
|
|
|
self.assertIn(file_suffix, output)
|
|
os.remove(tf.name)
|
|
|
|
|
|
class RootUnrootTest(DeviceTest):
|
|
def _test_root(self):
|
|
message = self.device.root()
|
|
if 'adbd cannot run as root in production builds' in message:
|
|
return
|
|
self.device.wait()
|
|
self.assertEqual('root', self.device.shell(['id', '-un'])[0].strip())
|
|
|
|
def _test_unroot(self):
|
|
self.device.unroot()
|
|
self.device.wait()
|
|
self.assertEqual('shell', self.device.shell(['id', '-un'])[0].strip())
|
|
|
|
def test_root_unroot(self):
|
|
"""Make sure that adb root and adb unroot work, using id(1)."""
|
|
if self.device.get_prop('ro.debuggable') != '1':
|
|
raise unittest.SkipTest('requires rootable build')
|
|
|
|
original_user = self.device.shell(['id', '-un'])[0].strip()
|
|
try:
|
|
if original_user == 'root':
|
|
self._test_unroot()
|
|
self._test_root()
|
|
elif original_user == 'shell':
|
|
self._test_root()
|
|
self._test_unroot()
|
|
finally:
|
|
if original_user == 'root':
|
|
self.device.root()
|
|
else:
|
|
self.device.unroot()
|
|
self.device.wait()
|
|
|
|
|
|
class TcpIpTest(DeviceTest):
|
|
def test_tcpip_failure_raises(self):
|
|
"""adb tcpip requires a port.
|
|
|
|
Bug: http://b/22636927
|
|
"""
|
|
self.assertRaises(
|
|
subprocess.CalledProcessError, self.device.tcpip, '')
|
|
self.assertRaises(
|
|
subprocess.CalledProcessError, self.device.tcpip, 'foo')
|
|
|
|
|
|
class SystemPropertiesTest(DeviceTest):
|
|
def test_get_prop(self):
|
|
self.assertEqual(self.device.get_prop('init.svc.adbd'), 'running')
|
|
|
|
@requires_root
|
|
def test_set_prop(self):
|
|
prop_name = 'foo.bar'
|
|
self.device.shell(['setprop', prop_name, '""'])
|
|
|
|
self.device.set_prop(prop_name, 'qux')
|
|
self.assertEqual(
|
|
self.device.shell(['getprop', prop_name])[0].strip(), 'qux')
|
|
|
|
|
|
def compute_md5(string):
|
|
hsh = hashlib.md5()
|
|
hsh.update(string)
|
|
return hsh.hexdigest()
|
|
|
|
|
|
def get_md5_prog(device):
|
|
"""Older platforms (pre-L) had the name md5 rather than md5sum."""
|
|
try:
|
|
device.shell(['md5sum', '/proc/uptime'])
|
|
return 'md5sum'
|
|
except adb.ShellError:
|
|
return 'md5'
|
|
|
|
|
|
class HostFile(object):
|
|
def __init__(self, handle, checksum):
|
|
self.handle = handle
|
|
self.checksum = checksum
|
|
self.full_path = handle.name
|
|
self.base_name = os.path.basename(self.full_path)
|
|
|
|
|
|
class DeviceFile(object):
|
|
def __init__(self, checksum, full_path):
|
|
self.checksum = checksum
|
|
self.full_path = full_path
|
|
self.base_name = posixpath.basename(self.full_path)
|
|
|
|
|
|
def make_random_host_files(in_dir, num_files):
|
|
min_size = 1 * (1 << 10)
|
|
max_size = 16 * (1 << 10)
|
|
|
|
files = []
|
|
for _ in xrange(num_files):
|
|
file_handle = tempfile.NamedTemporaryFile(dir=in_dir, delete=False)
|
|
|
|
size = random.randrange(min_size, max_size, 1024)
|
|
rand_str = os.urandom(size)
|
|
