blob: 6802c727abce0fb17f703936611ae90da12cbdbe [file] [log] [blame]
J. Richard Barnette24adbf42012-04-11 15:04:53 -07001# Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
Dale Curtisaa5eedb2011-08-23 16:18:52 -07002# Use of this source code is governed by a BSD-style license that can be
3# found in the LICENSE file.
4
mussa584b4462014-06-20 15:13:28 -07005import ConfigParser
Aviv Keshet74c89a92013-02-04 15:18:30 -08006import functools
Christopher Wiley0ed712b2013-04-09 15:25:12 -07007import httplib
J. Richard Barnette1d78b012012-05-15 13:56:30 -07008import logging
Dan Shi0f466e82013-02-22 15:44:58 -08009import os
Simran Basid5e5e272012-09-24 15:23:59 -070010import re
Christopher Wileyd78249a2013-03-01 13:05:31 -080011import socket
J. Richard Barnette1d78b012012-05-15 13:56:30 -070012import subprocess
J. Richard Barnette134ec2c2012-04-25 12:59:37 -070013import time
J. Richard Barnette1d78b012012-05-15 13:56:30 -070014import xmlrpclib
J. Richard Barnette134ec2c2012-04-25 12:59:37 -070015
mussa584b4462014-06-20 15:13:28 -070016import common
J. Richard Barnette45e93de2012-04-11 17:24:15 -070017from autotest_lib.client.bin import utils
Dan Shi9cb0eec2014-06-03 09:04:50 -070018from autotest_lib.client.common_lib import autotemp
Richard Barnette0c73ffc2012-11-19 15:21:18 -080019from autotest_lib.client.common_lib import error
20from autotest_lib.client.common_lib import global_config
Dan Shi549fb822015-03-24 18:01:11 -070021from autotest_lib.client.common_lib import lsbrelease_utils
J. Richard Barnette45e93de2012-04-11 17:24:15 -070022from autotest_lib.client.common_lib.cros import autoupdater
Richard Barnette03a0c132012-11-05 12:40:35 -080023from autotest_lib.client.common_lib.cros import dev_server
Christopher Wileyd78249a2013-03-01 13:05:31 -080024from autotest_lib.client.common_lib.cros import retry
Gabe Blackb72f4fb2015-01-20 16:47:13 -080025from autotest_lib.client.common_lib.cros.graphite import autotest_es
Gabe Black1e1c41b2015-02-04 23:55:15 -080026from autotest_lib.client.common_lib.cros.graphite import autotest_stats
MK Ryu35d661e2014-09-25 17:44:10 -070027from autotest_lib.client.cros import constants as client_constants
J. Richard Barnette84890bd2014-02-21 11:05:47 -080028from autotest_lib.client.cros import cros_ui
Cheng-Yi Chiangf4104ff2014-12-23 19:39:01 +080029from autotest_lib.client.cros.audio import cras_utils
MK Ryu35d661e2014-09-25 17:44:10 -070030from autotest_lib.server import autoserv_parser
31from autotest_lib.server import autotest
32from autotest_lib.server import constants
33from autotest_lib.server import crashcollect
Dan Shia1ecd5c2013-06-06 11:21:31 -070034from autotest_lib.server import utils as server_utils
Dan Shi9cb0eec2014-06-03 09:04:50 -070035from autotest_lib.server.cros import provision
Scott Zawalski89c44dd2013-02-26 09:28:02 -050036from autotest_lib.server.cros.dynamic_suite import constants as ds_constants
Simran Basi5e6339a2013-03-21 11:34:32 -070037from autotest_lib.server.cros.dynamic_suite import tools, frontend_wrappers
Dan Shi9cb0eec2014-06-03 09:04:50 -070038from autotest_lib.server.cros.faft.config.config import Config as FAFTConfig
Fang Deng96667ca2013-08-01 17:46:18 -070039from autotest_lib.server.hosts import abstract_ssh
Tom Wai-Hong Tamefe1c7f2014-01-02 14:00:11 +080040from autotest_lib.server.hosts import chameleon_host
Fang Deng5d518f42013-08-02 14:04:32 -070041from autotest_lib.server.hosts import servo_host
Simran Basidcff4252012-11-20 16:13:20 -080042from autotest_lib.site_utils.rpm_control_system import rpm_client
Simran Basid5e5e272012-09-24 15:23:59 -070043
44
beeps32a63082013-08-22 14:02:29 -070045try:
46 import jsonrpclib
47except ImportError:
48 jsonrpclib = None
Fang Deng96667ca2013-08-01 17:46:18 -070049
Fang Dengd1c2b732013-08-20 12:59:46 -070050
beepsc87ff602013-07-31 21:53:00 -070051class FactoryImageCheckerException(error.AutoservError):
52 """Exception raised when an image is a factory image."""
53 pass
54
55
Aviv Keshet74c89a92013-02-04 15:18:30 -080056def add_label_detector(label_function_list, label_list=None, label=None):
57 """Decorator used to group functions together into the provided list.
58 @param label_function_list: List of label detecting functions to add
59 decorated function to.
60 @param label_list: List of detectable labels to add detectable labels to.
61 (Default: None)
62 @param label: Label string that is detectable by this detection function
63 (Default: None)
J. Richard Barnette7214e0b2013-02-06 15:20:49 -080064 """
Simran Basic6f1f7a2012-10-16 10:47:46 -070065 def add_func(func):
Aviv Keshet74c89a92013-02-04 15:18:30 -080066 """
67 @param func: The function to be added as a detector.
68 """
69 label_function_list.append(func)
70 if label and label_list is not None:
71 label_list.append(label)
Simran Basic6f1f7a2012-10-16 10:47:46 -070072 return func
73 return add_func
74
75
Fang Deng0ca40e22013-08-27 17:47:44 -070076class CrosHost(abstract_ssh.AbstractSSHHost):
J. Richard Barnette45e93de2012-04-11 17:24:15 -070077 """Chromium OS specific subclass of Host."""
78
79 _parser = autoserv_parser.autoserv_parser
Scott Zawalski62bacae2013-03-05 10:40:32 -050080 _AFE = frontend_wrappers.RetryingAFE(timeout_min=5, delay_sec=10)
J. Richard Barnette45e93de2012-04-11 17:24:15 -070081
Richard Barnette03a0c132012-11-05 12:40:35 -080082 # Timeout values (in seconds) associated with various Chrome OS
83 # state changes.
J. Richard Barnette134ec2c2012-04-25 12:59:37 -070084 #
Richard Barnette0c73ffc2012-11-19 15:21:18 -080085 # In general, a good rule of thumb is that the timeout can be up
86 # to twice the typical measured value on the slowest platform.
87 # The times here have not necessarily been empirically tested to
88 # meet this criterion.
J. Richard Barnetteeb69d722012-06-18 17:29:44 -070089 #
90 # SLEEP_TIMEOUT: Time to allow for suspend to memory.
Richard Barnette0c73ffc2012-11-19 15:21:18 -080091 # RESUME_TIMEOUT: Time to allow for resume after suspend, plus
92 # time to restart the netwowrk.
J. Richard Barnette84890bd2014-02-21 11:05:47 -080093 # SHUTDOWN_TIMEOUT: Time to allow for shut down.
J. Richard Barnetteeb69d722012-06-18 17:29:44 -070094 # BOOT_TIMEOUT: Time to allow for boot from power off. Among
Richard Barnette0c73ffc2012-11-19 15:21:18 -080095 # other things, this must account for the 30 second dev-mode
J. Richard Barnetted4649c62013-03-06 17:42:27 -080096 # screen delay and time to start the network.
J. Richard Barnetteeb69d722012-06-18 17:29:44 -070097 # USB_BOOT_TIMEOUT: Time to allow for boot from a USB device,
Richard Barnette0c73ffc2012-11-19 15:21:18 -080098 # including the 30 second dev-mode delay and time to start the
J. Richard Barnetted4649c62013-03-06 17:42:27 -080099 # network.
beepsf079cfb2013-09-18 17:49:51 -0700100 # INSTALL_TIMEOUT: Time to allow for chromeos-install.
J. Richard Barnette84890bd2014-02-21 11:05:47 -0800101 # POWERWASH_BOOT_TIMEOUT: Time to allow for a reboot that
102 # includes powerwash.
J. Richard Barnetteeb69d722012-06-18 17:29:44 -0700103
104 SLEEP_TIMEOUT = 2
J. Richard Barnetted4649c62013-03-06 17:42:27 -0800105 RESUME_TIMEOUT = 10
Tom Wai-Hong Tamfe005c22014-12-03 09:25:44 +0800106 SHUTDOWN_TIMEOUT = 10
J. Richard Barnettefbcc7122013-07-24 18:24:59 -0700107 BOOT_TIMEOUT = 60
J. Richard Barnetteeb69d722012-06-18 17:29:44 -0700108 USB_BOOT_TIMEOUT = 150
J. Richard Barnette7817b052014-08-28 09:47:29 -0700109 INSTALL_TIMEOUT = 480
Dan Shi2c88eed2013-11-12 10:18:38 -0800110 POWERWASH_BOOT_TIMEOUT = 60
Chris Sosab76e0ee2013-05-22 16:55:41 -0700111
J. Richard Barnette84890bd2014-02-21 11:05:47 -0800112 # REBOOT_TIMEOUT: How long to wait for a reboot.
113 #
Chris Sosab76e0ee2013-05-22 16:55:41 -0700114 # We have a long timeout to ensure we don't flakily fail due to other
115 # issues. Shorter timeouts are vetted in platform_RebootAfterUpdate.
Simran Basi1160e2c2013-10-04 16:00:24 -0700116 # TODO(sbasi - crbug.com/276094) Restore to 5 mins once the 'host did not
117 # return from reboot' bug is solved.
118 REBOOT_TIMEOUT = 480
Chris Sosab76e0ee2013-05-22 16:55:41 -0700119
Ismail Noorbasha07fdb612013-02-14 14:13:31 -0800120 # _USB_POWER_TIMEOUT: Time to allow for USB to power toggle ON and OFF.
121 # _POWER_CYCLE_TIMEOUT: Time to allow for manual power cycle.
122 _USB_POWER_TIMEOUT = 5
123 _POWER_CYCLE_TIMEOUT = 10
124
beeps32a63082013-08-22 14:02:29 -0700125 _RPC_PROXY_URL = 'http://localhost:%d'
Christopher Wileydd181852013-10-10 19:56:58 -0700126 _RPC_SHUTDOWN_POLLING_PERIOD_SECONDS = 2
Peter Qiu4410db72014-06-05 10:32:41 -0700127 # Set shutdown timeout to account for the time for restarting the UI.
128 _RPC_SHUTDOWN_TIMEOUT_SECONDS = cros_ui.RESTART_UI_TIMEOUT
Richard Barnette0c73ffc2012-11-19 15:21:18 -0800129
Richard Barnette82c35912012-11-20 10:09:10 -0800130 _RPM_RECOVERY_BOARDS = global_config.global_config.get_config_value('CROS',
131 'rpm_recovery_boards', type=str).split(',')
132
133 _MAX_POWER_CYCLE_ATTEMPTS = 6
134 _LAB_MACHINE_FILE = '/mnt/stateful_partition/.labmachine'
Fang Dengdeba14f2014-11-14 11:54:09 -0800135 _RPM_HOSTNAME_REGEX = ('chromeos(\d+)(-row(\d+))?-rack(\d+[a-z]*)'
136 '-host(\d+)')
Gwendal Grignoua66f1d12014-12-03 10:07:26 -0800137 _LIGHT_SENSOR_FILES = [ "in_illuminance0_input",
138 "in_illuminance_input",
139 "in_illuminance0_raw",
140 "in_illuminance_raw",
141 "illuminance0_input"]
Richard Barnette82c35912012-11-20 10:09:10 -0800142 _LIGHTSENSOR_SEARCH_DIR = '/sys/bus/iio/devices'
143 _LABEL_FUNCTIONS = []
Aviv Keshet74c89a92013-02-04 15:18:30 -0800144 _DETECTABLE_LABELS = []
145 label_decorator = functools.partial(add_label_detector, _LABEL_FUNCTIONS,
146 _DETECTABLE_LABELS)
J. Richard Barnette134ec2c2012-04-25 12:59:37 -0700147
J. Richard Barnetteb6de7e32013-02-14 13:28:04 -0800148 # Constants used in ping_wait_up() and ping_wait_down().
149 #
150 # _PING_WAIT_COUNT is the approximate number of polling
151 # cycles to use when waiting for a host state change.
152 #
153 # _PING_STATUS_DOWN and _PING_STATUS_UP are names used
154 # for arguments to the internal _ping_wait_for_status()
155 # method.
156 _PING_WAIT_COUNT = 40
157 _PING_STATUS_DOWN = False
158 _PING_STATUS_UP = True
159
Ismail Noorbasha07fdb612013-02-14 14:13:31 -0800160 # Allowed values for the power_method argument.
161
162 # POWER_CONTROL_RPM: Passed as default arg for power_off/on/cycle() methods.
163 # POWER_CONTROL_SERVO: Used in set_power() and power_cycle() methods.
164 # POWER_CONTROL_MANUAL: Used in set_power() and power_cycle() methods.
165 POWER_CONTROL_RPM = 'RPM'
166 POWER_CONTROL_SERVO = 'servoj10'
167 POWER_CONTROL_MANUAL = 'manual'
168
169 POWER_CONTROL_VALID_ARGS = (POWER_CONTROL_RPM,
170 POWER_CONTROL_SERVO,
171 POWER_CONTROL_MANUAL)
Richard Barnette0c73ffc2012-11-19 15:21:18 -0800172
Simran Basi5e6339a2013-03-21 11:34:32 -0700173 _RPM_OUTLET_CHANGED = 'outlet_changed'
174
Dan Shi9cb0eec2014-06-03 09:04:50 -0700175 # URL pattern to download firmware image.
176 _FW_IMAGE_URL_PATTERN = global_config.global_config.get_config_value(
177 'CROS', 'firmware_url_pattern', type=str)
beeps687243d2013-07-18 15:29:27 -0700178
MK Ryu35d661e2014-09-25 17:44:10 -0700179 # File that has a list of directories to be collected
180 _LOGS_TO_COLLECT_FILE = os.path.join(
181 common.client_dir, 'common_lib', 'logs_to_collect')
182
183 # Prefix of logging message w.r.t. crash collection
184 _CRASHLOGS_PREFIX = 'collect_crashlogs'
185
186 # Time duration waiting for host up/down check
187 _CHECK_HOST_UP_TIMEOUT_SECS = 15
188
189 # A command that interacts with kernel and hardware (e.g., rm, mkdir, etc)
190 # might not be completely done deep through the hardware when the machine
191 # is powered down right after the command returns.
192 # We should wait for a few seconds to make them done. Finger crossed.
193 _SAFE_WAIT_SECS = 10
194
195
J. Richard Barnette964fba02012-10-24 17:34:29 -0700196 @staticmethod
beeps46dadc92013-11-07 14:07:10 -0800197 def check_host(host, timeout=10):
198 """
199 Check if the given host is a chrome-os host.
200
201 @param host: An ssh host representing a device.
202 @param timeout: The timeout for the run command.
203
204 @return: True if the host device is chromeos.
205
beeps46dadc92013-11-07 14:07:10 -0800206 """
207 try:
Christopher Wiley1ea80942014-02-26 16:45:08 -0800208 result = host.run('grep -q CHROMEOS /etc/lsb-release && '
Simran Basie5f7ae42014-06-26 15:44:06 -0700209 '! which adb >/dev/null 2>&1 && '
210 '! grep -q moblab /etc/lsb-release',
Christopher Wileyfc3eac02013-11-21 16:24:57 -0800211 ignore_status=True, timeout=timeout)
beeps46dadc92013-11-07 14:07:10 -0800212 except (error.AutoservRunError, error.AutoservSSHTimeout):
213 return False
214 return result.exit_status == 0
215
216
217 @staticmethod
Tom Wai-Hong Tamefe1c7f2014-01-02 14:00:11 +0800218 def _extract_arguments(args_dict, key_subset):
219 """Extract options from `args_dict` and return a subset result.
