其他分享
首页 > 其他分享> > 平台支持monkey命令并过滤日志展示-安卓

平台支持monkey命令并过滤日志展示-安卓

作者:互联网

前言:

做测试开发有一段时间了,总会碰到各种各样的问题,特此记录下,已做备忘;

任务目标:

最近接手的工作是需要在平台上集成monkey命令,支持命令执行并对日志进行筛选,将包含exception、crash和anr的记录筛选出来并统计出现次数;

任务整理与分析:

1.实际概况:

平台部署在linux服务器上;用户使用自己的电脑(win)连接真机(安卓)执行monkey命令;

2.思路分析:

1)服务器需要收集执行monkey命令的主机信息(主机名,IP地址等);

2)通过收集到的主机信息,控制主机执行monkey命令;

3.技术选型:

1)通过redis上传主机信息;

2)jsonp跨域传递命令,flask本地运行,接收命令并使用subprocess的Popen模块执行命令,执行后将结果返回给服务器并展示;

项目实施:

1.收集主机信息:

前提:用户本机需准备好python环境并安装flask和redis模块;本机配置好adb环境;

执行:运行提供的salve.py文件,上传主机信息;

代码:

 
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 import flask,redis,os,socket from flask import request from subprocess import * import shlex,time,datetime,re,json def check_salve():     try:         import redis         import flask     except Exception as e:         if 'redis' in e:             quit('运行salve节点需要装redis模块')         elif 'flask' in e:             quit('运行salve节点需要装flask模块')   def reg_salve():     #把salve节点注册到服务端的redis里面     myname = socket.getfqdn(socket.gethostname())     myaddr = socket.gethostbyname(myname) #获取本机ip     r=redis.Redis(host='xxxx',port=6379)#这里写服务端redis的ip     salve_key = 'salves'     r.hset(salve_key,myname,myaddr) #set key,哈希类型,大key是 salves,小key是 salve节点的主机名,value是子节点ip check_salve() reg_salve()

 

2.平台展示主机信息提供执行入口:

从redis读取主机信息并展示,提供执行入口,选择本机信息后点击后跳转到执行页面;

3.执行过程:

1)执行页面显示IP地址和执行按钮;

html模板:

 
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 <form id="mobile_form" enctype="multipart/form-data">     <div style="margin-bottom: 20px;">         <span style="color:greenyellow;font-weight: bolder">您的IP地址是:</span>         <span id="id_select_ip">             {{ ip }}         </span>     </div>     <span class="btn btn-primary" id="sub_command">开始执行</span> </form> <div id="result_show" class="hide">     <div style="margin:20px 0;">         <h5>执行结果如下所示:</h5>     </div>     <table class="table table-bordered">         <thead>             <tr>                 <th scope="col" style="text-align: center;width:680px;">执行命令</th>                 <th scope="col" style="text-align: center">Exception次数</th>                 <th scope="col" style="text-align: center">CRASH次数</th>                 <th scope="col" style="text-align: center">ANR次数</th>                 <th scope="col" style="text-align: center">执行结果</th>             </tr>         </thead>         <tbody>             <tr>                 <td id="command_td"></td>                 <td id="exception_td" style="text-align: center"></td>                 <td id="crash_td" style="text-align: center"></td>                 <td id="anr_td" style="text-align: center"></td>                 <td id="result_td" style="text-align: center"></td>             </tr>             <tr id="Except_tr" class="hide">                 <td colspan="5">                     <div id="except_span">                     </div>                 </td>             </tr>             <tr id="crash_tr" class="hide">                 <td colspan="5">                     <div id="crash_span">                     </div>                 </td>             </tr>             <tr id="anr_tr" class="hide">                 <td colspan="5">                     <div id="anr_span">                     </div>                 </td>             </tr>         </tbody>     </table> </div> <div class="mobile_cover hide" id="mobile_cover">     <div class="mobile_coverShow hide" id="mobile_coverShow">         <span class="notice_text">执行monkey测试中,请耐心等候......</span>     </div> </div>

2)点击执行按钮,通过jsonp将命令发送到本机;

JS代码:

 
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 $("#sub_command").click(function () {     $("#mobile_cover").removeClass("hide");     $("#mobile_coverShow").removeClass("hide");     var ipadrress = $("#id_select_ip").text();     ipadrress=ipadrress.replace(/ /g,''); //过滤空格     var hide_val = $("#result_show").attr("class");     if(hide_val != "hide"){         $("#result_show").addClass("hide");     };     $.ajax({         url:"http://"+ipadrress+":8989/",         type:"get",         async:false,         dataType:"jsonp",         jsonp:"callback",         success:function (sout_dir) {             $("#command_td").text(sout_dir['command']);             $("#result_show").removeClass("hide");             $("#mobile_cover").addClass("hide");             $("#mobile_coverShow").addClass("hide");             var ecount = sout_dir['ERROR']['Exception_count'];             if(ecount == 0){                 $("#exception_td").text("0");             }else{                 $("#exception_td").text(ecount);                 $("#exception_td").addClass("except_detail");                 var except_infos = sout_dir['ERROR']['Exception_info'];                 if($("#except_span:has(div)").length){                     $("#except_span>div").remove();                 };                 for(except_info in except_infos ){                     $("#except_span").append("<div style='height:25px;color:red;'>" + except_infos[except_info] +"</div>");                 };             };             var Ccount = sout_dir['CRASH']['Ccount'];             if(Ccount==0){                 $("#crash_td").text("0");             }else{                 $("#crash_td").text(Ccount);                 $("#crash_td").addClass("crash_detail");                 var crash_infos = sout_dir['CRASH']['Crash_info'];                 if($("#crash_span:has(div)").length){                     $("#crash_span>div").remove();                 };                 for(crash_info in crash_infos ){                     $("#crash_span").append("<div style='height:25px;color:red;'>"+crash_infos[crash_info]+"</div>");                 };             };             var Acount = sout_dir['ANR']['Acount'];             if(Acount==0){                 $("#anr_td").text("0");             }else{                 $("#anr_td").text(Acount);                 $("#anr_td").addClass("anr_detail");                 var anr_infos = sout_dir['ANR']['Anr_info'];                 if($("#anr_span:has(div)").length){                     $("#anr_span>div").remove();                 };                 for(anr_info in anr_infos ){                     $("#anr_span").append("<div style='height:25px;color:red;'>"+anr_infos[anr_info]+"</div>");                 };             };             if (sout_dir['result_info']){                 $("#result_td").text(sout_dir['result_info'])             }else{                 $("#result_td").text("执行失败!");             }         }     }) }); $("#exception_td").click(function () {     var hide_ex = $("#Except_tr").attr("class");     if($("#except_span:has(div)").length){         if(hide_ex == "hide"){             $("#Except_tr").removeClass("hide");         }else{             $("#Except_tr").addClass("hide");         }     } }); $("#crash_td").click(function () {     var hide_cr = $("#crash_td").attr("class");     if($("#crash_span:has(div)").length){         if(hide_cr == "hide"){             $("#crash_tr").removeClass("hide");         }else{             $("#crash_tr").addClass("hide");         }     } }); $("#anr_td").click(function () {     var hide_anr = $("#anr_tr").attr("class");     if($("#anr_span:has(div)").length){          if(hide_anr == "hide"){             $("#anr_tr").removeClass("hide");         }else{             $("#anr_tr").addClass("hide");         }     } });

3)本机接收到命令后执行并过滤日志,返回数据;

salve.py完整代码:

 
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 import flask,redis,os,socket from flask import request from subprocess import * import shlex,time,datetime,re,json def check_salve():     try:         import redis         import flask     except Exception as e:         if 'redis' in e:             quit('运行salve节点需要装redis模块')         elif 'flask' in e:             quit('运行salve节点需要装flask模块')   def reg_salve():     #把salve节点注册到服务端的redis里面     myname = socket.getfqdn(socket.gethostname())     myaddr = socket.gethostbyname(myname) #获取本机ip     r=redis.Redis(host='10.103.27.223',port=6379)#这里写服务端redis的ip     salve_key = 'salves'     r.hset(salve_key,myname,myaddr) #set key,哈希类型,大key是 salves,小key是 salve节点的主机名,value是子节点ip check_salve() reg_salve() server = flask.Flask(__name__) @server.route('/') def run():     callback = request.values.get('callback')     #判断真机连接状态     check_command = "adb devices"     check_command = shlex.split(check_command)     check_status = Popen(check_command,bufsize=0,shell=True,stdout=PIPE,stderr=PIPE)     check_infos = check_status.stdout.read()     check_infos_new = check_infos.strip().replace("\r","").replace("\t"," ").split("\n") #对获取到的数据进行过滤并按照\n切割成列表     command_old = "adb shell monkey -p com.laijin.simplefinance -s 500 --pct-touch 20  --pct-motion  20 --pct-trackball 20  --throttle 100 --ignore-crashes --ignore-timeouts --monitor-native-crashes -v -v 3000"     command = shlex.split(command_old)  # 将获取到的命令切割成列表     # 如果列表最后包含device字样,表示设备已连接成功     if "device" in check_infos_new[-1]:         print(u"---------设备连接成功,开始执行命令~!--------------")         res= Popen(command,bufsize=0,shell=True,stdout=PIPE,stderr=PIPE)         filelines = res.stdout.readlines()         # 准备日志分析         str1 = '.*ANR.*'         str2 = '.*CRASH.*'         str3 = '.*Exception.*'         str4 = '.*finished.*'         Acount, Ccount, Ecount = 0, 0, 0         Anr_info = []         Crash_info = []         Exception_info = []         result_info = ""         # 如获取到的信息为空,说明端口被占用,需杀掉占用端口的进程         if len(filelines) == 0:             query_command = "netstat -ano |findstr '5037'"             query_command = shlex.split(query_command)             query_info = Popen(query_command, bufsize=0, shell=True, stdout=PIPE, stderr=PIPE)             query_infos = query_info.stdout.readlines()             for q in query_infos:                 q_list = q.strip().split(" ")                 while '' in q_list:                     q_list.remove('')                 if q_list[-2] == "LISTENING":                     result_info = u"端口号被占用,请杀死进程号为%s的进程后重试!"%q_list[-1]             Exception_info = ""             Ecount = 0             Anr_info = ""             Acount = 0             Crash_info = ""             Ccount = 0         else:             #执行monkey命令并返回             for i in filelines:                 i = i.strip()                 if re.match(str1, i):                     print u'测试过程中出现程序无响应,具体内容为:\n', i                     Anr_info.append(i)                     Acount += 1                 elif re.match(str2, i):                     print u'测试过程中出现程序崩溃,具体内容为:\n', i                     Crash_info.append(i)                     Ccount += 1                 elif re.match(str3, i):                     print u'测试过程中出现程序异常,异体内容为:\n', i                     Exception_info.append(i)                     Ecount += 1                 # 如果存在任何异常则不用判断日志是否正常完成             if Acount or Ccount or Ecount == 0:                 for i in filelines:                     if re.match(str4, i):                         print u'测试过程中正常'                         result_info = u"测试过程中正常"     else:         print u"------------设备连接异常,请校验后重试!---------------"         result_info = u"设备连接异常,请校验后重试!"         Exception_info = ""         Ecount=0         Anr_info = ""         Acount=0         Crash_info=""         Ccount=0     sout_dir = {         'ERROR':{             "Exception_info":Exception_info,             "Exception_count":Ecount         },         'ANR':{             "Anr_info":Anr_info,             "Acount":Acount         },         'CRASH':{             "Crash_info":Crash_info,             "Ccount":Ccount         },         'result_info':result_info,         'command':command_old     }     return ''.join([         callback,         '(',         json.dumps(sout_dir),         ');'     ]) server.run(host='0.0.0.0',port=8989)

4)平台接收到数据,通过html模板展示;

遗留问题:

1. 端口被占用时,应自动杀死占用端口的进程后重新执行进程;(目前发现占用端口的为360手机助手,无法单独杀死进程,暂放弃);

2.本地修改salve.py文件后,需手动杀死adb.exe进程,再重新运行salve.py文件;

最终效果图:

标签:info,hide,monkey,安卓,salve,command,anr,crash,日志
来源: https://www.cnblogs.com/cocc/p/12365622.html