file_handle.write(rand_str)
|
|
file_handle.flush()
|
|
file_handle.close()
|
|
|
|
md5 = compute_md5(rand_str)
|
|
files.append(HostFile(file_handle, md5))
|
|
return files
|
|
|
|
|
|
def make_random_device_files(device, in_dir, num_files, prefix='device_tmpfile'):
|
|
min_size = 1 * (1 << 10)
|
|
max_size = 16 * (1 << 10)
|
|
|
|
files = []
|
|
for file_num in xrange(num_files):
|
|
size = random.randrange(min_size, max_size, 1024)
|
|
|
|
base_name = prefix + str(file_num)
|
|
full_path = posixpath.join(in_dir, base_name)
|
|
|
|
device.shell(['dd', 'if=/dev/urandom', 'of={}'.format(full_path),
|
|
'bs={}'.format(size), 'count=1'])
|
|
dev_md5, _ = device.shell([get_md5_prog(device), full_path])[0].split()
|
|
|
|
files.append(DeviceFile(dev_md5, full_path))
|
|
return files
|
|
|
|
|
|
class FileOperationsTest(DeviceTest):
|
|
SCRATCH_DIR = '/data/local/tmp'
|
|
DEVICE_TEMP_FILE = SCRATCH_DIR + '/adb_test_file'
|
|
DEVICE_TEMP_DIR = SCRATCH_DIR + '/adb_test_dir'
|
|
|
|
def _verify_remote(self, checksum, remote_path):
|
|
dev_md5, _ = self.device.shell([get_md5_prog(self.device),
|
|
remote_path])[0].split()
|
|
self.assertEqual(checksum, dev_md5)
|
|
|
|
def _verify_local(self, checksum, local_path):
|
|
with open(local_path, 'rb') as host_file:
|
|
host_md5 = compute_md5(host_file.read())
|
|
self.assertEqual(host_md5, checksum)
|
|
|
|
def test_push(self):
|
|
"""Push a randomly generated file to specified device."""
|
|
kbytes = 512
|
|
tmp = tempfile.NamedTemporaryFile(mode='wb', delete=False)
|
|
rand_str = os.urandom(1024 * kbytes)
|
|
tmp.write(rand_str)
|
|
tmp.close()
|
|
|
|
self.device.shell(['rm', '-rf', self.DEVICE_TEMP_FILE])
|
|
self.device.push(local=tmp.name, remote=self.DEVICE_TEMP_FILE)
|
|
|
|
self._verify_remote(compute_md5(rand_str), self.DEVICE_TEMP_FILE)
|
|
self.device.shell(['rm', '-f', self.DEVICE_TEMP_FILE])
|
|
|
|
os.remove(tmp.name)
|
|
|
|
def test_push_dir(self):
|
|
"""Push a randomly generated directory of files to the device."""
|
|
self.device.shell(['rm', '-rf', self.DEVICE_TEMP_DIR])
|
|
self.device.shell(['mkdir', self.DEVICE_TEMP_DIR])
|
|
|
|
try:
|
|
host_dir = tempfile.mkdtemp()
|
|
|
|
# Make sure the temp directory isn't setuid, or else adb will complain.
|
|
os.chmod(host_dir, 0o700)
|
|
|
|
# Create 32 random files.
|
|
temp_files = make_random_host_files(in_dir=host_dir, num_files=32)
|
|
self.device.push(host_dir, self.DEVICE_TEMP_DIR)
|
|
|
|
for temp_file in temp_files:
|
|
remote_path = posixpath.join(self.DEVICE_TEMP_DIR,
|
|
os.path.basename(host_dir),
|
|
temp_file.base_name)
|
|
self._verify_remote(temp_file.checksum, remote_path)
|
|
self.device.shell(['rm', '-rf', self.DEVICE_TEMP_DIR])
|
|
finally:
|
|
if host_dir is not None:
|
|
shutil.rmtree(host_dir)
|
|
|
|
@unittest.expectedFailure # b/25566053
|
|
def test_push_empty(self):
|
|
"""Push a directory containing an empty directory to the device."""