J. Richard Barnette7214e0b2013-02-06 15:20:49 -0800220
221 Take the provided dictionary of argument options and return
Tom Wai-Hong Tamefe1c7f2014-01-02 14:00:11 +0800222 a subset that represent standard arguments needed to construct
223 a test-assistant object (chameleon or servo) for a host. The
224 intent is to provide standard argument processing from
225 run_remote_tests for tests that require a test-assistant board
226 to operate.
227
228 @param args_dict Dictionary from which to extract the arguments.
229 @param key_subset Tuple of keys to extract from the args_dict, e.g.
230 ('servo_host', 'servo_port').
231 """
232 result = {}
233 for arg in key_subset:
234 if arg in args_dict:
235 result[arg] = args_dict[arg]
236 return result
237
238
239 @staticmethod
240 def get_chameleon_arguments(args_dict):
241 """Extract chameleon options from `args_dict` and return the result.
242
243 Recommended usage:
244 ~~~~~~~~
245 args_dict = utils.args_to_dict(args)
246 chameleon_args = hosts.CrosHost.get_chameleon_arguments(args_dict)
247 host = hosts.create_host(machine, chameleon_args=chameleon_args)
248 ~~~~~~~~
249
250 @param args_dict Dictionary from which to extract the chameleon
251 arguments.
252 """
253 return CrosHost._extract_arguments(
254 args_dict, ('chameleon_host', 'chameleon_port'))
255
256
257 @staticmethod
258 def get_servo_arguments(args_dict):
259 """Extract servo options from `args_dict` and return the result.
J. Richard Barnette7214e0b2013-02-06 15:20:49 -0800260
261 Recommended usage:
262 ~~~~~~~~
263 args_dict = utils.args_to_dict(args)
Fang Deng0ca40e22013-08-27 17:47:44 -0700264 servo_args = hosts.CrosHost.get_servo_arguments(args_dict)
J. Richard Barnette7214e0b2013-02-06 15:20:49 -0800265 host = hosts.create_host(machine, servo_args=servo_args)
266 ~~~~~~~~
267
268 @param args_dict Dictionary from which to extract the servo
269 arguments.
270 """
Tom Wai-Hong Tamefe1c7f2014-01-02 14:00:11 +0800271 return CrosHost._extract_arguments(
272 args_dict, ('servo_host', 'servo_port'))
J. Richard Barnette134ec2c2012-04-25 12:59:37 -0700273
J. Richard Barnette964fba02012-10-24 17:34:29 -0700274
Tom Wai-Hong Tamefe1c7f2014-01-02 14:00:11 +0800275 def _initialize(self, hostname, chameleon_args=None, servo_args=None,
Fang Denge545abb2014-12-30 18:43:47 -0800276 try_lab_servo=False, ssh_verbosity_flag='', ssh_options='',
Fang Dengd1c2b732013-08-20 12:59:46 -0700277 *args, **dargs):
Tom Wai-Hong Tamefe1c7f2014-01-02 14:00:11 +0800278 """Initialize superclasses, |self.chameleon|, and |self.servo|.
J. Richard Barnette67ccb872012-04-19 16:34:56 -0700279
Fang Denge545abb2014-12-30 18:43:47 -0800280 This method will attempt to create the test-assistant object
281 (chameleon/servo) when it is needed by the test. Check
282 the docstring of chameleon_host.create_chameleon_host and
283 servo_host.create_servo_host for how this is determined.
Fang Deng5d518f42013-08-02 14:04:32 -0700284
Fang Denge545abb2014-12-30 18:43:47 -0800285 @param hostname: Hostname of the dut.
286 @param chameleon_args: A dictionary that contains args for creating
287 a ChameleonHost. See chameleon_host for details.
288 @param servo_args: A dictionary that contains args for creating
289 a ServoHost object. See servo_host for details.
290 @param try_lab_servo: Boolean, False indicates that ServoHost should
291 not be created for a device in Cros test lab.
292 See servo_host for details.
293 @param ssh_verbosity_flag: String, to pass to the ssh command to control
294 verbosity.
295 @param ssh_options: String, other ssh options to pass to the ssh
296 command.
J. Richard Barnette67ccb872012-04-19 16:34:56 -0700297 """
Fang Deng0ca40e22013-08-27 17:47:44 -0700298 super(CrosHost, self)._initialize(hostname=hostname,
J. Richard Barnette45e93de2012-04-11 17:24:15 -0700299 *args, **dargs)
J. Richard Barnettef0859852012-08-20 14:55:50 -0700300 # self.env is a dictionary of environment variable settings
301 # to be exported for commands run on the host.
302 # LIBC_FATAL_STDERR_ can be useful for diagnosing certain
303 # errors that might happen.
304 self.env['LIBC_FATAL_STDERR_'] = '1'
beeps32a63082013-08-22 14:02:29 -0700305 self._rpc_proxy_map = {}
Fang Dengd1c2b732013-08-20 12:59:46 -0700306 self._ssh_verbosity_flag = ssh_verbosity_flag
Aviv Keshetc5947fa2013-09-04 14:06:29 -0700307 self._ssh_options = ssh_options
Fang Deng5d518f42013-08-02 14:04:32 -0700308 # TODO(fdeng): We need to simplify the
309 # process of servo and servo_host initialization.
310 # crbug.com/298432
Fang Denge545abb2014-12-30 18:43:47 -0800311 self._servo_host = servo_host.create_servo_host(
312 dut=self.hostname, servo_args=servo_args,
313 try_lab_servo=try_lab_servo)
Tom Wai-Hong Tamefe1c7f2014-01-02 14:00:11 +0800314 # TODO(waihong): Do the simplication on Chameleon too.
Tom Wai-Hong Tam3d6790d2014-04-14 16:15:47 +0800315 self._chameleon_host = chameleon_host.create_chameleon_host(
316 dut=self.hostname, chameleon_args=chameleon_args)
317
Dan Shi4d478522014-02-14 13:46:32 -0800318 if self._servo_host is not None:
319 self.servo = self._servo_host.get_servo()
320 else:
321 self.servo = None
322
Tom Wai-Hong Tam3d6790d2014-04-14 16:15:47 +0800323 if self._chameleon_host:
Tom Wai-Hong Tameaee3402014-01-22 08:52:10 +0800324 self.chameleon = self._chameleon_host.create_chameleon_board()
Tom Wai-Hong Tamefe1c7f2014-01-02 14:00:11 +0800325 else:
Tom Wai-Hong Tam3d6790d2014-04-14 16:15:47 +0800326 self.chameleon = None
Fang Deng5d518f42013-08-02 14:04:32 -0700327
328
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500329 def get_repair_image_name(self):
330 """Generate a image_name from variables in the global config.
331
332 @returns a str of $board-version/$BUILD.
333
334 """
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500335 board = self._get_board_from_afe()
336 if board is None:
337 raise error.AutoservError('DUT has no board attribute, '
338 'cannot be repaired.')
Dan Shi6964fa52014-12-18 11:04:27 -0800339 stable_version = self._AFE.run('get_stable_version', board=board)
340 build_pattern = global_config.global_config.get_config_value(
341 'CROS', 'stable_build_pattern')
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500342 return build_pattern % (board, stable_version)
343
344
Scott Zawalski62bacae2013-03-05 10:40:32 -0500345 def _host_in_AFE(self):
346 """Check if the host is an object the AFE knows.
347
348 @returns the host object.
349 """
350 return self._AFE.get_hosts(hostname=self.hostname)
351
352
Chris Sosab76e0ee2013-05-22 16:55:41 -0700353 def lookup_job_repo_url(self):
354 """Looks up the job_repo_url for the host.
355
356 @returns job_repo_url from AFE or None if not found.
357
358 @raises KeyError if the host does not have a job_repo_url
359 """
360 if not self._host_in_AFE():
361 return None
362
363 hosts = self._AFE.get_hosts(hostname=self.hostname)
beepsb5efc532013-06-04 11:29:34 -0700364 if hosts and ds_constants.JOB_REPO_URL in hosts[0].attributes:
365 return hosts[0].attributes[ds_constants.JOB_REPO_URL]
Chris Sosab76e0ee2013-05-22 16:55:41 -0700366
367
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500368 def clear_cros_version_labels_and_job_repo_url(self):
369 """Clear cros_version labels and host attribute job_repo_url."""
Scott Zawalski62bacae2013-03-05 10:40:32 -0500370 if not self._host_in_AFE():
Scott Zawalskieadbf702013-03-14 09:23:06 -0400371 return
372
Scott Zawalski62bacae2013-03-05 10:40:32 -0500373 host_list = [self.hostname]
374 labels = self._AFE.get_labels(
375 name__startswith=ds_constants.VERSION_PREFIX,
376 host__hostname=self.hostname)
Dan Shi0f466e82013-02-22 15:44:58 -0800377
Scott Zawalski62bacae2013-03-05 10:40:32 -0500378 for label in labels:
379 label.remove_hosts(hosts=host_list)
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500380
beepscb6f1e22013-06-28 19:14:10 -0700381 self.update_job_repo_url(None, None)
382
383
384 def update_job_repo_url(self, devserver_url, image_name):
385 """
386 Updates the job_repo_url host attribute and asserts it's value.
387
388 @param devserver_url: The devserver to use in the job_repo_url.
389 @param image_name: The name of the image to use in the job_repo_url.
390
391 @raises AutoservError: If we failed to update the job_repo_url.
392 """
393 repo_url = None
394 if devserver_url and image_name:
395 repo_url = tools.get_package_url(devserver_url, image_name)
396 self._AFE.set_host_attribute(ds_constants.JOB_REPO_URL, repo_url,
Scott Zawalski62bacae2013-03-05 10:40:32 -0500397 hostname=self.hostname)
beepscb6f1e22013-06-28 19:14:10 -0700398 if self.lookup_job_repo_url() != repo_url:
399 raise error.AutoservError('Failed to update job_repo_url with %s, '
400 'host %s' % (repo_url, self.hostname))
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500401
402
Dan Shie9309262013-06-19 22:50:21 -0700403 def add_cros_version_labels_and_job_repo_url(self, image_name):
Scott Zawalskieadbf702013-03-14 09:23:06 -0400404 """Add cros_version labels and host attribute job_repo_url.
405
406 @param image_name: The name of the image e.g.
407 lumpy-release/R27-3837.0.0
Dan Shi7458bf62013-06-10 12:50:16 -0700408
Scott Zawalskieadbf702013-03-14 09:23:06 -0400409 """
Scott Zawalski62bacae2013-03-05 10:40:32 -0500410 if not self._host_in_AFE():
Scott Zawalskieadbf702013-03-14 09:23:06 -0400411 return
Scott Zawalski62bacae2013-03-05 10:40:32 -0500412
Scott Zawalskieadbf702013-03-14 09:23:06 -0400413 cros_label = '%s%s' % (ds_constants.VERSION_PREFIX, image_name)
Dan Shie9309262013-06-19 22:50:21 -0700414 devserver_url = dev_server.ImageServer.resolve(image_name).url()
Scott Zawalski62bacae2013-03-05 10:40:32 -0500415
416 labels = self._AFE.get_labels(name=cros_label)
417 if labels:
418 label = labels[0]
419 else:
420 label = self._AFE.create_label(name=cros_label)
421
422 label.add_hosts([self.hostname])
beepscb6f1e22013-06-28 19:14:10 -0700423 self.update_job_repo_url(devserver_url, image_name)
424
425
beepsdae65fd2013-07-26 16:24:41 -0700426 def verify_job_repo_url(self, tag=''):
beepscb6f1e22013-06-28 19:14:10 -0700427 """
428 Make sure job_repo_url of this host is valid.
429
joychen03eaad92013-06-26 09:55:21 -0700430 Eg: The job_repo_url "http://lmn.cd.ab.xyx:8080/static/\
beepscb6f1e22013-06-28 19:14:10 -0700431 lumpy-release/R29-4279.0.0/autotest/packages" claims to have the
432 autotest package for lumpy-release/R29-4279.0.0. If this isn't the case,
433 download and extract it. If the devserver embedded in the url is
434 unresponsive, update the job_repo_url of the host after staging it on
435 another devserver.
436
437 @param job_repo_url: A url pointing to the devserver where the autotest
438 package for this build should be staged.
beepsdae65fd2013-07-26 16:24:41 -0700439 @param tag: The tag from the server job, in the format
440 <job_id>-<user>/<hostname>, or <hostless> for a server job.
beepscb6f1e22013-06-28 19:14:10 -0700441
442 @raises DevServerException: If we could not resolve a devserver.
443 @raises AutoservError: If we're unable to save the new job_repo_url as
444 a result of choosing a new devserver because the old one failed to
445 respond to a health check.
beeps0c865032013-07-30 11:37:06 -0700446 @raises urllib2.URLError: If the devserver embedded in job_repo_url
447 doesn't respond within the timeout.
beepscb6f1e22013-06-28 19:14:10 -0700448 """
449 job_repo_url = self.lookup_job_repo_url()
450 if not job_repo_url:
451 logging.warning('No job repo url set on host %s', self.hostname)
452 return
453
454 logging.info('Verifying job repo url %s', job_repo_url)
455 devserver_url, image_name = tools.get_devserver_build_from_package_url(
456 job_repo_url)
457
beeps0c865032013-07-30 11:37:06 -0700458 ds = dev_server.ImageServer(devserver_url)
beepscb6f1e22013-06-28 19:14:10 -0700459
460 logging.info('Staging autotest artifacts for %s on devserver %s',
461 image_name, ds.url())
beeps687243d2013-07-18 15:29:27 -0700462
463 start_time = time.time()
Simran Basi25e7a922014-10-31 11:56:10 -0700464 ds.stage_artifacts(image_name, ['autotest_packages'])
beeps687243d2013-07-18 15:29:27 -0700465 stage_time = time.time() - start_time
466
467 # Record how much of the verification time comes from a devserver
468 # restage. If we're doing things right we should not see multiple
469 # devservers for a given board/build/branch path.
470 try:
J. Richard Barnette3cbd76b2013-11-27 12:11:25 -0800471 board, build_type, branch = server_utils.ParseBuildName(
beeps687243d2013-07-18 15:29:27 -0700472 image_name)[:3]
J. Richard Barnette3cbd76b2013-11-27 12:11:25 -0800473 except server_utils.ParseBuildNameException:
beeps687243d2013-07-18 15:29:27 -0700474 pass
475 else:
beeps0c865032013-07-30 11:37:06 -0700476 devserver = devserver_url[
Chris Sosa65425082013-10-16 13:26:22 -0700477 devserver_url.find('/') + 2:devserver_url.rfind(':')]
beeps687243d2013-07-18 15:29:27 -0700478 stats_key = {
479 'board': board,
480 'build_type': build_type,
481 'branch': branch,
beeps0c865032013-07-30 11:37:06 -0700482 'devserver': devserver.replace('.', '_'),
beeps687243d2013-07-18 15:29:27 -0700483 }
Gabe Black1e1c41b2015-02-04 23:55:15 -0800484 autotest_stats.Gauge('verify_job_repo_url').send(
beeps687243d2013-07-18 15:29:27 -0700485 '%(board)s.%(build_type)s.%(branch)s.%(devserver)s' % stats_key,
486 stage_time)
beepscb6f1e22013-06-28 19:14:10 -0700487
Scott Zawalskieadbf702013-03-14 09:23:06 -0400488
Dan Shicf4d2032015-03-12 15:04:21 -0700489 def stage_server_side_package(self, image=None):
490 """Stage autotest server-side package on devserver.
491
492 @param image: Full path of an OS image to install or a build name.
493
494 @return: A url to the autotest server-side package.
