GMS Express Plus & Go Requirement - 10/2018

GMS EXpress Plus & Go Requirement - 10/2018 (GMS Express and Express Plus are not available in Russia)

From 1st of October 2018, Files (earlier Files Go) will become an exclusive requirement for the regular GMS Express Plus program. It is already an exclusive requirement for GMS Express Plus for Go. Please take note and plan accordingly.

继续阅读“GMS Express Plus & Go Requirement - 10/2018”

【8.1R7】GtsPlacementTestCases 下6条CaseFail

[DESCRIPTION]
GtsPlacementTestCases 下6条CaseFail
com.google.android.placement.gts.DefaultIntentTest#testDefaultIntentHandlers
com.google.android.placement.gts.HomescreenLayoutTest#testFolderPlacement
com.google.android.placement.gts.HomescreenLayoutTest#testShortcutPlacement
com.google.android.placement.gts.HomescreenLayoutTest#testWidgetPlacement
com.google.android.placement.gts.InstalledAppsTest#testAppsInstalled
com.google.android.placement.gts.InstalledAppsTest#testSystemAppsInstalled

第一种报错信息:
java.lang.AssertionError: Unable to execute because authorization failed, please ensure the service account key is properly installed..

继续阅读“【8.1R7】GtsPlacementTestCases 下6条CaseFail”

Updated headset information for USB Audio CTS Tests 音频测试

Headset information for USB Audio CTS Tests on source.android.com has been updated with headsets approved and known to be compatible with associated CTS tests. Due to the short notice of peripheral update, CTS Verifier 8.0 R11 and CTS Verifier 8.1 R7 releases will not be enforced. However, we encourage the use of CTS Verifier 8.0 R11 and 8.1 R7 releases, if partners are already using the newly listed compatible headsets. Partners should update audio peripherals soon according toUSB Audio CTS Tests, as they will be necessary when running CTS Verifier 8.0 R12 and 8.1 R8 releases.

继续阅读“Updated headset information for USB Audio CTS Tests 音频测试”

Test suites and GMS releases required-use date

Test suites and GMS releases required-use date

This month we have updated releases for the test suites listed below, as well as the GMS package itself.

These versions will be required for GMS approvals as described in the table below:

Release

Release version

Required-use date

CTS

8.1 R8, 8.0 R12, 7.1 R20, 7.0 R24, 6.0 R31

2018-9-20

VTS

8.1_r5, 8.0_r8 w Sept SPLs

2018-9-20

GMS

8.1_201808, 8.0_201808

2018-10-16

CTS August releases are available

CTS August releases are available

The Android Compatibility Test Suite (CTS) August releases for Android 8.1, 8.0, 7.1, 7.0 and 6.0 are available on the CTS Downloads page of source.android.com. These releases contain continuous improvements of tests and test infrastructure and verify security patches up to July 2018 Public Security Bulletin.

Details are available in the following change lists:

继续阅读“CTS August releases are available”

针对CTS,GTS测试过程中,在profile_provisioning流程分析与常见解决方案

[DESCRIPTION]

由于目前所有的手机都要求支持Android for work, 客户在测试CTS,GTS过程中,经常在profile_provisioning的过程中出错,这边对经常出错的地方进行分析,并提供对应的解决方案

[SOLUTION]

继续阅读“针对CTS,GTS测试过程中,在profile_provisioning流程分析与常见解决方案”

广升ADUPS FOTA 过认证信息更新

- ADUPS has recently released a patched version for com.adups.fota (version 5.22), that must be used for all new builds submitted to Google

- Google will continue rejecting and blocking any new build(s) submitted with com.adups.fota version 5.16 or older

- If you are using ADUPS as your FOTA provider, updates will be pushed to devices already active in the ecosystem automatically and no further action is required for those devices

- All new builds submitted to Google from hereon need to use ADUPS com.adups.fota version 5.22 or newer, or need to use an alternative FOTA solution

什么是BTS?Build Test Suite (System Image Scanning)

Build Test Suite (System Image Scanning)

The Build Test Suite (BTS) operates directly on software builds. It scans device images for preloaded malware and other Potentially Harmful Applications (PHAs) that may have been introduced by OEMs' vendors and suppliers. BTS incorporates the same technology currently used for security scanning and analysis of applications installed via Google Play.