|
|
self.device.shell(['rm', '-rf', self.DEVICE_TEMP_DIR])
|
|
self.device.shell(['mkdir', self.DEVICE_TEMP_DIR])
|
|
|
|
try:
|
|
host_dir = tempfile.mkdtemp()
|
|
|
|
# Make sure the temp directory isn't setuid, or else adb will complain.
|
|
os.chmod(host_dir, 0o700)
|
|
|
|
# Create an empty directory.
|
|
os.mkdir(os.path.join(host_dir, 'empty'))
|
|
|
|
self.device.push(host_dir, self.DEVICE_TEMP_DIR)
|
|
|
|
test_empty_cmd = ['[', '-d',
|
|
os.path.join(self.DEVICE_TEMP_DIR, 'empty')]
|
|
rc, _, _ = self.device.shell_nocheck(test_empty_cmd)
|
|
self.assertEqual(rc, 0)
|
|
self.device.shell(['rm', '-rf', self.DEVICE_TEMP_DIR])
|
|
finally:
|
|
if host_dir is not None:
|
|
shutil.rmtree(host_dir)
|
|
|
|
@unittest.skipIf(sys.platform == "win32", "symlinks require elevated privileges on windows")
|
|
def test_push_symlink(self):
|
|
"""Push a symlink.
|
|
|
|
Bug: http://b/31491920
|
|
"""
|
|
try:
|
|
host_dir = tempfile.mkdtemp()
|
|
|
|
# Make sure the temp directory isn't setuid, or else adb will
|
|
# complain.
|
|
os.chmod(host_dir, 0o700)
|
|
|
|
with open(os.path.join(host_dir, 'foo'), 'w') as f:
|
|
f.write('foo')
|
|
|
|
symlink_path = os.path.join(host_dir, 'symlink')
|
|
os.symlink('foo', symlink_path)
|
|
|
|
self.device.shell(['rm', '-rf', self.DEVICE_TEMP_DIR])
|
|
self.device.shell(['mkdir', self.DEVICE_TEMP_DIR])
|
|
self.device.push(symlink_path, self.DEVICE_TEMP_DIR)
|
|
rc, out, _ = self.device.shell_nocheck(
|
|
['cat', posixpath.join(self.DEVICE_TEMP_DIR, 'symlink')])
|
|
self.assertEqual(0, rc)
|
|
self.assertEqual(out.strip(), 'foo')
|
|
finally:
|
|
if host_dir is not None:
|
|
shutil.rmtree(host_dir)
|
|
|
|
def test_multiple_push(self):
|
|
"""Push multiple files to the device in one adb push command.
|
|
|
|
Bug: http://b/25324823
|
|
"""
|
|
|
|
self.device.shell(['rm', '-rf', self.DEVICE_TEMP_DIR])
|
|
self.device.shell(['mkdir', self.DEVICE_TEMP_DIR])
|
|
|
|
try:
|
|
host_dir = tempfile.mkdtemp()
|
|
|
|
# Create some random files and a subdirectory containing more files.
|
|
temp_files = make_random_host_files(in_dir=host_dir, num_files=4)
|
|
|
|
subdir = os.path.join(host_dir, 'subdir')
|
|
os.mkdir(subdir)
|
|
subdir_temp_files = make_random_host_files(in_dir=subdir,
|
|
num_files=4)
|
|
|
|
paths = map(lambda temp_file: temp_file.full_path, temp_files)
|
|
paths.append(subdir)
|
|
self.device._simple_call(['push'] + paths + [self.DEVICE_TEMP_DIR])
|
|
|
|
for temp_file in temp_files:
|
|
remote_path = posixpath.join(self.DEVICE_TEMP_DIR,
|
|
temp_file.base_name)
|
|
self._verify_remote(temp_file.checksum, remote_path)
|
|
|
|
for subdir_temp_file in subdir_temp_files:
|
|
remote_path = posixpath.join(self.DEVICE_TEMP_DIR,
|
|
# BROKEN: http://b/25394682
|
|
# 'subdir';
|
|
temp_file.base_name)
|
|
self._verify_remote(temp_file.checksum, remote_path)
|
|
|
|
|
|
self.device.shell(['rm', '-rf', self.DEVICE_TEMP_DIR])
|
|
finally:
|
|
if host_dir is not None:
|
|
shutil.rmtree(host_dir)
|
|
|
|
@requires_non_root
|
|
def test_push_error_reporting(self):
|
|
"""Make sure that errors that occur while pushing a file get reported
|
|
|
|
Bug: http://b/26816782
|
|
"""
|
|
with tempfile.NamedTemporaryFile() as tmp_file:
|
|
tmp_file.write('\0' * 1024 * 1024)
|
|
tmp_file.flush()
|
|
try:
|
|
self.device.push(local=tmp_file.name, remote='/system/')
|
|
self.fail('push should not have succeeded')
|
|
except subprocess.CalledProcessError as e:
|
|
output = e.output
|
|
|
|
self.assertTrue('Permission denied' in output or
|
|
'Read-only file system' in output)
|
|
|
|
def _test_pull(self, remote_file, checksum):
|
|
tmp_write = tempfile.NamedTemporaryFile(mode='wb', delete=False)
|
|
tmp_write.close()
|
|
self.device.pull(remote=remote_file, local=tmp_write.name)
|
|
with open(tmp_write.name, 'rb') as tmp_read:
|
|
host_contents = tmp_read.read()
|
|
host_md5 = compute_md5(host_contents)
|
|
self.assertEqual(checksum, host_md5)
|
|
os.remove(tmp_write.name)
|
|
|
|
@requires_non_root
|
|
def test_pull_error_reporting(self):
|
|
self.device.shell(['touch', self.DEVICE_TEMP_FILE])
|
|
self.device.shell(['chmod', 'a-rwx', self.DEVICE_TEMP_FILE])
|
|
|
|
try:
|
|
output = self.device.pull(remote=self.DEVICE_TEMP_FILE, local='x')
|
|
except subprocess.CalledProcessError as e:
|
|
output = e.output
|
|
|
|
self.assertIn('Permission denied', output)
|
|
|
|
self.device.shell(['rm', '-f', self.DEVICE_TEMP_FILE])
|
|
|
|
def test_pull(self):
|
|
"""Pull a randomly generated file from specified device."""
|
|
kbytes = 512
|
|
self.device.shell(['rm', '-rf', self.DEVICE_TEMP_FILE])
|
|
cmd = ['dd', 'if=/dev/urandom',
|
|
'of={}'.format(self.DEVICE_TEMP_FILE), 'bs=1024',
|
|
'count={}'.format(kbytes)]
|
|
self.device.shell(cmd)
|
|
dev_md5, _ = self.device.shell(
|
|
[get_md5_prog(self.device), self.DEVICE_TEMP_FILE])[0].split()
|
|
self._test_pull(self.DEVICE_TEMP_FILE, dev_md5)
|
|
self.device.shell_nocheck(['rm', self.DEVICE_TEMP_FILE])
|
|
|
|
def test_pull_dir(self):
|
|
"""Pull a randomly generated directory of files from the device."""
|
|
try:
|
|
host_dir = tempfile.mkdtemp()
|
|
|
|
self.device.shell(['rm', '-rf', self.DEVICE_TEMP_DIR])
|
|
self.device.shell(['mkdir', '-p', self.DEVICE_TEMP_DIR])
|
|
|
|
# Populate device directory with random files.
|
|
temp_files = make_random_device_files(
|
|
self.device, in_dir=self.DEVICE_TEMP_DIR, num_files=32)
|
|
|
|
self.device.pull(remote=self.DEVICE_TEMP_DIR, local=host_dir)
|
|
|
|
for temp_file in temp_files:
|
|
host_path = os.path.join(
|
|
host_dir, posixpath.basename(self.DEVICE_TEMP_DIR),
|
|
temp_file.base_name)
|
|
self._verify_local(temp_file.checksum, host_path)
|
|
|
|
self.device.shell(['rm', '-rf', self.DEVICE_TEMP_DIR])
|
|
finally:
|
|
if host_dir is not None:
|
|
shutil.rmtree(host_dir)
|
|
|
|
def test_pull_dir_symlink(self):
|
|
"""Pull a directory into a symlink to a directory.