495 """
496 if image:
497 image_name = tools.get_build_from_image(image)
498 if not image_name:
499 raise error.AutoservError(
500 'Failed to parse build name from %s' % image)
501 ds = dev_server.ImageServer.resolve(image_name)
502 else:
503 job_repo_url = self.lookup_job_repo_url()
504 if job_repo_url:
505 devserver_url, image_name = (
506 tools.get_devserver_build_from_package_url(job_repo_url))
507 ds = dev_server.ImageServer(devserver_url)
508 else:
509 labels = self._AFE.get_labels(
510 name__startswith=ds_constants.VERSION_PREFIX,
511 host__hostname=self.hostname)
512 if not labels:
513 raise error.AutoservError(
514 'Failed to stage server-side package. The host has '
515 'no job_report_url attribute or version label.')
516 image_name = labels[0].name[len(ds_constants.VERSION_PREFIX):]
517 ds = dev_server.ImageServer.resolve(image_name)
518 ds.stage_artifacts(image_name, ['autotest_server_package'])
519 return '%s/static/%s/%s' % (ds.url(), image_name,
520 'autotest_server_package.tar.bz2')
521
522
Dan Shi0f466e82013-02-22 15:44:58 -0800523 def _try_stateful_update(self, update_url, force_update, updater):
524 """Try to use stateful update to initialize DUT.
525
526 When DUT is already running the same version that machine_install
527 tries to install, stateful update is a much faster way to clean up
528 the DUT for testing, compared to a full reimage. It is implemeted
529 by calling autoupdater.run_update, but skipping updating root, as
530 updating the kernel is time consuming and not necessary.
531
532 @param update_url: url of the image.
533 @param force_update: Set to True to update the image even if the DUT
534 is running the same version.
535 @param updater: ChromiumOSUpdater instance used to update the DUT.
536 @returns: True if the DUT was updated with stateful update.
537
538 """
J. Richard Barnette3f731032014-04-07 17:42:59 -0700539 # TODO(jrbarnette): Yes, I hate this re.match() test case.
540 # It's better than the alternative: see crbug.com/360944.
541 image_name = autoupdater.url_to_image_name(update_url)
542 release_pattern = r'^.*-release/R[0-9]+-[0-9]+\.[0-9]+\.0$'
543 if not re.match(release_pattern, image_name):
544 return False
Dan Shi0f466e82013-02-22 15:44:58 -0800545 if not updater.check_version():
546 return False
547 if not force_update:
548 logging.info('Canceling stateful update because the new and '
549 'old versions are the same.')
550 return False
551 # Following folders should be rebuilt after stateful update.
552 # A test file is used to confirm each folder gets rebuilt after
553 # the stateful update.
554 folders_to_check = ['/var', '/home', '/mnt/stateful_partition']
555 test_file = '.test_file_to_be_deleted'
556 for folder in folders_to_check:
557 touch_path = os.path.join(folder, test_file)
558 self.run('touch %s' % touch_path)
559
560 if not updater.run_update(force_update=True, update_root=False):
561 return False
562
563 # Reboot to complete stateful update.
Chris Sosab76e0ee2013-05-22 16:55:41 -0700564 self.reboot(timeout=self.REBOOT_TIMEOUT, wait=True)
Dan Shi0f466e82013-02-22 15:44:58 -0800565 check_file_cmd = 'test -f %s; echo $?'
566 for folder in folders_to_check:
567 test_file_path = os.path.join(folder, test_file)
568 result = self.run(check_file_cmd % test_file_path,
569 ignore_status=True)
570 if result.exit_status == 1:
571 return False
572 return True
573
574
J. Richard Barnette7275b612013-06-04 18:13:11 -0700575 def _post_update_processing(self, updater, expected_kernel=None):
Dan Shi0f466e82013-02-22 15:44:58 -0800576 """After the DUT is updated, confirm machine_install succeeded.
577
578 @param updater: ChromiumOSUpdater instance used to update the DUT.
J. Richard Barnette7275b612013-06-04 18:13:11 -0700579 @param expected_kernel: kernel expected to be active after reboot,
580 or `None` to skip rollback checking.
Dan Shi0f466e82013-02-22 15:44:58 -0800581
582 """
J. Richard Barnette7275b612013-06-04 18:13:11 -0700583 # Touch the lab machine file to leave a marker that
584 # distinguishes this image from other test images.
585 # Afterwards, we must re-run the autoreboot script because
586 # it depends on the _LAB_MACHINE_FILE.
Dan Shi0f466e82013-02-22 15:44:58 -0800587 self.run('touch %s' % self._LAB_MACHINE_FILE)
Dan Shi0f466e82013-02-22 15:44:58 -0800588 self.run('start autoreboot')
Chris Sosa65425082013-10-16 13:26:22 -0700589 updater.verify_boot_expectations(
590 expected_kernel, rollback_message=
591 'Build %s failed to boot on %s; system rolled back to previous'
592 'build' % (updater.update_version, self.hostname))
J. Richard Barnette7275b612013-06-04 18:13:11 -0700593 # Check that we've got the build we meant to install.
594 if not updater.check_version_to_confirm_install():
595 raise autoupdater.ChromiumOSError(
596 'Failed to update %s to build %s; found build '
597 '%s instead' % (self.hostname,
Chris Sosa65425082013-10-16 13:26:22 -0700598 updater.update_version,
599 updater.get_build_id()))
Dan Shi0f466e82013-02-22 15:44:58 -0800600
601
J. Richard Barnettee4af8b92013-05-01 13:16:12 -0700602 def _stage_image_for_update(self, image_name=None):
Scott Zawalskieadbf702013-03-14 09:23:06 -0400603 """Stage a build on a devserver and return the update_url.
604
605 @param image_name: a name like lumpy-release/R27-3837.0.0
606 @returns an update URL like:
607 http://172.22.50.205:8082/update/lumpy-release/R27-3837.0.0
608 """
J. Richard Barnettee4af8b92013-05-01 13:16:12 -0700609 if not image_name:
610 image_name = self.get_repair_image_name()
611 logging.info('Staging build for AU: %s', image_name)
Scott Zawalskieadbf702013-03-14 09:23:06 -0400612 devserver = dev_server.ImageServer.resolve(image_name)
613 devserver.trigger_download(image_name, synchronous=False)
614 return tools.image_url_pattern() % (devserver.url(), image_name)
615
616
J. Richard Barnettee4af8b92013-05-01 13:16:12 -0700617 def stage_image_for_servo(self, image_name=None):
618 """Stage a build on a devserver and return the update_url.
619
620 @param image_name: a name like lumpy-release/R27-3837.0.0
621 @returns an update URL like:
622 http://172.22.50.205:8082/update/lumpy-release/R27-3837.0.0
623 """
624 if not image_name:
625 image_name = self.get_repair_image_name()
626 logging.info('Staging build for servo install: %s', image_name)
627 devserver = dev_server.ImageServer.resolve(image_name)
628 devserver.stage_artifacts(image_name, ['test_image'])
629 return devserver.get_test_image_url(image_name)
630
631
beepse539be02013-07-31 21:57:39 -0700632 def stage_factory_image_for_servo(self, image_name):
633 """Stage a build on a devserver and return the update_url.
634
635 @param image_name: a name like <baord>/4262.204.0
beeps12c0a3c2013-09-03 11:58:27 -0700636
beepse539be02013-07-31 21:57:39 -0700637 @return: An update URL, eg:
638 http://<devserver>/static/canary-channel/\
639 <board>/4262.204.0/factory_test/chromiumos_factory_image.bin
beeps12c0a3c2013-09-03 11:58:27 -0700640
641 @raises: ValueError if the factory artifact name is missing from
642 the config.
643
beepse539be02013-07-31 21:57:39 -0700644 """
645 if not image_name:
646 logging.error('Need an image_name to stage a factory image.')
647 return
648
beeps12c0a3c2013-09-03 11:58:27 -0700649 factory_artifact = global_config.global_config.get_config_value(
650 'CROS', 'factory_artifact', type=str, default='')
651 if not factory_artifact:
652 raise ValueError('Cannot retrieve the factory artifact name from '
653 'autotest config, and hence cannot stage factory '
654 'artifacts.')
655
beepse539be02013-07-31 21:57:39 -0700656 logging.info('Staging build for servo install: %s', image_name)
657 devserver = dev_server.ImageServer.resolve(image_name)
658 devserver.stage_artifacts(
659 image_name,
beeps12c0a3c2013-09-03 11:58:27 -0700660 [factory_artifact],
661 archive_url=None)
beepse539be02013-07-31 21:57:39 -0700662
663 return tools.factory_image_url_pattern() % (devserver.url(), image_name)
664
665
Chris Sosaa3ac2152012-05-23 22:23:13 -0700666 def machine_install(self, update_url=None, force_update=False,
Fang Deng3d3b9272014-12-22 12:20:28 -0800667 local_devserver=False, repair=False,
668 force_full_update=False):
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500669 """Install the DUT.
670
Dan Shi0f466e82013-02-22 15:44:58 -0800671 Use stateful update if the DUT is already running the same build.
672 Stateful update does not update kernel and tends to run much faster
673 than a full reimage. If the DUT is running a different build, or it
674 failed to do a stateful update, full update, including kernel update,
675 will be applied to the DUT.
676
Scott Zawalskieadbf702013-03-14 09:23:06 -0400677 Once a host enters machine_install its cros_version label will be
678 removed as well as its host attribute job_repo_url (used for
679 package install).
680
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500681 @param update_url: The url to use for the update
682 pattern: http://$devserver:###/update/$build
683 If update_url is None and repair is True we will install the
Dan Shi6964fa52014-12-18 11:04:27 -0800684 stable image listed in afe_stable_versions table. If the table
685 is not setup, global_config value under CROS.stable_cros_version
686 will be used instead.
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500687 @param force_update: Force an update even if the version installed
688 is the same. Default:False
689 @param local_devserver: Used by run_remote_test to allow people to
690 use their local devserver. Default: False
691 @param repair: Whether or not we are in repair mode. This adds special
692 cases for repairing a machine like starting update_engine.
693 Setting repair to True sets force_update to True as well.
694 default: False
Fang Deng3d3b9272014-12-22 12:20:28 -0800695 @param force_full_update: If True, do not attempt to run stateful
696 update, force a full reimage. If False, try stateful update
697 first when the dut is already installed with the same version.
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500698 @raises autoupdater.ChromiumOSError
699
700 """
Dan Shi7458bf62013-06-10 12:50:16 -0700701 if update_url:
702 logging.debug('update url is set to %s', update_url)
703 else:
704 logging.debug('update url is not set, resolving...')
J. Richard Barnettee4af8b92013-05-01 13:16:12 -0700705 if self._parser.options.image:
706 requested_build = self._parser.options.image
707 if requested_build.startswith('http://'):
708 update_url = requested_build
Dan Shi7458bf62013-06-10 12:50:16 -0700709 logging.debug('update url is retrieved from requested_build'
710 ': %s', update_url)
J. Richard Barnettee4af8b92013-05-01 13:16:12 -0700711 else:
712 # Try to stage any build that does not start with
713 # http:// on the devservers defined in
714 # global_config.ini.
Dan Shi7458bf62013-06-10 12:50:16 -0700715 update_url = self._stage_image_for_update(requested_build)
716 logging.debug('Build staged, and update_url is set to: %s',
717 update_url)
J. Richard Barnettee4af8b92013-05-01 13:16:12 -0700718 elif repair:
719 update_url = self._stage_image_for_update()
Dan Shi7458bf62013-06-10 12:50:16 -0700720 logging.debug('Build staged, and update_url is set to: %s',
721 update_url)
Scott Zawalskieadbf702013-03-14 09:23:06 -0400722 else:
J. Richard Barnettee4af8b92013-05-01 13:16:12 -0700723 raise autoupdater.ChromiumOSError(
724 'Update failed. No update URL provided.')
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500725
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500726 if repair:
J. Richard Barnette158f1792015-02-24 17:43:53 -0800727 # In case the system is in a bad state, we always reboot
728 # the machine before trying to repair.
729 #
730 # If Chrome is crashing, the ui-respawn job may reboot
731 # the DUT to try and "fix" it. Guard against that
732 # behavior by stopping the 'ui' job.
733 #
734 # If Chrome failed to start, update-engine won't be running,
735 # so restart it by force.
Chris Sosab76e0ee2013-05-22 16:55:41 -0700736 self.reboot(timeout=self.REBOOT_TIMEOUT, wait=True)
J. Richard Barnette158f1792015-02-24 17:43:53 -0800737 self.run('stop ui || true')
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500738 self.run('stop update-engine; start update-engine')
739 force_update = True
Dan Shi0f466e82013-02-22 15:44:58 -0800740
Chris Sosaa3ac2152012-05-23 22:23:13 -0700741 updater = autoupdater.ChromiumOSUpdater(update_url, host=self,
Chris Sosa72312602013-04-16 15:01:56 -0700742 local_devserver=local_devserver)
Dan Shi0f466e82013-02-22 15:44:58 -0800743 updated = False
Scott Zawalskieadbf702013-03-14 09:23:06 -0400744 # Remove cros-version and job_repo_url host attribute from host.
745 self.clear_cros_version_labels_and_job_repo_url()
Dan Shi0f466e82013-02-22 15:44:58 -0800746 # If the DUT is already running the same build, try stateful update
747 # first. Stateful update does not update kernel and tends to run much
748 # faster than a full reimage.
Fang Deng3d3b9272014-12-22 12:20:28 -0800749 if not force_full_update:
750 try:
751 updated = self._try_stateful_update(
752 update_url, force_update, updater)
753 if updated:
754 logging.info('DUT is updated with stateful update.')
755 except Exception as e:
756 logging.exception(e)
757 logging.warning('Failed to stateful update DUT, force to update.')
J. Richard Barnette45e93de2012-04-11 17:24:15 -0700758
Dan Shi0f466e82013-02-22 15:44:58 -0800759 inactive_kernel = None
760 # Do a full update if stateful update is not applicable or failed.
761 if not updated:
Chris Sosab7612bc2013-03-21 10:32:37 -0700762 # TODO(sosa): Remove temporary hack to get rid of bricked machines
763 # that can't update due to a corrupted policy.
764 self.run('rm -rf /var/lib/whitelist')
Danny Chanad490bd2014-11-04 14:15:57 -0800765 self.run('mkdir /var/lib/whitelist')
Chris Sosab7612bc2013-03-21 10:32:37 -0700766 self.run('chmod -w /var/lib/whitelist')
Scott Zawalskib550d5a2013-03-22 09:23:59 -0400767 self.run('stop update-engine; start update-engine')
Chris Sosab7612bc2013-03-21 10:32:37 -0700768
Dan Shi0f466e82013-02-22 15:44:58 -0800769 if updater.run_update(force_update):
770 updated = True
771 # Figure out active and inactive kernel.
772 active_kernel, inactive_kernel = updater.get_kernel_state()
J. Richard Barnette45e93de2012-04-11 17:24:15 -0700773
Dan Shi0f466e82013-02-22 15:44:58 -0800774 # Ensure inactive kernel has higher priority than active.
775 if (updater.get_kernel_priority(inactive_kernel)
776 < updater.get_kernel_priority(active_kernel)):
777 raise autoupdater.ChromiumOSError(
778 'Update failed. The priority of the inactive kernel'
779 ' partition is less than that of the active kernel'
780 ' partition.')
J. Richard Barnette45e93de2012-04-11 17:24:15 -0700781
Dan Shi0f466e82013-02-22 15:44:58 -0800782 # Updater has returned successfully; reboot the host.
Chris Sosab76e0ee2013-05-22 16:55:41 -0700783 self.reboot(timeout=self.REBOOT_TIMEOUT, wait=True)
Dan Shi5699ac22014-12-19 10:55:49 -0800784
785 if updated:
Dan Shi0f466e82013-02-22 15:44:58 -0800786 self._post_update_processing(updater, inactive_kernel)
Scott Zawalskieadbf702013-03-14 09:23:06 -0400787 image_name = autoupdater.url_to_image_name(update_url)
Dan Shie9309262013-06-19 22:50:21 -0700788 self.add_cros_version_labels_and_job_repo_url(image_name)
Simran Basi13fa1ba2013-03-04 10:56:47 -0800789
Simran Basiae08c8c2014-09-02 11:17:26 -0700790 logging.debug('Cleaning up old autotest directories.')