Starting April 1st, 2018, all partners MUST begin uploading their software builds to Google as described in their partnership agreements. Submission of software builds will be in addition to the existing test reports required for Google build approval.

Note: Partners are still responsible for vetting and reviewing all software that is distributed on their devices. Google continuously updates our databases and detection techniques for malware and security threats, but we may not always be able to detect an issue at the time of your build submission.

Submitting builds for BTS

Partners must submit whole software builds. Submissions of individual APKs are not supported. Google only scans APKs in the context of the whole build. As BTS develops, we will look beyond just the APKs in the filesystem images.

Enrollment for MADA partners

Partners can upload software builds in one of the following ways:

  1. Google Drive: Your TAM will share a Google Drive folder that you can copy your builds to.
  2. SFTP Dropbox: You can ask your TAM to set up a Secure File Transfer Protocol (SFTP) account for you so that you can upload your build software.
  3. Submission via 3PL: Submit firmware to your 3PL certifier using one of the supported formats.

Submit software builds

For each build that you submit to APFE, you should upload a single compressed archive (.zip, .rar, or .tgz) containing the Software Build in a supported formatThe archive should be named according to the build fingerprint, substituting forward slashes ("/") and colons (":") with tildes ("~"). This helps reconcile the file with the reports in APFE.

Example:
If you have a zip file containing partition images that can be flashed using fastboot for a build with the fingerprint: acme/acme_1/acme_3g:7.0/NRD90M/123456789:user/release-keys
the file should be named:
acme~acme_1~acme_3g~7.0~NRD90M~123456789~user~release-keys.zip

Partners may submit additional software builds, although these submissions should be accompanied by at least a signature CTS report in APFE so that the results are available. Early submissions may help identify issues early on in the build process. We discourage submitting daily or continuous integration builds as those provide limited usefulness.

Build Test Suite analysis

BTS runs automatically on Google's infrastructure in the background. The process depends on internal services that cannot be made available offline.

When BTS finishes, the results appear on APFE.

Build approval

If BTS does not detect any issues, then the build approval process will proceed as normal, subject to the results of other test reports uploaded.

Any suspected PHAs or other issue will be treated as test failure and will prevent build approval. Google can only share the package name and class of malware for any PHA. We cannot provide details on the possible impact of the PHA, its behavior, or how that behavior was detected.

If Google finds an issue after the build has been approved, your TAM will contact you. Partners must address new issues promptly and release an updated build that fixes the issue in accordance with their partnership agreements. New builds that still contain the issue will not be approved.

If you believe that an APK was incorrectly flagged, escalate to your TAM and provide as much detail as possible about the intended functionality of the app. Include details about the file's origin, particularly if it was made in-house or by a supplier. Google will investigate and deal with these apps on a case-by-case basis.

Supported software build formats

Fastboot package

BTS requires the following partition images in a .zip (PKZIP) or .tgz (gzipped unix .tar) file:

  • system.img - The filesystem image mounted at /system on the device.
  • vendor.img - The filesystem image mounted at /vendor on the device.
  • oem.img - The filesystem image mounted at /oem on the device.
  • userdata.img - The filesystem image mounted at /data on the device. This is especially important if you pre-load or cache applications in the data partition to improve the out-of-box (OOB) boot time.
  • boot.img - The Linux Kernel and Ramdisk used to boot Android.
  • recover.img - The recovery image that the Linux Kernel and Ramdisk use for the device to boot to during recovery or to handle the command adb reboot recovery.
Note: The vendor.img and oem.img are only required if the build uses separate vendor and oem partitions, otherwise it is expected this content is part of the system image.

The images and filenames above are produced by the AOSP build system, and they can be applied to an unlocked OEM device using fastboot if the device's bootloader support fastboot.