|
|
|
|
Bug: http://b/27362811
|
|
"""
|
|
if os.name != 'posix':
|
|
raise unittest.SkipTest('requires POSIX')
|
|
|
|
try:
|
|
host_dir = tempfile.mkdtemp()
|
|
real_dir = os.path.join(host_dir, 'dir')
|
|
symlink = os.path.join(host_dir, 'symlink')
|
|
os.mkdir(real_dir)
|
|
os.symlink(real_dir, symlink)
|
|
|
|
self.device.shell(['rm', '-rf', self.DEVICE_TEMP_DIR])
|
|
self.device.shell(['mkdir', '-p', self.DEVICE_TEMP_DIR])
|
|
|
|
# Populate device directory with random files.
|
|
temp_files = make_random_device_files(
|
|
self.device, in_dir=self.DEVICE_TEMP_DIR, num_files=32)
|
|
|
|
self.device.pull(remote=self.DEVICE_TEMP_DIR, local=symlink)
|
|
|
|
for temp_file in temp_files:
|
|
host_path = os.path.join(
|
|
real_dir, posixpath.basename(self.DEVICE_TEMP_DIR),
|
|
temp_file.base_name)
|
|
self._verify_local(temp_file.checksum, host_path)
|
|
|
|
self.device.shell(['rm', '-rf', self.DEVICE_TEMP_DIR])
|
|
finally:
|
|
if host_dir is not None:
|
|
shutil.rmtree(host_dir)
|
|
|
|
def test_pull_dir_symlink_collision(self):
|
|
"""Pull a directory into a colliding symlink to directory."""
|
|
if os.name != 'posix':
|
|
raise unittest.SkipTest('requires POSIX')
|
|
|
|
try:
|
|
host_dir = tempfile.mkdtemp()
|
|
real_dir = os.path.join(host_dir, 'real')
|
|
tmp_dirname = os.path.basename(self.DEVICE_TEMP_DIR)
|
|
symlink = os.path.join(host_dir, tmp_dirname)
|
|
os.mkdir(real_dir)
|
|
os.symlink(real_dir, symlink)
|
|
|
|
self.device.shell(['rm', '-rf', self.DEVICE_TEMP_DIR])
|
|
self.device.shell(['mkdir', '-p', self.DEVICE_TEMP_DIR])
|
|
|
|
# Populate device directory with random files.
|
|
temp_files = make_random_device_files(
|
|
self.device, in_dir=self.DEVICE_TEMP_DIR, num_files=32)
|
|
|
|
self.device.pull(remote=self.DEVICE_TEMP_DIR, local=host_dir)
|
|
|
|
for temp_file in temp_files:
|
|
host_path = os.path.join(real_dir, temp_file.base_name)
|
|
self._verify_local(temp_file.checksum, host_path)
|
|
|
|
self.device.shell(['rm', '-rf', self.DEVICE_TEMP_DIR])
|
|
finally:
|
|
if host_dir is not None:
|
|
shutil.rmtree(host_dir)
|
|
|
|
def test_pull_dir_nonexistent(self):
|
|
"""Pull a directory of files from the device to a nonexistent path."""
|
|
try:
|
|
host_dir = tempfile.mkdtemp()
|
|
dest_dir = os.path.join(host_dir, 'dest')
|
|
|
|
self.device.shell(['rm', '-rf', self.DEVICE_TEMP_DIR])
|
|
self.device.shell(['mkdir', '-p', self.DEVICE_TEMP_DIR])
|
|
|
|
# Populate device directory with random files.
|
|
temp_files = make_random_device_files(
|
|
self.device, in_dir=self.DEVICE_TEMP_DIR, num_files=32)
|
|
|
|
self.device.pull(remote=self.DEVICE_TEMP_DIR, local=dest_dir)
|
|
|
|
for temp_file in temp_files:
|
|
host_path = os.path.join(dest_dir, temp_file.base_name)
|
|
self._verify_local(temp_file.checksum, host_path)
|
|
|
|
self.device.shell(['rm', '-rf', self.DEVICE_TEMP_DIR])
|
|
finally:
|
|
if host_dir is not None:
|
|
shutil.rmtree(host_dir)
|
|
|
|
def test_pull_symlink_dir(self):
|
|
"""Pull a symlink to a directory of symlinks to files."""