791 try:
792 installed_autodir = autotest.Autotest.get_installed_autodir(self)
793 self.run('rm -rf ' + installed_autodir)
794 except autotest.AutodirNotFoundError:
795 logging.debug('No autotest installed directory found.')
J. Richard Barnette45e93de2012-04-11 17:24:15 -0700796
797
Dan Shi9cb0eec2014-06-03 09:04:50 -0700798 def _clear_fw_version_labels(self):
799 """Clear firmware version labels from the machine."""
800 labels = self._AFE.get_labels(
801 name__startswith=provision.FW_VERSION_PREFIX,
802 host__hostname=self.hostname)
803 for label in labels:
804 label.remove_hosts(hosts=[self.hostname])
805
806
807 def _add_fw_version_label(self, build):
808 """Add firmware version label to the machine.
809
810 @param build: Build of firmware.
811
812 """
813 fw_label = provision.fw_version_to_label(build)
814 provision.ensure_label_exists(fw_label)
815 label = self._AFE.get_labels(name__startswith=fw_label)[0]
816 label.add_hosts([self.hostname])
817
818
819 def firmware_install(self, build=None):
820 """Install firmware to the DUT.
821
822 Use stateful update if the DUT is already running the same build.
823 Stateful update does not update kernel and tends to run much faster
824 than a full reimage. If the DUT is running a different build, or it
825 failed to do a stateful update, full update, including kernel update,
826 will be applied to the DUT.
827
828 Once a host enters firmware_install its fw_version label will be
829 removed. After the firmware is updated successfully, a new fw_version
830 label will be added to the host.
831
832 @param build: The build version to which we want to provision the
833 firmware of the machine,
834 e.g. 'link-firmware/R22-2695.1.144'.
835
836 TODO(dshi): After bug 381718 is fixed, update here with corresponding
837 exceptions that could be raised.
838
839 """
840 if not self.servo:
841 raise error.TestError('Host %s does not have servo.' %
842 self.hostname)
843
844 # TODO(fdeng): use host.get_board() after
845 # crbug.com/271834 is fixed.
846 board = self._get_board_from_afe()
847
848 # If build is not set, assume it's repair mode and try to install
849 # firmware from stable CrOS.
850 if not build:
851 build = self.get_repair_image_name()
852
853 config = FAFTConfig(board)
854 if config.use_u_boot:
855 ap_image = 'image-%s.bin' % board
856 else: # Depthcharge platform
857 ap_image = 'image.bin'
858 ec_image = 'ec.bin'
859 ds = dev_server.ImageServer.resolve(build)
860 ds.stage_artifacts(build, ['firmware'])
861
862 tmpd = autotemp.tempdir(unique_id='fwimage')
863 try:
864 fwurl = self._FW_IMAGE_URL_PATTERN % (ds.url(), build)
865 local_tarball = os.path.join(tmpd.name, os.path.basename(fwurl))
866 server_utils.system('wget -O %s %s' % (local_tarball, fwurl),
867 timeout=60)
868 server_utils.system('tar xf %s -C %s %s %s' %
869 (local_tarball, tmpd.name, ap_image, ec_image),
870 timeout=60)
871 server_utils.system('tar xf %s --wildcards -C %s "dts/*"' %
872 (local_tarball, tmpd.name),
873 timeout=60, ignore_status=True)
874
875 self._clear_fw_version_labels()
876 logging.info('Will re-program EC now')
877 self.servo.program_ec(os.path.join(tmpd.name, ec_image))
878 logging.info('Will re-program BIOS now')
879 self.servo.program_bios(os.path.join(tmpd.name, ap_image))
880 self.servo.get_power_state_controller().reset()
881 time.sleep(self.servo.BOOT_DELAY)
882 self._add_fw_version_label()
883 finally:
884 tmpd.clean()
885
886
Dan Shi10e992b2013-08-30 11:02:59 -0700887 def show_update_engine_log(self):
888 """Output update engine log."""
MK Ryu35d661e2014-09-25 17:44:10 -0700889 logging.debug('Dumping %s', client_constants.UPDATE_ENGINE_LOG)
890 self.run('cat %s' % client_constants.UPDATE_ENGINE_LOG)
Dan Shi10e992b2013-08-30 11:02:59 -0700891
892
Richard Barnette82c35912012-11-20 10:09:10 -0800893 def _get_board_from_afe(self):
894 """Retrieve this host's board from its labels in the AFE.
895
896 Looks for a host label of the form "board:<board>", and
897 returns the "<board>" part of the label. `None` is returned
898 if there is not a single, unique label matching the pattern.
899
900 @returns board from label, or `None`.
901 """
Dan Shia1ecd5c2013-06-06 11:21:31 -0700902 return server_utils.get_board_from_afe(self.hostname, self._AFE)
Simran Basi833814b2013-01-29 13:13:43 -0800903
904
905 def get_build(self):
906 """Retrieve the current build for this Host from the AFE.
907
908 Looks through this host's labels in the AFE to determine its build.
909
910 @returns The current build or None if it could not find it or if there
911 were multiple build labels assigned to this host.
912 """
Dan Shia1ecd5c2013-06-06 11:21:31 -0700913 return server_utils.get_build_from_afe(self.hostname, self._AFE)
Richard Barnette82c35912012-11-20 10:09:10 -0800914
915
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500916 def _install_repair(self):
917 """Attempt to repair this host using upate-engine.
918
919 If the host is up, try installing the DUT with a stable
Dan Shi6964fa52014-12-18 11:04:27 -0800920 "repair" version of Chrome OS as defined in afe_stable_versions table.
921 If the table is not setup, global_config value under
922 CROS.stable_cros_version will be used instead.
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500923
Scott Zawalski62bacae2013-03-05 10:40:32 -0500924 @raises AutoservRepairMethodNA if the DUT is not reachable.
925 @raises ChromiumOSError if the install failed for some reason.
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500926
927 """
928 if not self.is_up():
Scott Zawalski62bacae2013-03-05 10:40:32 -0500929 raise error.AutoservRepairMethodNA('DUT unreachable for install.')
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500930 logging.info('Attempting to reimage machine to repair image.')
931 try:
932 self.machine_install(repair=True)
Fang Dengd0672f32013-03-18 17:18:09 -0700933 except autoupdater.ChromiumOSError as e:
934 logging.exception(e)
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500935 logging.info('Repair via install failed.')
Scott Zawalski62bacae2013-03-05 10:40:32 -0500936 raise
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500937
938
Dan Shi2c88eed2013-11-12 10:18:38 -0800939 def _install_repair_with_powerwash(self):
Dan Shi9cc48452013-11-12 12:39:26 -0800940 """Attempt to powerwash first then repair this host using update-engine.
Dan Shi2c88eed2013-11-12 10:18:38 -0800941
Dan Shi9cc48452013-11-12 12:39:26 -0800942 update-engine may fail due to a bad image. In such case, powerwash
943 may help to cleanup the DUT for update-engine to work again.
Dan Shi2c88eed2013-11-12 10:18:38 -0800944
945 @raises AutoservRepairMethodNA if the DUT is not reachable.
946 @raises ChromiumOSError if the install failed for some reason.
947
948 """
949 if not self.is_up():
950 raise error.AutoservRepairMethodNA('DUT unreachable for install.')
951
952 logging.info('Attempting to powerwash the DUT.')
953 self.run('echo "fast safe" > '
954 '/mnt/stateful_partition/factory_install_reset')
955 self.reboot(timeout=self.POWERWASH_BOOT_TIMEOUT, wait=True)
956 if not self.is_up():
Dan Shi9cc48452013-11-12 12:39:26 -0800957 logging.error('Powerwash failed. DUT did not come back after '
Dan Shi2c88eed2013-11-12 10:18:38 -0800958 'reboot.')
959 raise error.AutoservRepairFailure(
960 'DUT failed to boot from powerwash after %d seconds' %
961 self.POWERWASH_BOOT_TIMEOUT)
962
963 logging.info('Powerwash succeeded.')
964 self._install_repair()
965
966
beepsf079cfb2013-09-18 17:49:51 -0700967 def servo_install(self, image_url=None, usb_boot_timeout=USB_BOOT_TIMEOUT,
968 install_timeout=INSTALL_TIMEOUT):
Scott Zawalski62bacae2013-03-05 10:40:32 -0500969 """
970 Re-install the OS on the DUT by:
971 1) installing a test image on a USB storage device attached to the Servo
972 board,
Richard Barnette03a0c132012-11-05 12:40:35 -0800973 2) booting that image in recovery mode, and then
J. Richard Barnette31b2e312013-04-04 16:05:22 -0700974 3) installing the image with chromeos-install.
975
Scott Zawalski62bacae2013-03-05 10:40:32 -0500976 @param image_url: If specified use as the url to install on the DUT.
977 otherwise boot the currently staged image on the USB stick.
beepsf079cfb2013-09-18 17:49:51 -0700978 @param usb_boot_timeout: The usb_boot_timeout to use during reimage.
979 Factory images need a longer usb_boot_timeout than regular
980 cros images.
981 @param install_timeout: The timeout to use when installing the chromeos
982 image. Factory images need a longer install_timeout.
Richard Barnette03a0c132012-11-05 12:40:35 -0800983
Scott Zawalski62bacae2013-03-05 10:40:32 -0500984 @raises AutoservError if the image fails to boot.
beepsf079cfb2013-09-18 17:49:51 -0700985
J. Richard Barnette0199cc82014-12-05 17:08:40 -0800986 """
beepsf079cfb2013-09-18 17:49:51 -0700987 usb_boot_timer_key = ('servo_install.usb_boot_timeout_%s'
988 % usb_boot_timeout)
989 logging.info('Downloading image to USB, then booting from it. Usb boot '
990 'timeout = %s', usb_boot_timeout)
Gabe Black1e1c41b2015-02-04 23:55:15 -0800991 timer = autotest_stats.Timer(usb_boot_timer_key)
beepsf079cfb2013-09-18 17:49:51 -0700992 timer.start()
J. Richard Barnette31b2e312013-04-04 16:05:22 -0700993 self.servo.install_recovery_image(image_url)
beepsf079cfb2013-09-18 17:49:51 -0700994 if not self.wait_up(timeout=usb_boot_timeout):
Scott Zawalski62bacae2013-03-05 10:40:32 -0500995 raise error.AutoservRepairFailure(
996 'DUT failed to boot from USB after %d seconds' %
beepsf079cfb2013-09-18 17:49:51 -0700997 usb_boot_timeout)
998 timer.stop()
Scott Zawalski62bacae2013-03-05 10:40:32 -0500999
beepsf079cfb2013-09-18 17:49:51 -07001000 install_timer_key = ('servo_install.install_timeout_%s'
1001 % install_timeout)
Gabe Black1e1c41b2015-02-04 23:55:15 -08001002 timer = autotest_stats.Timer(install_timer_key)
beepsf079cfb2013-09-18 17:49:51 -07001003 timer.start()
1004 logging.info('Installing image through chromeos-install.')
J. Richard Barnette2522a8f2015-03-04 15:59:15 -08001005 self.run('chromeos-install --yes',
MK Ryu35d661e2014-09-25 17:44:10 -07001006 timeout=install_timeout)
J. Richard Barnette0199cc82014-12-05 17:08:40 -08001007 self.run('halt')
beepsf079cfb2013-09-18 17:49:51 -07001008 timer.stop()
1009
1010 logging.info('Power cycling DUT through servo.')
J. Richard Barnette0199cc82014-12-05 17:08:40 -08001011 self.servo.get_power_state_controller().power_off()
Fang Dengafb88142013-05-30 17:44:31 -07001012 self.servo.switch_usbkey('off')
J. Richard Barnette0199cc82014-12-05 17:08:40 -08001013 # N.B. The Servo API requires that we use power_on() here
1014 # for two reasons:
1015 # 1) After turning on a DUT in recovery mode, you must turn
1016 # it off and then on with power_on() once more to
1017 # disable recovery mode (this is a Parrot specific
1018 # requirement).
1019 # 2) After power_off(), the only way to turn on is with
1020 # power_on() (this is a Storm specific requirement).
J. Richard Barnettefbcc7122013-07-24 18:24:59 -07001021 self.servo.get_power_state_controller().power_on()
beepsf079cfb2013-09-18 17:49:51 -07001022
1023 logging.info('Waiting for DUT to come back up.')
Richard Barnette03a0c132012-11-05 12:40:35 -08001024 if not self.wait_up(timeout=self.BOOT_TIMEOUT):
1025 raise error.AutoservError('DUT failed to reboot installed '
1026 'test image after %d seconds' %
Scott Zawalski62bacae2013-03-05 10:40:32 -05001027 self.BOOT_TIMEOUT)
1028
1029
J. Richard Barnettee4af8b92013-05-01 13:16:12 -07001030 def _servo_repair_reinstall(self):
Scott Zawalski62bacae2013-03-05 10:40:32 -05001031 """Reinstall the DUT utilizing servo and a test image.
1032
1033 Re-install the OS on the DUT by:
1034 1) installing a test image on a USB storage device attached to the Servo
1035 board,
1036 2) booting that image in recovery mode, and then
1037 3) installing the image with chromeos-install.
1038
Scott Zawalski62bacae2013-03-05 10:40:32 -05001039 @raises AutoservRepairMethodNA if the device does not have servo
1040 support.
1041
1042 """
1043 if not self.servo:
1044 raise error.AutoservRepairMethodNA('Repair Reinstall NA: '
1045 'DUT has no servo support.')
1046
1047 logging.info('Attempting to recovery servo enabled device with '
1048 'servo_repair_reinstall')
1049
J. Richard Barnettee4af8b92013-05-01 13:16:12 -07001050 image_url = self.stage_image_for_servo()
Scott Zawalski62bacae2013-03-05 10:40:32 -05001051 self.servo_install(image_url)
1052
1053
1054 def _servo_repair_power(self):
1055 """Attempt to repair DUT using an attached Servo.
1056
1057 Attempt to power on the DUT via power_long_press.
1058
1059 @raises AutoservRepairMethodNA if the device does not have servo
1060 support.
1061 @raises AutoservRepairFailure if the repair fails for any reason.
1062 """
1063 if not self.servo:
1064 raise error.AutoservRepairMethodNA('Repair Power NA: '
1065 'DUT has no servo support.')
1066
1067 logging.info('Attempting to recover servo enabled device by '
1068 'powering it off and on.')
1069 self.servo.get_power_state_controller().power_off()
1070 self.servo.get_power_state_controller().power_on()
1071 if self.wait_up(self.BOOT_TIMEOUT):
1072 return
1073
1074 raise error.AutoservRepairFailure('DUT did not boot after long_press.')
Richard Barnette03a0c132012-11-05 12:40:35 -08001075
1076
Richard Barnette82c35912012-11-20 10:09:10 -08001077 def _powercycle_to_repair(self):
1078 """Utilize the RPM Infrastructure to bring the host back up.
1079
1080 If the host is not up/repaired after the first powercycle we utilize
1081 auto fallback to the last good install by powercycling and rebooting the
1082 host 6 times.
Scott Zawalski62bacae2013-03-05 10:40:32 -05001083
1084 @raises AutoservRepairMethodNA if the device does not support remote
1085 power.
1086 @raises AutoservRepairFailure if the repair fails for any reason.
1087
Richard Barnette82c35912012-11-20 10:09:10 -08001088 """
Scott Zawalski62bacae2013-03-05 10:40:32 -05001089 if not self.has_power():
1090 raise error.AutoservRepairMethodNA('Device does not support power.')
1091
Richard Barnette82c35912012-11-20 10:09:10 -08001092 logging.info('Attempting repair via RPM powercycle.')