These filesystem images should be in Ext4, SquashFS, or F2FS format. Partners should use the sparse format for the partition image to reduce the space and upload size for filesystems with free space on them.

Other firmware formats

Google supports the following firmware formats used by various OEM, ODM, and SOC flashing tools:

  • Mediatek firmware used with Mediatek's spflashtool
  • Spreadtrum PAC file format1
  • Qualcomm's QFIL format
  • .NB0 format

Partners whose firmware is available in one of these formats may upload those formats, in a .zip, .tgz, or .rar file, instead of a fastboot archive. If you cannot provide firmware in one of the known formats, reach out to your TAM.

Note: Google does not accept firmware in self-extracting executables and does not accept password protected archive files.

Requesting an SFTP account

Larger OEMs may prefer submitting builds using SFTP because

  • SFTP does not require Google Drive quota.
  • BTS begins as soon as the upload completes.
  • Partners can use a wide range of SFTP client software.
  • SFTP is easier to integrate into automated build, QA review, and submission processes.

Contact your TAM to set up an SFTP account for uploading firmware images. You will need to generate an SSH2 RSA identity key pair for authentication and share the public key with your TAM. Once your SFTP account and dropbox have been configured, your TAM will provide you with the connection details for your SFTP account.

Generating an SSH Identity key pair

On Linux, use the following command, replacing "my_key" with a suitable key name:

$ ssh-keygen -t rsa -f my_key

This command will generate a private key, my_key, and a public key, my_key.pub. Your TAM will need the public key to set up your SFTP account.

Partners using a Microsoft Windows system can use the PuTTY client to generate SSH keys following these instructions.

Notes


  1. It is strongly recommended to compress Spreadtrum '.pac' files to reduce the amount of data that needs to be uploaded. 

CTS 9.0 R1 released, new Android 9 platform and partner docs available

Android 9

Android 9 is the release of the development milestone code-named P. The source code for the following tests, including tests for instant apps, can be synced with the 'android-cts-9.0_r1' tag in the open-source tree.

MTK平台Google OTA (GOTA) 支持情况

GOTA是google开发的。

服务器是用google的,客户不用自己搭建,只需要向google申请账号。
而手机(client 端)的app也是google开发的,放在GMS包内,所以贵司的项目需要安装GMS包。
贵司还需要把projectconfig.mk中的MTK_SYSTEM_UPDATE设为no,安装GMS包之后,
手机设置settings-> About phone ->check是否有版本更新的入口。

继续阅读“MTK平台Google OTA (GOTA) 支持情况”

广升FOTA升级对GMS认证的影响

近期很多送测谷歌的项目因广升FOTA升级被谷歌退回,据了解是广升FOTA存在未经用户授权和知情的情况安装或升级应用。谷歌认为设备中包含广升FOTA会使GPP被禁用,而GPP是GMS设备安全核心的一部分。

3PL实验室建议急需送测的设备不要使用广升FOTA,或联系广升FOTA FAE提供解决方案,相信广升会提供符合GMS认证测试并删除FOTA本身自动更新的功能的版本。需要等认证结果进一步确认。

Android O版本 行为变更

Android O 除了提供诸多新特性和功能外,还对系统和 API 行为做出了各种变更。本文重点介绍您应该了解并在开发应用时加以考虑的一些主要变更。

其中大部分变更会影响所有应用,而不论应用针对的是何种版本的 Android。不过,有几项变更仅影响针对 Android O 的应用。为清楚起见,本页面分为两个部分:针对所有 API 级别的应用针对 Android O 的应用

继续阅读“Android O版本 行为变更”

什么是STS?(Security Test Suite)

Security Test Suite 安全测试套件

每月合作伙伴预览安全公告列出了设备制造商修复其设备的安全漏洞。 Android安全测试套件(STS)验证Android设备上是否解决了这些安全漏洞。 每月使用合作伙伴预览安全公告更新STS。 STS帮助合作伙伴验证:

安全补丁正确应用
相应的安全漏洞已修复
设备本身无安全漏洞

继续阅读“什么是STS?(Security Test Suite)”