|
|
try:
|
|
host_dir = tempfile.mkdtemp()
|
|
|
|
remote_dir = posixpath.join(self.DEVICE_TEMP_DIR, 'contents')
|
|
remote_links = posixpath.join(self.DEVICE_TEMP_DIR, 'links')
|
|
remote_symlink = posixpath.join(self.DEVICE_TEMP_DIR, 'symlink')
|
|
|
|
self.device.shell(['rm', '-rf', self.DEVICE_TEMP_DIR])
|
|
self.device.shell(['mkdir', '-p', remote_dir, remote_links])
|
|
self.device.shell(['ln', '-s', remote_links, remote_symlink])
|
|
|
|
# Populate device directory with random files.
|
|
temp_files = make_random_device_files(
|
|
self.device, in_dir=remote_dir, num_files=32)
|
|
|
|
for temp_file in temp_files:
|
|
self.device.shell(
|
|
['ln', '-s', '../contents/{}'.format(temp_file.base_name),
|
|
posixpath.join(remote_links, temp_file.base_name)])
|
|
|
|
self.device.pull(remote=remote_symlink, local=host_dir)
|
|
|
|
for temp_file in temp_files:
|
|
host_path = os.path.join(
|
|
host_dir, 'symlink', temp_file.base_name)
|
|
self._verify_local(temp_file.checksum, host_path)
|
|
|
|
self.device.shell(['rm', '-rf', self.DEVICE_TEMP_DIR])
|
|
finally:
|
|
if host_dir is not None:
|
|
shutil.rmtree(host_dir)
|
|
|
|
def test_pull_empty(self):
|
|
"""Pull a directory containing an empty directory from the device."""
|
|
try:
|
|
host_dir = tempfile.mkdtemp()
|
|
|
|
remote_empty_path = posixpath.join(self.DEVICE_TEMP_DIR, 'empty')
|
|
self.device.shell(['rm', '-rf', self.DEVICE_TEMP_DIR])
|
|
self.device.shell(['mkdir', '-p', remote_empty_path])
|
|
|
|
self.device.pull(remote=remote_empty_path, local=host_dir)
|
|
self.assertTrue(os.path.isdir(os.path.join(host_dir, 'empty')))
|
|
finally:
|
|
if host_dir is not None:
|
|
shutil.rmtree(host_dir)
|
|
|
|
def test_multiple_pull(self):
|
|
"""Pull a randomly generated directory of files from the device."""
|
|
|
|
try:
|
|
host_dir = tempfile.mkdtemp()
|
|
|
|
subdir = posixpath.join(self.DEVICE_TEMP_DIR, 'subdir')
|
|
self.device.shell(['rm', '-rf', self.DEVICE_TEMP_DIR])
|
|
self.device.shell(['mkdir', '-p', subdir])
|
|
|
|
# Create some random files and a subdirectory containing more files.
|
|
temp_files = make_random_device_files(
|
|
self.device, in_dir=self.DEVICE_TEMP_DIR, num_files=4)
|
|
|
|
subdir_temp_files = make_random_device_files(
|
|
self.device, in_dir=subdir, num_files=4, prefix='subdir_')
|
|
|
|
paths = map(lambda temp_file: temp_file.full_path, temp_files)
|
|
paths.append(subdir)
|
|
self.device._simple_call(['pull'] + paths + [host_dir])
|
|
|
|
for temp_file in temp_files:
|
|
local_path = os.path.join(host_dir, temp_file.base_name)
|
|
self._verify_local(temp_file.checksum, local_path)
|
|
|
|
for subdir_temp_file in subdir_temp_files:
|
|
local_path = os.path.join(host_dir,
|
|
'subdir',
|
|
subdir_temp_file.base_name)
|
|
self._verify_local(subdir_temp_file.checksum, local_path)
|
|
|
|
self.device.shell(['rm', '-rf', self.DEVICE_TEMP_DIR])
|
|
finally:
|
|
if host_dir is not None:
|
|
shutil.rmtree(host_dir)
|
|
|
|
def verify_sync(self, device, temp_files, device_dir):
|
|
"""Verifies that a list of temp files was synced to the device."""
|
|
# Confirm that every file on the device mirrors that on the host.
|
|
for temp_file in temp_files:
|
|
device_full_path = posixpath.join(
|
|
device_dir, temp_file.base_name)
|
|
dev_md5, _ = device.shell(
|
|
[get_md5_prog(self.device), device_full_path])[0].split()
|
|
self.assertEqual(temp_file.checksum, dev_md5)
|
|
|
|
def test_sync(self):
|
|
"""Sync a host directory to the data partition."""