1093 failed_cycles = 0
1094 self.power_cycle()
1095 while not self.wait_up(timeout=self.BOOT_TIMEOUT):
1096 failed_cycles += 1
1097 if failed_cycles >= self._MAX_POWER_CYCLE_ATTEMPTS:
Scott Zawalski62bacae2013-03-05 10:40:32 -05001098 raise error.AutoservRepairFailure(
1099 'Powercycled host %s %d times; device did not come back'
1100 ' online.' % (self.hostname, failed_cycles))
Richard Barnette82c35912012-11-20 10:09:10 -08001101 self.power_cycle()
1102 if failed_cycles == 0:
1103 logging.info('Powercycling was successful first time.')
1104 else:
1105 logging.info('Powercycling was successful after %d failures.',
1106 failed_cycles)
1107
1108
MK Ryu35d661e2014-09-25 17:44:10 -07001109 def _reboot_repair(self):
1110 """SSH to this host and reboot."""
1111 if not self.is_up(self._CHECK_HOST_UP_TIMEOUT_SECS):
1112 raise error.AutoservRepairMethodNA('DUT unreachable for reboot.')
1113 logging.info('Attempting repair via SSH reboot.')
1114 self.reboot(timeout=self.BOOT_TIMEOUT, wait=True)
1115
1116
Prashanth B4d8184f2014-05-05 12:22:02 -07001117 def check_device(self):
1118 """Check if a device is ssh-able, and if so, clean and verify it.
1119
1120 @raise AutoservSSHTimeout: If the ssh ping times out.
1121 @raise AutoservSshPermissionDeniedError: If ssh ping fails due to
1122 permissions.
1123 @raise AutoservSshPingHostError: For other AutoservRunErrors during
1124 ssh_ping.
1125 @raises AutoservError: As appropriate, during cleanup and verify.
1126 """
1127 self.ssh_ping()
1128 self.cleanup()
1129 self.verify()
1130
1131
Richard Barnette82c35912012-11-20 10:09:10 -08001132 def repair_full(self):
1133 """Repair a host for repair level NO_PROTECTION.
1134
1135 This overrides the base class function for repair; it does
1136 not call back to the parent class, but instead offers a
1137 simplified implementation based on the capabilities in the
1138 Chrome OS test lab.
1139
Fang Deng5d518f42013-08-02 14:04:32 -07001140 It first verifies and repairs servo if it is a DUT in CrOS
Fang Deng03590af2013-10-07 17:34:20 -07001141 lab and a servo is attached.
Fang Deng5d518f42013-08-02 14:04:32 -07001142
Jakob Juelich82b7d1c2014-09-15 16:10:57 -07001143 This escalates in order through the following procedures and verifies
1144 the status using `self.check_device()` after each of them. This is done
1145 until both the repair and the veryfing step succeed.
1146
MK Ryu35d661e2014-09-25 17:44:10 -07001147 Escalation order of repair procedures from less intrusive to
1148 more intrusive repairs:
1149 1. SSH to the DUT and reboot.
Scott Zawalski62bacae2013-03-05 10:40:32 -05001150 2. If there's a servo for the DUT, try to power the DUT off and
1151 on.
MK Ryu35d661e2014-09-25 17:44:10 -07001152 3. If the DUT can be power-cycled via RPM, try to repair
Richard Barnette82c35912012-11-20 10:09:10 -08001153 by power-cycling.
MK Ryu35d661e2014-09-25 17:44:10 -07001154 4. Try to re-install to a known stable image using
1155 auto-update.
1156 5. If there's a servo for the DUT, try to re-install via
1157 the servo.
Richard Barnette82c35912012-11-20 10:09:10 -08001158
1159 As with the parent method, the last operation performed on
Prashanth B4d8184f2014-05-05 12:22:02 -07001160 the DUT must be to call `self.check_device()`; If that call fails the
1161 exception it raises is passed back to the caller.
J. Richard Barnettefde55fc2013-03-15 17:47:01 -07001162
Scott Zawalski62bacae2013-03-05 10:40:32 -05001163 @raises AutoservRepairTotalFailure if the repair process fails to
1164 fix the DUT.
Fang Deng5d518f42013-08-02 14:04:32 -07001165 @raises ServoHostRepairTotalFailure if the repair process fails to
1166 fix the servo host if one is attached to the DUT.
1167 @raises AutoservSshPermissionDeniedError if it is unable
1168 to ssh to the servo host due to permission error.
1169
Richard Barnette82c35912012-11-20 10:09:10 -08001170 """
Jakob Juelich82b7d1c2014-09-15 16:10:57 -07001171 # Caution: Deleting shards relies on repair to always reboot the DUT.
1172
Dan Shi4d478522014-02-14 13:46:32 -08001173 if self._servo_host and not self.servo:
Fang Deng03590af2013-10-07 17:34:20 -07001174 try:
Dan Shi4d478522014-02-14 13:46:32 -08001175 self._servo_host.repair_full()
Fang Deng03590af2013-10-07 17:34:20 -07001176 except Exception as e:
Fang Deng03590af2013-10-07 17:34:20 -07001177 logging.error('Could not create a healthy servo: %s', e)
Dan Shi4d478522014-02-14 13:46:32 -08001178 self.servo = self._servo_host.get_servo()
Fang Deng5d518f42013-08-02 14:04:32 -07001179
MK Ryu35d661e2014-09-25 17:44:10 -07001180 self.try_collect_crashlogs()
1181
Scott Zawalski62bacae2013-03-05 10:40:32 -05001182 # TODO(scottz): This should use something similar to label_decorator,
1183 # but needs to be populated in order so DUTs are repaired with the
1184 # least amount of effort.
MK Ryu35d661e2014-09-25 17:44:10 -07001185 repair_funcs = [self._reboot_repair,
1186 self._servo_repair_power,
1187 self._powercycle_to_repair,
Dan Shi849a1c42014-03-05 11:10:43 -08001188 self._install_repair,
Dan Shi2c88eed2013-11-12 10:18:38 -08001189 self._install_repair_with_powerwash,
MK Ryu35d661e2014-09-25 17:44:10 -07001190 self._servo_repair_reinstall]
Scott Zawalski62bacae2013-03-05 10:40:32 -05001191 errors = []
Simran Basie6130932013-10-01 14:07:52 -07001192 board = self._get_board_from_afe()
Scott Zawalski62bacae2013-03-05 10:40:32 -05001193 for repair_func in repair_funcs:
1194 try:
1195 repair_func()
MK Ryu35d661e2014-09-25 17:44:10 -07001196 self.try_collect_crashlogs()
Prashanth B4d8184f2014-05-05 12:22:02 -07001197 self.check_device()
Gabe Black1e1c41b2015-02-04 23:55:15 -08001198 autotest_stats.Counter(
Simran Basie6130932013-10-01 14:07:52 -07001199 '%s.SUCCEEDED' % repair_func.__name__).increment()
1200 if board:
Gabe Black1e1c41b2015-02-04 23:55:15 -08001201 autotest_stats.Counter(
Dan Shib87c3aa2014-02-12 15:40:31 -08001202 '%s.%s.SUCCEEDED' % (repair_func.__name__,
Simran Basie6130932013-10-01 14:07:52 -07001203 board)).increment()
Scott Zawalski62bacae2013-03-05 10:40:32 -05001204 return
Simran Basie6130932013-10-01 14:07:52 -07001205 except error.AutoservRepairMethodNA as e:
Gabe Black1e1c41b2015-02-04 23:55:15 -08001206 autotest_stats.Counter(
Simran Basie6130932013-10-01 14:07:52 -07001207 '%s.RepairNA' % repair_func.__name__).increment()
1208 if board:
Gabe Black1e1c41b2015-02-04 23:55:15 -08001209 autotest_stats.Counter(
Dan Shib87c3aa2014-02-12 15:40:31 -08001210 '%s.%s.RepairNA' % (repair_func.__name__,
Simran Basie6130932013-10-01 14:07:52 -07001211 board)).increment()
Ilja H. Friedel04be2bd2014-05-07 21:29:59 -07001212 logging.warning('Repair function NA: %s', e)
Simran Basie6130932013-10-01 14:07:52 -07001213 errors.append(str(e))
Scott Zawalski62bacae2013-03-05 10:40:32 -05001214 except Exception as e:
Gabe Black1e1c41b2015-02-04 23:55:15 -08001215 autotest_stats.Counter(
Simran Basie6130932013-10-01 14:07:52 -07001216 '%s.FAILED' % repair_func.__name__).increment()
1217 if board:
Gabe Black1e1c41b2015-02-04 23:55:15 -08001218 autotest_stats.Counter(
Dan Shib87c3aa2014-02-12 15:40:31 -08001219 '%s.%s.FAILED' % (repair_func.__name__,
Simran Basie6130932013-10-01 14:07:52 -07001220 board)).increment()
Ilja H. Friedel04be2bd2014-05-07 21:29:59 -07001221 logging.warning('Failed to repair device: %s', e)
Scott Zawalski62bacae2013-03-05 10:40:32 -05001222 errors.append(str(e))
Scott Zawalski89c44dd2013-02-26 09:28:02 -05001223
Gabe Black1e1c41b2015-02-04 23:55:15 -08001224 autotest_stats.Counter('Full_Repair_Failed').increment()
Simran Basie6130932013-10-01 14:07:52 -07001225 if board:
Gabe Black1e1c41b2015-02-04 23:55:15 -08001226 autotest_stats.Counter(
Simran Basie6130932013-10-01 14:07:52 -07001227 'Full_Repair_Failed.%s' % board).increment()
Scott Zawalski62bacae2013-03-05 10:40:32 -05001228 raise error.AutoservRepairTotalFailure(
1229 'All attempts at repairing the device failed:\n%s' %
1230 '\n'.join(errors))
Richard Barnette82c35912012-11-20 10:09:10 -08001231
1232
MK Ryu35d661e2014-09-25 17:44:10 -07001233 def try_collect_crashlogs(self, check_host_up=True):
1234 """
1235 Check if a host is up and logs need to be collected from the host,
1236 if yes, collect them.
1237
1238 @param check_host_up: Flag for checking host is up. Default is True.
1239 """
1240 try:
1241 crash_job = self._need_crash_logs()
1242 if crash_job:
1243 logging.debug('%s: Job %s was crashed', self._CRASHLOGS_PREFIX,
1244 crash_job)
1245 if not check_host_up or self.is_up(
1246 self._CHECK_HOST_UP_TIMEOUT_SECS):
1247 self._collect_crashlogs(crash_job)
1248 logging.debug('%s: Completed collecting logs for the '
1249 'crashed job %s', self._CRASHLOGS_PREFIX,
1250 crash_job)
1251 except Exception as e:
1252 # Exception should not result in repair failure.
1253 # Therefore, suppress all exceptions here.
1254 logging.error('%s: Failed while trying to collect crash-logs: %s',
1255 self._CRASHLOGS_PREFIX, e)
1256
1257
1258 def _need_crash_logs(self):
1259 """Get the value of need_crash_logs attribute of this host.
1260
1261 @return: Value string of need_crash_logs attribute
1262 None if there is no need_crash_logs attribute
1263 """
1264 attrs = self._AFE.get_host_attribute(constants.CRASHLOGS_HOST_ATTRIBUTE,
1265 hostname=self.hostname)
1266 assert len(attrs) < 2
1267 return attrs[0].value if attrs else None
1268
1269
1270 def _collect_crashlogs(self, job_id):
1271 """Grab logs from the host where a job was crashed.
1272
1273 First, check if PRIOR_LOGS_DIR exists in the host.
1274 If yes, collect them.
1275 Otherwise, check if a lab-machine marker (_LAB_MACHINE_FILE) exists
1276 in the host.
1277 If yes, the host was repaired automatically, and we collect normal
1278 system logs.
1279
1280 @param job_id: Id of the job that was crashed.
1281 """
1282 crashlogs_dir = crashcollect.get_crashinfo_dir(self,
1283 constants.CRASHLOGS_DEST_DIR_PREFIX)
1284 flag_prior_logs = False
1285
1286 if self.path_exists(client_constants.PRIOR_LOGS_DIR):
1287 flag_prior_logs = True
1288 self._collect_prior_logs(crashlogs_dir)
1289 elif self.path_exists(self._LAB_MACHINE_FILE):
1290 self._collect_system_logs(crashlogs_dir)
1291 else:
1292 logging.warning('%s: Host was manually re-installed without '
1293 '--lab_preserve_log option. Skip collecting '
1294 'crash-logs.', self._CRASHLOGS_PREFIX)
1295
1296 # We make crash collection be one-time effort.
1297 # _collect_prior_logs() and _collect_system_logs() will not throw
1298 # any exception, and following codes will be executed even when
1299 # those methods fail.
1300 # _collect_crashlogs() is called only when the host is up (refer
1301 # to try_collect_crashlogs()). We assume _collect_prior_logs() and
1302 # _collect_system_logs() fail rarely when the host is up.
1303 # In addition, it is not clear how many times we should try crash
1304 # collection again while not triggering next repair unnecessarily.
1305 # Threfore, we try crash collection one time.
1306
1307 # Create a marker file as soon as log collection is done.
1308 # Leave the job id to this marker for gs_offloader to consume.
1309 marker_file = os.path.join(crashlogs_dir, constants.CRASHLOGS_MARKER)
1310 with open(marker_file, 'a') as f:
1311 f.write('%s\n' % job_id)
1312
1313 # Remove need_crash_logs attribute
1314 logging.debug('%s: Remove attribute need_crash_logs from host %s',
1315 self._CRASHLOGS_PREFIX, self.hostname)
1316 self._AFE.set_host_attribute(constants.CRASHLOGS_HOST_ATTRIBUTE,
1317 None, hostname=self.hostname)
1318
1319 if flag_prior_logs:
1320 logging.debug('%s: Remove %s from host %s', self._CRASHLOGS_PREFIX,
1321 client_constants.PRIOR_LOGS_DIR, self.hostname)
1322 self.run('rm -rf %s; sync' % client_constants.PRIOR_LOGS_DIR)
1323 # Wait for a few seconds to make sure the prior command is
1324 # done deep through storage.
1325 time.sleep(self._SAFE_WAIT_SECS)
1326
1327
1328 def _collect_prior_logs(self, crashlogs_dir):
1329 """Grab prior logs that were stashed before re-installing a host.
1330
1331 @param crashlogs_dir: Directory path where crash-logs are stored.
1332 """
1333 logging.debug('%s: Found %s, collecting them...',
1334 self._CRASHLOGS_PREFIX, client_constants.PRIOR_LOGS_DIR)
1335 try:
1336 self.collect_logs(client_constants.PRIOR_LOGS_DIR,
1337 crashlogs_dir, False)
1338 logging.debug('%s: %s is collected',
1339 self._CRASHLOGS_PREFIX, client_constants.PRIOR_LOGS_DIR)
1340 except Exception as e:
1341 logging.error('%s: Failed to collect %s: %s',
1342 self._CRASHLOGS_PREFIX, client_constants.PRIOR_LOGS_DIR,
1343 e)
1344
1345
1346 def _collect_system_logs(self, crashlogs_dir):
1347 """Grab normal system logs from a host.
1348
1349 @param crashlogs_dir: Directory path where crash-logs are stored.
1350 """
1351 logging.debug('%s: Found %s, collecting system logs...',
1352 self._CRASHLOGS_PREFIX, self._LAB_MACHINE_FILE)
1353 sources = server_utils.parse_simple_config(self._LOGS_TO_COLLECT_FILE)
1354 for src in sources:
1355 try:
1356 if self.path_exists(src):
1357 logging.debug('%s: Collecting %s...',
1358 self._CRASHLOGS_PREFIX, src)
1359 dest = server_utils.concat_path_except_last(
1360 crashlogs_dir, src)
1361 self.collect_logs(src, dest, False)
1362 logging.debug('%s: %s is collected',
1363 self._CRASHLOGS_PREFIX, src)
1364 except Exception as e:
1365 logging.error('%s: Failed to collect %s: %s',
1366 self._CRASHLOGS_PREFIX, src, e)
1367
1368
J. Richard Barnette1d78b012012-05-15 13:56:30 -07001369 def close(self):
beeps32a63082013-08-22 14:02:29 -07001370 self.rpc_disconnect_all()
Fang Deng0ca40e22013-08-27 17:47:44 -07001371 super(CrosHost, self).close()
J. Richard Barnette1d78b012012-05-15 13:56:30 -07001372
1373
Dan Shi49ca0932014-11-14 11:22:27 -08001374 def get_power_supply_info(self):
1375 """Get the output of power_supply_info.
1376
1377 power_supply_info outputs the info of each power supply, e.g.,
1378 Device: Line Power
1379 online: no
1380 type: Mains
1381 voltage (V): 0
1382 current (A): 0
1383 Device: Battery
1384 state: Discharging
1385 percentage: 95.9276
1386 technology: Li-ion
1387
1388 Above output shows two devices, Line Power and Battery, with details of
1389 each device listed. This function parses the output into a dictionary,
1390 with key being the device name, and value being a dictionary of details
1391 of the device info.
1392
1393 @return: The dictionary of power_supply_info, e.g.,
1394 {'Line Power': {'online': 'yes', 'type': 'main'},
1395 'Battery': {'vendor': 'xyz', 'percentage': '100'}}
Dan Shie9b765d2014-12-29 16:59:49 -08001396 @raise error.AutoservRunError if power_supply_info tool is not found in
1397 the DUT. Caller should handle this error to avoid false failure
1398 on verification.
Dan Shi49ca0932014-11-14 11:22:27 -08001399 """
1400 result = self.run('power_supply_info').stdout.strip()
1401 info = {}
1402 device_name = None
1403 device_info = {}
1404 for line in result.split('\n'):
1405 pair = [v.strip() for v in line.split(':')]
1406 if len(pair) != 2:
1407 continue
1408 if pair[0] == 'Device':
1409 if device_name:
1410 info[device_name] = device_info
1411 device_name = pair[1]
1412 device_info = {}
1413 else:
1414 device_info[pair[0]] = pair[1]
1415 if device_name and not device_name in info:
1416 info[device_name] = device_info
1417 return info
1418
1419
1420 def get_battery_percentage(self):
1421 """Get the battery percentage.
1422
1423 @return: The percentage of battery level, value range from 0-100. Return
1424 None if the battery info cannot be retrieved.
1425 """
1426 try:
1427 info = self.get_power_supply_info()
1428 logging.info(info)
1429 return float(info['Battery']['percentage'])
Dan Shie9b765d2014-12-29 16:59:49 -08001430 except (KeyError, ValueError, error.AutoservRunError):
Dan Shi49ca0932014-11-14 11:22:27 -08001431 return None
1432
1433
1434 def is_ac_connected(self):
1435 """Check if the dut has power adapter connected and charging.
1436
1437 @return: True if power adapter is connected and charging.
1438 """
1439 try:
1440 info = self.get_power_supply_info()
1441 return info['Line Power']['online'] == 'yes'
Dan Shie9b765d2014-12-29 16:59:49 -08001442 except (KeyError, error.AutoservRunError):
1443 return None
Dan Shi49ca0932014-11-14 11:22:27 -08001444
1445
Simran Basi5e6339a2013-03-21 11:34:32 -07001446 def _cleanup_poweron(self):
1447 """Special cleanup method to make sure hosts always get power back."""
1448 afe = frontend_wrappers.RetryingAFE(timeout_min=5, delay_sec=10)
1449 hosts = afe.get_hosts(hostname=self.hostname)
1450 if not hosts or not (self._RPM_OUTLET_CHANGED in
1451 hosts[0].attributes):
1452 return
1453 logging.debug('This host has recently interacted with the RPM'
1454 ' Infrastructure. Ensuring power is on.')
1455 try:
1456 self.power_on()
Dan Shi7dca56e2014-11-11 17:07:56 -08001457 afe.set_host_attribute(self._RPM_OUTLET_CHANGED, None,
1458 hostname=self.hostname)
Simran Basi5e6339a2013-03-21 11:34:32 -07001459 except rpm_client.RemotePowerException:
Simran Basi5e6339a2013-03-21 11:34:32 -07001460 logging.error('Failed to turn Power On for this host after '
1461 'cleanup through the RPM Infrastructure.')
Gabe Blackb72f4fb2015-01-20 16:47:13 -08001462 autotest_es.post(
Dan Shi7dca56e2014-11-11 17:07:56 -08001463 type_str='RPM_poweron_failure',
1464 metadata={'hostname': self.hostname})
Dan Shi49ca0932014-11-14 11:22:27 -08001465
1466 battery_percentage = self.get_battery_percentage()
Dan Shif01ebe22014-12-05 13:10:57 -08001467 if battery_percentage and battery_percentage < 50:
Dan Shi49ca0932014-11-14 11:22:27 -08001468 raise
1469 elif self.is_ac_connected():
1470 logging.info('The device has power adapter connected and '
1471 'charging. No need to try to turn RPM on '
1472 'again.')
1473 afe.set_host_attribute(self._RPM_OUTLET_CHANGED, None,
1474 hostname=self.hostname)
1475 logging.info('Battery level is now at %s%%. The device may '
1476 'still have enough power to run test, so no '
1477 'exception will be raised.', battery_percentage)
1478
Simran Basi5e6339a2013-03-21 11:34:32 -07001479
beepsc87ff602013-07-31 21:53:00 -07001480 def _is_factory_image(self):
1481 """Checks if the image on the DUT is a factory image.
1482
1483 @return: True if the image on the DUT is a factory image.
1484 False otherwise.
1485 """
1486 result = self.run('[ -f /root/.factory_test ]', ignore_status=True)
1487 return result.exit_status == 0
1488
1489
1490 def _restart_ui(self):
J. Richard Barnette84890bd2014-02-21 11:05:47 -08001491 """Restart the Chrome UI.
beepsc87ff602013-07-31 21:53:00 -07001492
1493 @raises: FactoryImageCheckerException for factory images, since
1494 we cannot attempt to restart ui on them.
1495 error.AutoservRunError for any other type of error that
1496 occurs while restarting ui.
1497 """
1498 if self._is_factory_image():
Dan Shi549fb822015-03-24 18:01:11 -07001499 raise FactoryImageCheckerException('Cannot restart ui on factory '
1500 'images')
beepsc87ff602013-07-31 21:53:00 -07001501
J. Richard Barnette84890bd2014-02-21 11:05:47 -08001502 # TODO(jrbarnette): The command to stop/start the ui job
1503 # should live inside cros_ui, too. However that would seem
1504 # to imply interface changes to the existing start()/restart()
1505 # functions, which is a bridge too far (for now).
1506 prompt = cros_ui.get_login_prompt_state(self)
1507 self.run('stop ui; start ui')
1508 cros_ui.wait_for_chrome_ready(prompt, self)
beepsc87ff602013-07-31 21:53:00 -07001509
1510
Dan Shi549fb822015-03-24 18:01:11 -07001511 def get_release_version(self):
1512 """Get the value of attribute CHROMEOS_RELEASE_VERSION from lsb-release.
1513
1514 @returns The version string in lsb-release, under attribute
1515 CHROMEOS_RELEASE_VERSION.
1516 """
1517 lsb_release_content = self.run(
1518 'cat "%s"' % client_constants.LSB_RELEASE).stdout.strip()
1519 return lsbrelease_utils.get_chromeos_release_version(
1520 lsb_release_content=lsb_release_content)
1521
1522
1523 def verify_cros_version_label(self):
1524 """ Make sure host's cros-version label match the actual image in dut.
1525
1526 Remove any cros-version: label that doesn't match that installed in
1527 the dut.
1528
1529 @param raise_error: Set to True to raise exception if any mismatch found
1530
1531 @raise error.AutoservError: If any mismatch between cros-version label
1532 and the build installed in dut is found.
1533 """
1534 labels = self._AFE.get_labels(
1535 name__startswith=ds_constants.VERSION_PREFIX,
1536 host__hostname=self.hostname)
1537 mismatch_found = False
1538 if labels:
1539 # Get CHROMEOS_RELEASE_VERSION from lsb-release, e.g., 6908.0.0.
1540 # Note that it's different from cros-version label, which has
1541 # builder and branch info, e.g.,
1542 # cros-version:peppy-release/R43-6908.0.0
1543 release_version = self.get_release_version()
1544 host_list = [self.hostname]
1545 for label in labels:
1546 # Remove any cros-version label that does not match
1547 # release_version.
1548 build_version = label.name[len(ds_constants.VERSION_PREFIX):]
1549 if not utils.version_match(build_version, release_version):
1550 logging.warn('cros-version label "%s" does not match '
1551 'release version %s. Removing the label.',
1552 label.name, release_version)
1553 label.remove_hosts(hosts=host_list)
1554 mismatch_found = True
1555 if mismatch_found:
Dan Shi1057bae2015-03-30 11:35:09 -07001556 autotest_es.post(use_http=True,
1557 type_str='cros_version_label_mismatch',
1558 metadata={'hostname': self.hostname})
Dan Shi549fb822015-03-24 18:01:11 -07001559 raise error.AutoservError('The host has wrong cros-version label.')
1560
1561
beepsc87ff602013-07-31 21:53:00 -07001562 def cleanup(self):
MK Ryu35d661e2014-09-25 17:44:10 -07001563 self.run('rm -f %s' % client_constants.CLEANUP_LOGS_PAUSED_FILE)
Scott Zawalskiddbc31e2012-11-15 11:29:01 -05001564 try:
beepsc87ff602013-07-31 21:53:00 -07001565 self._restart_ui()
1566 except (error.AutotestRunError, error.AutoservRunError,
1567 FactoryImageCheckerException):
Ilja H. Friedel04be2bd2014-05-07 21:29:59 -07001568 logging.warning('Unable to restart ui, rebooting device.')
Scott Zawalskiddbc31e2012-11-15 11:29:01 -05001569 # Since restarting the UI fails fall back to normal Autotest
1570 # cleanup routines, i.e. reboot the machine.
Fang Deng0ca40e22013-08-27 17:47:44 -07001571 super(CrosHost, self).cleanup()
Simran Basi5e6339a2013-03-21 11:34:32 -07001572 # Check if the rpm outlet was manipulated.
Simran Basid5e5e272012-09-24 15:23:59 -07001573 if self.has_power():
Simran Basi5e6339a2013-03-21 11:34:32 -07001574 self._cleanup_poweron()
Dan Shi549fb822015-03-24 18:01:11 -07001575 self.verify_cros_version_label()
J. Richard Barnette45e93de2012-04-11 17:24:15 -07001576
1577
Yu-Ju Honga2be94a2012-07-31 09:48:52 -07001578 def reboot(self, **dargs):
1579 """
1580 This function reboots the site host. The more generic
1581 RemoteHost.reboot() performs sync and sleeps for 5
1582 seconds. This is not necessary for Chrome OS devices as the
1583 sync should be finished in a short time during the reboot
1584 command.
1585 """
Tom Wai-Hong Tamf5cd1d42012-08-13 12:04:08 +08001586 if 'reboot_cmd' not in dargs:
Doug Anderson7d5aeb22014-02-27 15:12:17 -08001587 reboot_timeout = dargs.get('reboot_timeout', 10)
1588 dargs['reboot_cmd'] = ('((reboot & sleep %d; reboot -f &)'
1589 ' </dev/null >/dev/null 2>&1 &)' %
1590 reboot_timeout)
Yu-Ju Honga2be94a2012-07-31 09:48:52 -07001591 # Enable fastsync to avoid running extra sync commands before reboot.
Tom Wai-Hong Tamf5cd1d42012-08-13 12:04:08 +08001592 if 'fastsync' not in dargs:
1593 dargs['fastsync'] = True
Michael Liangda8c60a2014-06-03 13:24:51 -07001594
Charlie Mooneya8e6dab2014-05-29 14:37:55 -07001595 # For purposes of logging reboot times:
1596 # Get the board name i.e. 'daisy_spring'
Michael Liangca4f5a62014-07-10 15:45:13 -07001597 board_fullname = self.get_board()
1598
1599 # Strip the prefix and add it to dargs.
1600 dargs['board'] = board_fullname[board_fullname.find(':')+1:]
Fang Deng0ca40e22013-08-27 17:47:44 -07001601 super(CrosHost, self).reboot(**dargs)
Yu-Ju Honga2be94a2012-07-31 09:48:52 -07001602
1603
Gwendal Grignou7a61d2f2014-05-23 11:05:51 -07001604 def suspend(self, **dargs):
1605 """
1606 This function suspends the site host.
1607 """
1608 suspend_time = dargs.get('suspend_time', 60)
1609 dargs['timeout'] = suspend_time
1610 if 'suspend_cmd' not in dargs:
1611 cmd = ' && '.join(['echo 0 > /sys/class/rtc/rtc0/wakealarm',
1612 'echo +%d > /sys/class/rtc/rtc0/wakealarm' % suspend_time,
1613 'powerd_dbus_suspend --delay=0 &'])
1614 dargs['suspend_cmd'] = ('(( %s )'
1615 '< /dev/null >/dev/null 2>&1 &)' % cmd)
1616 super(CrosHost, self).suspend(**dargs)
1617
1618
Simran Basiec564392014-08-25 16:48:09 -07001619 def upstart_status(self, service_name):
1620 """Check the status of an upstart init script.
1621
1622 @param service_name: Service to look up.
1623
1624 @returns True if the service is running, False otherwise.
1625 """
1626 return self.run('status %s | grep start/running' %
1627 service_name).stdout.strip() != ''
1628
1629
J. Richard Barnette45e93de2012-04-11 17:24:15 -07001630 def verify_software(self):
Richard Barnetteb2bc13c2013-01-08 17:32:51 -08001631 """Verify working software on a Chrome OS system.
J. Richard Barnette45e93de2012-04-11 17:24:15 -07001632
Richard Barnetteb2bc13c2013-01-08 17:32:51 -08001633 Tests for the following conditions:
1634 1. All conditions tested by the parent version of this
1635 function.
1636 2. Sufficient space in /mnt/stateful_partition.
Fang Deng6b05f5b2013-03-20 13:42:11 -07001637 3. Sufficient space in /mnt/stateful_partition/encrypted.
1638 4. update_engine answers a simple status request over DBus.
J. Richard Barnette45e93de2012-04-11 17:24:15 -07001639
J. Richard Barnette45e93de2012-04-11 17:24:15 -07001640 """
MK Ryu35d661e2014-09-25 17:44:10 -07001641 # Check if a job was crashed on this host.
1642 # If yes, avoid verification until crash-logs are collected.
1643 if self._need_crash_logs():
1644 raise error.AutoservCrashLogCollectRequired(
1645 'Need to collect crash-logs before verification')
1646
Fang Deng0ca40e22013-08-27 17:47:44 -07001647 super(CrosHost, self).verify_software()
J. Richard Barnette4164d1d2014-12-02 17:52:33 -08001648 self.check_inodes(
1649 '/mnt/stateful_partition',
1650 global_config.global_config.get_config_value(
1651 'SERVER', 'kilo_inodes_required', type=int,
1652 default=100))
J. Richard Barnette45e93de2012-04-11 17:24:15 -07001653 self.check_diskspace(
1654 '/mnt/stateful_partition',
1655 global_config.global_config.get_config_value(
Fang Deng6b05f5b2013-03-20 13:42:11 -07001656 'SERVER', 'gb_diskspace_required', type=float,
1657 default=20.0))
Gaurav Shahe448af82014-06-19 15:18:59 -07001658 encrypted_stateful_path = '/mnt/stateful_partition/encrypted'
1659 # Not all targets build with encrypted stateful support.
1660 if self.path_exists(encrypted_stateful_path):
1661 self.check_diskspace(
1662 encrypted_stateful_path,
1663 global_config.global_config.get_config_value(
1664 'SERVER', 'gb_encrypted_diskspace_required', type=float,
1665 default=0.1))
beepsc87ff602013-07-31 21:53:00 -07001666
Simran Basiec564392014-08-25 16:48:09 -07001667 if not self.upstart_status('system-services'):
Prashanth B5d0a0512014-04-25 12:26:08 -07001668 raise error.AutoservError('Chrome failed to reach login. '
1669 'System services not running.')