|
|
|
|
try:
|
|
base_dir = tempfile.mkdtemp()
|
|
|
|
# Create mirror device directory hierarchy within base_dir.
|
|
full_dir_path = base_dir + self.DEVICE_TEMP_DIR
|
|
os.makedirs(full_dir_path)
|
|
|
|
# Create 32 random files within the host mirror.
|
|
temp_files = make_random_host_files(
|
|
in_dir=full_dir_path, num_files=32)
|
|
|
|
# Clean up any stale files on the device.
|
|
device = adb.get_device() # pylint: disable=no-member
|
|
device.shell(['rm', '-rf', self.DEVICE_TEMP_DIR])
|
|
|
|
old_product_out = os.environ.get('ANDROID_PRODUCT_OUT')
|
|
os.environ['ANDROID_PRODUCT_OUT'] = base_dir
|
|
device.sync('data')
|
|
if old_product_out is None:
|
|
del os.environ['ANDROID_PRODUCT_OUT']
|
|
else:
|
|
os.environ['ANDROID_PRODUCT_OUT'] = old_product_out
|
|
|
|
self.verify_sync(device, temp_files, self.DEVICE_TEMP_DIR)
|
|
|
|
#self.device.shell(['rm', '-rf', self.DEVICE_TEMP_DIR])
|
|
finally:
|
|
if base_dir is not None:
|
|
shutil.rmtree(base_dir)
|
|
|
|
def test_push_sync(self):
|
|
"""Sync a host directory to a specific path."""
|
|
|
|
try:
|
|
temp_dir = tempfile.mkdtemp()
|
|
temp_files = make_random_host_files(in_dir=temp_dir, num_files=32)
|
|
|
|
device_dir = posixpath.join(self.DEVICE_TEMP_DIR, 'sync_src_dst')
|
|
|
|
# Clean up any stale files on the device.
|
|
device = adb.get_device() # pylint: disable=no-member
|
|
device.shell(['rm', '-rf', device_dir])
|
|
|
|
device.push(temp_dir, device_dir, sync=True)
|
|
|
|
self.verify_sync(device, temp_files, device_dir)
|
|
|
|
self.device.shell(['rm', '-rf', self.DEVICE_TEMP_DIR])
|
|
finally:
|
|
if temp_dir is not None:
|
|
shutil.rmtree(temp_dir)
|
|
|
|
def test_unicode_paths(self):
|
|
"""Ensure that we can support non-ASCII paths, even on Windows."""
|
|
name = u'로보카 폴리'
|
|
|
|
self.device.shell(['rm', '-f', '/data/local/tmp/adb-test-*'])
|
|
remote_path = u'/data/local/tmp/adb-test-{}'.format(name)
|
|
|
|
## push.
|
|
tf = tempfile.NamedTemporaryFile('wb', suffix=name, delete=False)
|
|
tf.close()
|
|
self.device.push(tf.name, remote_path)
|
|
os.remove(tf.name)
|
|
self.assertFalse(os.path.exists(tf.name))
|
|
|
|
# Verify that the device ended up with the expected UTF-8 path
|
|
output = self.device.shell(
|
|
['ls', '/data/local/tmp/adb-test-*'])[0].strip()
|
|
self.assertEqual(remote_path.encode('utf-8'), output)
|
|
|
|
# pull.
|
|
self.device.pull(remote_path, tf.name)
|
|
self.assertTrue(os.path.exists(tf.name))
|
|
os.remove(tf.name)
|
|
self.device.shell(['rm', '-f', '/data/local/tmp/adb-test-*'])
|
|
|
|
|
|
class DeviceOfflineTest(DeviceTest):
|
|
def _get_device_state(self, serialno):
|
|
output = subprocess.check_output(self.device.adb_cmd + ['devices'])
|
|
for line in output.split('\n'):
|
|
m = re.match('(\S+)\s+(\S+)', line)
|
|
if m and m.group(1) == serialno:
|
|
return m.group(2)
|
|
return None
|
|
|
|
def disabled_test_killed_when_pushing_a_large_file(self):
|
|
"""
|
|
While running adb push with a large file, kill adb server.