1670
beepsc87ff602013-07-31 21:53:00 -07001671 # Factory images don't run update engine,
1672 # goofy controls dbus on these DUTs.
1673 if not self._is_factory_image():
1674 self.run('update_engine_client --status')
Scott Zawalskifbca4a92013-03-04 15:56:42 -05001675 # Makes sure python is present, loads and can use built in functions.
1676 # We have seen cases where importing cPickle fails with undefined
1677 # symbols in cPickle.so.
1678 self.run('python -c "import cPickle"')
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07001679
Dan Shi549fb822015-03-24 18:01:11 -07001680 self.verify_cros_version_label()
1681
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07001682
Dan Shi49ca0932014-11-14 11:22:27 -08001683 def verify_hardware(self):
1684 """Verify hardware system of a Chrome OS system.
1685
1686 Check following hardware conditions:
1687 1. Battery level.
1688 2. Is power adapter connected.
1689 """
1690 logging.info('Battery percentage: %s', self.get_battery_percentage())
Dan Shie9b765d2014-12-29 16:59:49 -08001691 if self.is_ac_connected() is None:
1692 logging.info('Can not determine if the device has power adapter '
1693 'connected.')
1694 else:
1695 logging.info('Device %s power adapter connected and charging.',
1696 'has' if self.is_ac_connected() else 'does not have')
Dan Shi49ca0932014-11-14 11:22:27 -08001697
1698
Fang Deng96667ca2013-08-01 17:46:18 -07001699 def make_ssh_command(self, user='root', port=22, opts='', hosts_file=None,
1700 connect_timeout=None, alive_interval=None):
1701 """Override default make_ssh_command to use options tuned for Chrome OS.
1702
1703 Tuning changes:
1704 - ConnectTimeout=30; maximum of 30 seconds allowed for an SSH
1705 connection failure. Consistency with remote_access.sh.
1706
1707 - ServerAliveInterval=180; which causes SSH to ping connection every
1708 180 seconds. In conjunction with ServerAliveCountMax ensures
1709 that if the connection dies, Autotest will bail out quickly.
1710 Originally tried 60 secs, but saw frequent job ABORTS where
1711 the test completed successfully.
1712
1713 - ServerAliveCountMax=3; consistency with remote_access.sh.
1714
1715 - ConnectAttempts=4; reduce flakiness in connection errors;
1716 consistency with remote_access.sh.
1717
1718 - UserKnownHostsFile=/dev/null; we don't care about the keys.
1719 Host keys change with every new installation, don't waste
1720 memory/space saving them.
1721
1722 - SSH protocol forced to 2; needed for ServerAliveInterval.
1723
1724 @param user User name to use for the ssh connection.
1725 @param port Port on the target host to use for ssh connection.
1726 @param opts Additional options to the ssh command.
1727 @param hosts_file Ignored.
1728 @param connect_timeout Ignored.
1729 @param alive_interval Ignored.
1730 """
Aviv Keshetc5947fa2013-09-04 14:06:29 -07001731 base_command = ('/usr/bin/ssh -a -x %s %s %s'
1732 ' -o StrictHostKeyChecking=no'
Fang Deng96667ca2013-08-01 17:46:18 -07001733 ' -o UserKnownHostsFile=/dev/null -o BatchMode=yes'
1734 ' -o ConnectTimeout=30 -o ServerAliveInterval=180'
1735 ' -o ServerAliveCountMax=3 -o ConnectionAttempts=4'
1736 ' -o Protocol=2 -l %s -p %d')
Aviv Keshetc5947fa2013-09-04 14:06:29 -07001737 return base_command % (self._ssh_verbosity_flag, self._ssh_options,
1738 opts, user, port)
Fang Deng96667ca2013-08-01 17:46:18 -07001739
1740
beeps32a63082013-08-22 14:02:29 -07001741 def _create_ssh_tunnel(self, port, local_port):
1742 """Create an ssh tunnel from local_port to port.
1743
1744 @param port: remote port on the host.
1745 @param local_port: local forwarding port.
1746
1747 @return: the tunnel process.
1748 """
1749 # Chrome OS on the target closes down most external ports
1750 # for security. We could open the port, but doing that
1751 # would conflict with security tests that check that only
1752 # expected ports are open. So, to get to the port on the
1753 # target we use an ssh tunnel.
1754 tunnel_options = '-n -N -q -L %d:localhost:%d' % (local_port, port)
1755 ssh_cmd = self.make_ssh_command(opts=tunnel_options)
1756 tunnel_cmd = '%s %s' % (ssh_cmd, self.hostname)
1757 logging.debug('Full tunnel command: %s', tunnel_cmd)
1758 tunnel_proc = subprocess.Popen(tunnel_cmd, shell=True, close_fds=True)
1759 logging.debug('Started ssh tunnel, local = %d'
1760 ' remote = %d, pid = %d',
1761 local_port, port, tunnel_proc.pid)
1762 return tunnel_proc
1763
1764
Christopher Wileydd181852013-10-10 19:56:58 -07001765 def _setup_rpc(self, port, command_name, remote_pid=None):
beeps32a63082013-08-22 14:02:29 -07001766 """Sets up a tunnel process and performs rpc connection book keeping.
1767
1768 This method assumes that xmlrpc and jsonrpc never conflict, since
1769 we can only either have an xmlrpc or a jsonrpc server listening on
1770 a remote port. As such, it enforces a single proxy->remote port
1771 policy, i.e if one starts a jsonrpc proxy/server from port A->B,
1772 and then tries to start an xmlrpc proxy forwarded to the same port,
1773 the xmlrpc proxy will override the jsonrpc tunnel process, however:
1774
1775 1. None of the methods on the xmlrpc proxy will work because
1776 the server listening on B is jsonrpc.
1777
1778 2. The xmlrpc client cannot initiate a termination of the JsonRPC
1779 server, as the only use case currently is goofy, which is tied to
1780 the factory image. It is much easier to handle a failed xmlrpc
1781 call on the client than it is to terminate goofy in this scenario,
1782 as doing the latter might leave the DUT in a hard to recover state.
1783
1784 With the current implementation newer rpc proxy connections will
1785 terminate the tunnel processes of older rpc connections tunneling
1786 to the same remote port. If methods are invoked on the client
1787 after this has happened they will fail with connection closed errors.
1788
1789 @param port: The remote forwarding port.
1790 @param command_name: The name of the remote process, to terminate
1791 using pkill.
1792
1793 @return A url that we can use to initiate the rpc connection.
1794 """
1795 self.rpc_disconnect(port)
1796 local_port = utils.get_unused_port()
1797 tunnel_proc = self._create_ssh_tunnel(port, local_port)
Christopher Wileydd181852013-10-10 19:56:58 -07001798 self._rpc_proxy_map[port] = (command_name, tunnel_proc, remote_pid)
beeps32a63082013-08-22 14:02:29 -07001799 return self._RPC_PROXY_URL % local_port
1800
1801
Christopher Wileyd78249a2013-03-01 13:05:31 -08001802 def xmlrpc_connect(self, command, port, command_name=None,
Yusuf Mohsinallyfff89d62013-11-18 16:34:07 -08001803 ready_test_name=None, timeout_seconds=10,
1804 logfile='/dev/null'):
J. Richard Barnette1d78b012012-05-15 13:56:30 -07001805 """Connect to an XMLRPC server on the host.
1806
1807 The `command` argument should be a simple shell command that
1808 starts an XMLRPC server on the given `port`. The command
1809 must not daemonize, and must terminate cleanly on SIGTERM.
1810 The command is started in the background on the host, and a
1811 local XMLRPC client for the server is created and returned
1812 to the caller.
1813
1814 Note that the process of creating an XMLRPC client makes no
1815 attempt to connect to the remote server; the caller is
1816 responsible for determining whether the server is running
1817 correctly, and is ready to serve requests.
1818
Christopher Wileyd78249a2013-03-01 13:05:31 -08001819 Optionally, the caller can pass ready_test_name, a string
1820 containing the name of a method to call on the proxy. This
1821 method should take no parameters and return successfully only
1822 when the server is ready to process client requests. When
1823 ready_test_name is set, xmlrpc_connect will block until the
1824 proxy is ready, and throw a TestError if the server isn't
1825 ready by timeout_seconds.
1826
beeps32a63082013-08-22 14:02:29 -07001827 If a server is already running on the remote port, this
1828 method will kill it and disconnect the tunnel process
1829 associated with the connection before establishing a new one,
1830 by consulting the rpc_proxy_map in rpc_disconnect.
1831
J. Richard Barnette1d78b012012-05-15 13:56:30 -07001832 @param command Shell command to start the server.
1833 @param port Port number on which the server is expected to
1834 be serving.
J. Richard Barnette7214e0b2013-02-06 15:20:49 -08001835 @param command_name String to use as input to `pkill` to
1836 terminate the XMLRPC server on the host.
Christopher Wileyd78249a2013-03-01 13:05:31 -08001837 @param ready_test_name String containing the name of a
1838 method defined on the XMLRPC server.
1839 @param timeout_seconds Number of seconds to wait
1840 for the server to become 'ready.' Will throw a
1841 TestFail error if server is not ready in time.
Yusuf Mohsinallyfff89d62013-11-18 16:34:07 -08001842 @param logfile Logfile to send output when running
1843 'command' argument.
Yusuf Mohsinally8d19e3c2013-11-21 14:25:45 -08001844
J. Richard Barnette1d78b012012-05-15 13:56:30 -07001845 """
Christopher Wileyc14f06a2013-10-16 13:55:39 -07001846 # Clean up any existing state. If the caller is willing
1847 # to believe their server is down, we ought to clean up
1848 # any tunnels we might have sitting around.
1849 self.rpc_disconnect(port)
J. Richard Barnette1d78b012012-05-15 13:56:30 -07001850 # Start the server on the host. Redirection in the command
1851 # below is necessary, because 'ssh' won't terminate until
1852 # background child processes close stdin, stdout, and
1853 # stderr.
Yusuf Mohsinallyfff89d62013-11-18 16:34:07 -08001854 remote_cmd = '%s </dev/null >%s 2>&1 & echo $!' % (command, logfile)
Christopher Wileydd181852013-10-10 19:56:58 -07001855 remote_pid = self.run(remote_cmd).stdout.rstrip('\n')
J. Richard Barnette1d78b012012-05-15 13:56:30 -07001856 logging.debug('Started XMLRPC server on host %s, pid = %s',
1857 self.hostname, remote_pid)
1858
Christopher Wileydd181852013-10-10 19:56:58 -07001859 # Tunnel through SSH to be able to reach that remote port.
1860 rpc_url = self._setup_rpc(port, command_name, remote_pid=remote_pid)
Christopher Wileyd78249a2013-03-01 13:05:31 -08001861 proxy = xmlrpclib.ServerProxy(rpc_url, allow_none=True)
Christopher Wileydd181852013-10-10 19:56:58 -07001862
Christopher Wileyd78249a2013-03-01 13:05:31 -08001863 if ready_test_name is not None:
J. Richard Barnette13eb7c02013-03-07 12:06:29 -08001864 # retry.retry logs each attempt; calculate delay_sec to
1865 # keep log spam to a dull roar.
Christopher Wiley0ed712b2013-04-09 15:25:12 -07001866 @retry.retry((socket.error,
1867 xmlrpclib.ProtocolError,
1868 httplib.BadStatusLine),
Chris Sosa65425082013-10-16 13:26:22 -07001869 timeout_min=timeout_seconds / 60.0,
1870 delay_sec=min(max(timeout_seconds / 20.0, 0.1), 1))
Christopher Wileyd78249a2013-03-01 13:05:31 -08001871 def ready_test():
1872 """ Call proxy.ready_test_name(). """
1873 getattr(proxy, ready_test_name)()
1874 successful = False
1875 try:
1876 logging.info('Waiting %d seconds for XMLRPC server '
1877 'to start.', timeout_seconds)
1878 ready_test()
1879 successful = True
Christopher Wileyd78249a2013-03-01 13:05:31 -08001880 finally:
1881 if not successful:
1882 logging.error('Failed to start XMLRPC server.')
beeps32a63082013-08-22 14:02:29 -07001883 self.rpc_disconnect(port)
Christopher Wileyd78249a2013-03-01 13:05:31 -08001884 logging.info('XMLRPC server started successfully.')
1885 return proxy
J. Richard Barnette1d78b012012-05-15 13:56:30 -07001886
J. Richard Barnette1d78b012012-05-15 13:56:30 -07001887
Jason Abeleb6f924f2013-11-13 16:01:54 -08001888 def syslog(self, message, tag='autotest'):
1889 """Logs a message to syslog on host.
1890
1891 @param message String message to log into syslog
1892 @param tag String tag prefix for syslog
1893
1894 """
1895 self.run('logger -t "%s" "%s"' % (tag, message))
1896
1897
beeps32a63082013-08-22 14:02:29 -07001898 def jsonrpc_connect(self, port):
1899 """Creates a jsonrpc proxy connection through an ssh tunnel.
1900
1901 This method exists to facilitate communication with goofy (which is
1902 the default system manager on all factory images) and as such, leaves
1903 most of the rpc server sanity checking to the caller. Unlike
1904 xmlrpc_connect, this method does not facilitate the creation of a remote
1905 jsonrpc server, as the only clients of this code are factory tests,
1906 for which the goofy system manager is built in to the image and starts
1907 when the target boots.
1908
1909 One can theoretically create multiple jsonrpc proxies all forwarded
1910 to the same remote port, provided the remote port has an rpc server
1911 listening. However, in doing so we stand the risk of leaking an
1912 existing tunnel process, so we always disconnect any older tunnels
1913 we might have through rpc_disconnect.
1914
1915 @param port: port on the remote host that is serving this proxy.
1916
1917 @return: The client proxy.
1918 """
1919 if not jsonrpclib:
1920 logging.warning('Jsonrpclib could not be imported. Check that '
1921 'site-packages contains jsonrpclib.')
1922 return None
1923
1924 proxy = jsonrpclib.jsonrpc.ServerProxy(self._setup_rpc(port, None))
1925
1926 logging.info('Established a jsonrpc connection through port %s.', port)
1927 return proxy
1928
1929
1930 def rpc_disconnect(self, port):
1931 """Disconnect from an RPC server on the host.
1932
1933 Terminates the remote RPC server previously started for
J. Richard Barnette1d78b012012-05-15 13:56:30 -07001934 the given `port`. Also closes the local ssh tunnel created
1935 for the connection to the host. This function does not
beeps32a63082013-08-22 14:02:29 -07001936 directly alter the state of a previously returned RPC
J. Richard Barnette1d78b012012-05-15 13:56:30 -07001937 client object; however disconnection will cause all
1938 subsequent calls to methods on the object to fail.
1939
1940 This function does nothing if requested to disconnect a port
beeps32a63082013-08-22 14:02:29 -07001941 that was not previously connected via _setup_rpc.
J. Richard Barnette1d78b012012-05-15 13:56:30 -07001942
1943 @param port Port number passed to a previous call to
beeps32a63082013-08-22 14:02:29 -07001944 `_setup_rpc()`.
J. Richard Barnette1d78b012012-05-15 13:56:30 -07001945 """
beeps32a63082013-08-22 14:02:29 -07001946 if port not in self._rpc_proxy_map:
J. Richard Barnette1d78b012012-05-15 13:56:30 -07001947 return
Christopher Wileydd181852013-10-10 19:56:58 -07001948 remote_name, tunnel_proc, remote_pid = self._rpc_proxy_map[port]
J. Richard Barnette1d78b012012-05-15 13:56:30 -07001949 if remote_name:
1950 # We use 'pkill' to find our target process rather than
1951 # a PID, because the host may have rebooted since
1952 # connecting, and we don't want to kill an innocent
1953 # process with the same PID.