|
|
Occasionally the device becomes offline. Because the device is still
|
|
reading data without realizing that the adb server has been restarted.
|
|
Test if we can bring the device online automatically now.
|
|
http://b/32952319
|
|
"""
|
|
serialno = subprocess.check_output(self.device.adb_cmd + ['get-serialno']).strip()
|
|
# 1. Push a large file
|
|
file_path = 'tmp_large_file'
|
|
try:
|
|
fh = open(file_path, 'w')
|
|
fh.write('\0' * (100 * 1024 * 1024))
|
|
fh.close()
|
|
subproc = subprocess.Popen(self.device.adb_cmd + ['push', file_path, '/data/local/tmp'])
|
|
time.sleep(0.1)
|
|
# 2. Kill the adb server
|
|
subprocess.check_call(self.device.adb_cmd + ['kill-server'])
|
|
subproc.terminate()
|
|
finally:
|
|
try:
|
|
os.unlink(file_path)
|
|
except:
|
|
pass
|
|
# 3. See if the device still exist.
|
|
# Sleep to wait for the adb server exit.
|
|
time.sleep(0.5)
|
|
# 4. The device should be online
|
|
self.assertEqual(self._get_device_state(serialno), 'device')
|
|
|
|
def disabled_test_killed_when_pulling_a_large_file(self):
|
|
"""
|
|
While running adb pull with a large file, kill adb server.
|
|
Occasionally the device can't be connected. Because the device is trying to
|
|
send a message larger than what is expected by the adb server.
|
|
Test if we can bring the device online automatically now.
|
|
"""
|
|
serialno = subprocess.check_output(self.device.adb_cmd + ['get-serialno']).strip()
|
|
file_path = 'tmp_large_file'
|
|
try:
|
|
# 1. Create a large file on device.
|
|
self.device.shell(['dd', 'if=/dev/zero', 'of=/data/local/tmp/tmp_large_file',
|
|
'bs=1000000', 'count=100'])
|
|
# 2. Pull the large file on host.
|
|
subproc = subprocess.Popen(self.device.adb_cmd +
|
|
['pull','/data/local/tmp/tmp_large_file', file_path])
|
|
time.sleep(0.1)
|
|
# 3. Kill the adb server
|
|
subprocess.check_call(self.device.adb_cmd + ['kill-server'])
|
|
subproc.terminate()
|
|
finally:
|
|
try:
|
|
os.unlink(file_path)
|
|
except:
|
|
pass
|
|
# 4. See if the device still exist.
|
|
# Sleep to wait for the adb server exit.
|
|
time.sleep(0.5)
|
|
self.assertEqual(self._get_device_state(serialno), 'device')
|
|
|
|
|
|
def test_packet_size_regression(self):
|
|
"""Test for http://b/37783561
|
|
|
|
Receiving packets of a length divisible by 512 but not 1024 resulted in
|
|
the adb client waiting indefinitely for more input.
|
|
"""
|
|
# The values that trigger things are 507 (512 - 5 bytes from shell protocol) + 1024*n
|
|
# Probe some surrounding values as well, for the hell of it.
|
|
for length in [506, 507, 508, 1018, 1019, 1020, 1530, 1531, 1532]:
|
|
cmd = ['dd', 'if=/dev/zero', 'bs={}'.format(length), 'count=1', '2>/dev/null;'
|
|
'echo', 'foo']
|
|
rc, stdout, _ = self.device.shell_nocheck(cmd)
|
|
|
|
self.assertEqual(0, rc)
|
|
|
|
# Output should be '\0' * length, followed by "foo\n"
|
|
self.assertEqual(length, len(stdout) - 4)
|
|
self.assertEqual(stdout, "\0" * length + "foo\n")
|
|
|
|
|
|
def main():
|
|
random.seed(0)
|
|
if len(adb.get_devices()) > 0:
|
|
suite = unittest.TestLoader().loadTestsFromName(__name__)
|
|
unittest.TextTestRunner(verbosity=3).run(suite)
|
|
else:
|
|
print('Test suite must be run with attached devices')
|
|
|
|
|
|
if __name__ == '__main__':
|
|
main()
|