1954 #
1955 # 'pkill' helpfully exits with status 1 if no target
1956 # process is found, for which run() will throw an
Simran Basid5e5e272012-09-24 15:23:59 -07001957 # exception. We don't want that, so we the ignore
J. Richard Barnette1d78b012012-05-15 13:56:30 -07001958 # status.
1959 self.run("pkill -f '%s'" % remote_name, ignore_status=True)
Christopher Wileydd181852013-10-10 19:56:58 -07001960 if remote_pid:
1961 logging.info('Waiting for RPC server "%s" shutdown',
1962 remote_name)
1963 start_time = time.time()
1964 while (time.time() - start_time <
1965 self._RPC_SHUTDOWN_TIMEOUT_SECONDS):
1966 running_processes = self.run(
1967 "pgrep -f '%s'" % remote_name,
1968 ignore_status=True).stdout.split()
1969 if not remote_pid in running_processes:
1970 logging.info('Shut down RPC server.')
1971 break
1972 time.sleep(self._RPC_SHUTDOWN_POLLING_PERIOD_SECONDS)
1973 else:
1974 raise error.TestError('Failed to shutdown RPC server %s' %
1975 remote_name)
J. Richard Barnette1d78b012012-05-15 13:56:30 -07001976
1977 if tunnel_proc.poll() is None:
1978 tunnel_proc.terminate()
1979 logging.debug('Terminated tunnel, pid %d', tunnel_proc.pid)
1980 else:
1981 logging.debug('Tunnel pid %d terminated early, status %d',
1982 tunnel_proc.pid, tunnel_proc.returncode)
beeps32a63082013-08-22 14:02:29 -07001983 del self._rpc_proxy_map[port]
J. Richard Barnette1d78b012012-05-15 13:56:30 -07001984
1985
beeps32a63082013-08-22 14:02:29 -07001986 def rpc_disconnect_all(self):
1987 """Disconnect all known RPC proxy ports."""
1988 for port in self._rpc_proxy_map.keys():
1989 self.rpc_disconnect(port)
J. Richard Barnette1d78b012012-05-15 13:56:30 -07001990
1991
Ilja H. Friedel1232e8a2014-06-17 21:30:48 -07001992 def poor_mans_rpc(self, fun):
1993 """
1994 Calls a function from client utils on the host and returns a string.
1995
1996 @param fun function in client utils namespace.
1997 @return output string from calling fun.
1998 """
Simran Basi263a9d32014-08-19 11:16:51 -07001999 script = 'cd %s/bin; ' % autotest.Autotest.get_installed_autodir(self)
Ilja H. Friedel1232e8a2014-06-17 21:30:48 -07002000 script += 'python -c "import common; import utils;'
2001 script += 'print utils.%s"' % fun
2002 return script
2003
2004
J. Richard Barnetteb6de7e32013-02-14 13:28:04 -08002005 def _ping_check_status(self, status):
2006 """Ping the host once, and return whether it has a given status.
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002007
J. Richard Barnetteb6de7e32013-02-14 13:28:04 -08002008 @param status Check the ping status against this value.
2009 @return True iff `status` and the result of ping are the same
2010 (i.e. both True or both False).
2011
2012 """
2013 ping_val = utils.ping(self.hostname, tries=1, deadline=1)
2014 return not (status ^ (ping_val == 0))
2015
2016 def _ping_wait_for_status(self, status, timeout):
2017 """Wait for the host to have a given status (UP or DOWN).
2018
2019 Status is checked by polling. Polling will not last longer
2020 than the number of seconds in `timeout`. The polling
2021 interval will be long enough that only approximately
2022 _PING_WAIT_COUNT polling cycles will be executed, subject
2023 to a maximum interval of about one minute.
2024
2025 @param status Waiting will stop immediately if `ping` of the
2026 host returns this status.
2027 @param timeout Poll for at most this many seconds.
2028 @return True iff the host status from `ping` matched the
2029 requested status at the time of return.
2030
2031 """
2032 # _ping_check_status() takes about 1 second, hence the
2033 # "- 1" in the formula below.
2034 poll_interval = min(int(timeout / self._PING_WAIT_COUNT), 60) - 1
2035 end_time = time.time() + timeout
2036 while time.time() <= end_time:
2037 if self._ping_check_status(status):
2038 return True
2039 if poll_interval > 0:
2040 time.sleep(poll_interval)
2041
2042 # The last thing we did was sleep(poll_interval), so it may
2043 # have been too long since the last `ping`. Check one more
2044 # time, just to be sure.
2045 return self._ping_check_status(status)
2046
2047 def ping_wait_up(self, timeout):
2048 """Wait for the host to respond to `ping`.
2049
2050 N.B. This method is not a reliable substitute for
2051 `wait_up()`, because a host that responds to ping will not
2052 necessarily respond to ssh. This method should only be used
2053 if the target DUT can be considered functional even if it
2054 can't be reached via ssh.
2055
2056 @param timeout Minimum time to allow before declaring the
2057 host to be non-responsive.
2058 @return True iff the host answered to ping before the timeout.
2059
2060 """
2061 return self._ping_wait_for_status(self._PING_STATUS_UP, timeout)
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002062
Andrew Bresticker678c0c72013-01-22 10:44:09 -08002063 def ping_wait_down(self, timeout):
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002064 """Wait until the host no longer responds to `ping`.
2065
J. Richard Barnetteb6de7e32013-02-14 13:28:04 -08002066 This function can be used as a slightly faster version of
2067 `wait_down()`, by avoiding potentially long ssh timeouts.
2068
2069 @param timeout Minimum time to allow for the host to become
2070 non-responsive.
2071 @return True iff the host quit answering ping before the
2072 timeout.
2073
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002074 """
J. Richard Barnetteb6de7e32013-02-14 13:28:04 -08002075 return self._ping_wait_for_status(self._PING_STATUS_DOWN, timeout)
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002076
Tom Wai-Hong Tamfced4f62014-04-17 10:56:30 +08002077 def test_wait_for_sleep(self, sleep_timeout=None):
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002078 """Wait for the client to enter low-power sleep mode.
2079
2080 The test for "is asleep" can't distinguish a system that is
2081 powered off; to confirm that the unit was asleep, it is
2082 necessary to force resume, and then call
2083 `test_wait_for_resume()`.
2084
2085 This function is expected to be called from a test as part
2086 of a sequence like the following:
2087
2088 ~~~~~~~~
2089 boot_id = host.get_boot_id()
2090 # trigger sleep on the host
2091 host.test_wait_for_sleep()
2092 # trigger resume on the host
2093 host.test_wait_for_resume(boot_id)
2094 ~~~~~~~~
2095
Tom Wai-Hong Tamfced4f62014-04-17 10:56:30 +08002096 @param sleep_timeout time limit in seconds to allow the host sleep.
2097
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002098 @exception TestFail The host did not go to sleep within
2099 the allowed time.
2100 """
Tom Wai-Hong Tamfced4f62014-04-17 10:56:30 +08002101 if sleep_timeout is None:
2102 sleep_timeout = self.SLEEP_TIMEOUT
2103
2104 if not self.ping_wait_down(timeout=sleep_timeout):
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002105 raise error.TestFail(
Tom Wai-Hong Tamfced4f62014-04-17 10:56:30 +08002106 'client failed to sleep after %d seconds' % sleep_timeout)
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002107
2108
Tom Wai-Hong Tamfced4f62014-04-17 10:56:30 +08002109 def test_wait_for_resume(self, old_boot_id, resume_timeout=None):
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002110 """Wait for the client to resume from low-power sleep mode.
2111
2112 The `old_boot_id` parameter should be the value from
2113 `get_boot_id()` obtained prior to entering sleep mode. A
2114 `TestFail` exception is raised if the boot id changes.
2115
2116 See @ref test_wait_for_sleep for more on this function's
2117 usage.
2118
J. Richard Barnette7214e0b2013-02-06 15:20:49 -08002119 @param old_boot_id A boot id value obtained before the
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002120 target host went to sleep.
Tom Wai-Hong Tamfced4f62014-04-17 10:56:30 +08002121 @param resume_timeout time limit in seconds to allow the host up.
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002122
2123 @exception TestFail The host did not respond within the
2124 allowed time.
2125 @exception TestFail The host responded, but the boot id test
2126 indicated a reboot rather than a sleep
2127 cycle.
2128 """
Tom Wai-Hong Tamfced4f62014-04-17 10:56:30 +08002129 if resume_timeout is None:
2130 resume_timeout = self.RESUME_TIMEOUT
2131
2132 if not self.wait_up(timeout=resume_timeout):
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002133 raise error.TestFail(
2134 'client failed to resume from sleep after %d seconds' %
Tom Wai-Hong Tamfced4f62014-04-17 10:56:30 +08002135 resume_timeout)
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002136 else:
2137 new_boot_id = self.get_boot_id()
2138 if new_boot_id != old_boot_id:
Tom Wai-Hong Tam01792682015-01-06 08:00:46 +08002139 logging.error('client rebooted (old boot %s, new boot %s)',
2140 old_boot_id, new_boot_id)
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002141 raise error.TestFail(
Tom Wai-Hong Tam01792682015-01-06 08:00:46 +08002142 'client rebooted, but sleep was expected')
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002143
2144
Tom Wai-Hong Tamfe005c22014-12-03 09:25:44 +08002145 def test_wait_for_shutdown(self, shutdown_timeout=None):
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002146 """Wait for the client to shut down.
2147
2148 The test for "has shut down" can't distinguish a system that
2149 is merely asleep; to confirm that the unit was down, it is
2150 necessary to force boot, and then call test_wait_for_boot().
2151
2152 This function is expected to be called from a test as part
2153 of a sequence like the following:
2154
2155 ~~~~~~~~
2156 boot_id = host.get_boot_id()
2157 # trigger shutdown on the host
2158 host.test_wait_for_shutdown()
2159 # trigger boot on the host
2160 host.test_wait_for_boot(boot_id)
2161 ~~~~~~~~
2162
Tom Wai-Hong Tamfe005c22014-12-03 09:25:44 +08002163 @param shutdown_timeout time limit in seconds to allow the host down.
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002164 @exception TestFail The host did not shut down within the
2165 allowed time.
2166 """
Tom Wai-Hong Tamfe005c22014-12-03 09:25:44 +08002167 if shutdown_timeout is None:
2168 shutdown_timeout = self.SHUTDOWN_TIMEOUT
2169
2170 if not self.ping_wait_down(timeout=shutdown_timeout):
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002171 raise error.TestFail(
2172 'client failed to shut down after %d seconds' %
Tom Wai-Hong Tamfe005c22014-12-03 09:25:44 +08002173 shutdown_timeout)
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002174
2175
2176 def test_wait_for_boot(self, old_boot_id=None):
2177 """Wait for the client to boot from cold power.
2178
2179 The `old_boot_id` parameter should be the value from
2180 `get_boot_id()` obtained prior to shutting down. A
2181 `TestFail` exception is raised if the boot id does not
2182 change. The boot id test is omitted if `old_boot_id` is not
2183 specified.
2184
2185 See @ref test_wait_for_shutdown for more on this function's
2186 usage.
2187
J. Richard Barnette7214e0b2013-02-06 15:20:49 -08002188 @param old_boot_id A boot id value obtained before the
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002189 shut down.
2190
2191 @exception TestFail The host did not respond within the
2192 allowed time.
2193 @exception TestFail The host responded, but the boot id test
2194 indicated that there was no reboot.
2195 """
J. Richard Barnetteeb69d722012-06-18 17:29:44 -07002196 if not self.wait_up(timeout=self.REBOOT_TIMEOUT):
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002197 raise error.TestFail(
2198 'client failed to reboot after %d seconds' %
J. Richard Barnetteeb69d722012-06-18 17:29:44 -07002199 self.REBOOT_TIMEOUT)
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002200 elif old_boot_id:
2201 if self.get_boot_id() == old_boot_id:
Tom Wai-Hong Tam01792682015-01-06 08:00:46 +08002202 logging.error('client not rebooted (boot %s)',
2203 old_boot_id)
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002204 raise error.TestFail(
Tom Wai-Hong Tam01792682015-01-06 08:00:46 +08002205 'client is back up, but did not reboot')
Simran Basid5e5e272012-09-24 15:23:59 -07002206
2207
2208 @staticmethod
2209 def check_for_rpm_support(hostname):
2210 """For a given hostname, return whether or not it is powered by an RPM.
2211
Simran Basi1df55112013-09-06 11:25:09 -07002212 @param hostname: hostname to check for rpm support.
2213
Simran Basid5e5e272012-09-24 15:23:59 -07002214 @return None if this host does not follows the defined naming format
2215 for RPM powered DUT's in the lab. If it does follow the format,
2216 it returns a regular expression MatchObject instead.
2217 """
Fang Dengbaff9082015-01-06 13:46:15 -08002218 return re.match(CrosHost._RPM_HOSTNAME_REGEX, hostname)
Simran Basid5e5e272012-09-24 15:23:59 -07002219
2220
2221 def has_power(self):
2222 """For this host, return whether or not it is powered by an RPM.
2223
2224 @return True if this host is in the CROS lab and follows the defined
2225 naming format.
2226 """
Fang Deng0ca40e22013-08-27 17:47:44 -07002227 return CrosHost.check_for_rpm_support(self.hostname)
Simran Basid5e5e272012-09-24 15:23:59 -07002228
2229
Ismail Noorbasha07fdb612013-02-14 14:13:31 -08002230 def _set_power(self, state, power_method):
2231 """Sets the power to the host via RPM, Servo or manual.
2232
2233 @param state Specifies which power state to set to DUT
2234 @param power_method Specifies which method of power control to
2235 use. By default "RPM" will be used. Valid values
2236 are the strings "RPM", "manual", "servoj10".
2237
2238 """
2239 ACCEPTABLE_STATES = ['ON', 'OFF']
2240
2241 if state.upper() not in ACCEPTABLE_STATES:
2242 raise error.TestError('State must be one of: %s.'
2243 % (ACCEPTABLE_STATES,))
2244
2245 if power_method == self.POWER_CONTROL_SERVO:
2246 logging.info('Setting servo port J10 to %s', state)
2247 self.servo.set('prtctl3_pwren', state.lower())
2248 time.sleep(self._USB_POWER_TIMEOUT)
2249 elif power_method == self.POWER_CONTROL_MANUAL:
2250 logging.info('You have %d seconds to set the AC power to %s.',
2251 self._POWER_CYCLE_TIMEOUT, state)
2252 time.sleep(self._POWER_CYCLE_TIMEOUT)
2253 else:
2254 if not self.has_power():
2255 raise error.TestFail('DUT does not have RPM connected.')
Simran Basi5e6339a2013-03-21 11:34:32 -07002256 afe = frontend_wrappers.RetryingAFE(timeout_min=5, delay_sec=10)
2257 afe.set_host_attribute(self._RPM_OUTLET_CHANGED, True,
2258 hostname=self.hostname)
Simran Basi1df55112013-09-06 11:25:09 -07002259 rpm_client.set_power(self.hostname, state.upper(), timeout_mins=5)
Simran Basid5e5e272012-09-24 15:23:59 -07002260
2261
Ismail Noorbasha07fdb612013-02-14 14:13:31 -08002262 def power_off(self, power_method=POWER_CONTROL_RPM):
2263 """Turn off power to this host via RPM, Servo or manual.
2264
2265 @param power_method Specifies which method of power control to
2266 use. By default "RPM" will be used. Valid values
2267 are the strings "RPM", "manual", "servoj10".
2268
2269 """
2270 self._set_power('OFF', power_method)
Simran Basid5e5e272012-09-24 15:23:59 -07002271
2272
Ismail Noorbasha07fdb612013-02-14 14:13:31 -08002273 def power_on(self, power_method=POWER_CONTROL_RPM):
2274 """Turn on power to this host via RPM, Servo or manual.
2275
2276 @param power_method Specifies which method of power control to
2277 use. By default "RPM" will be used. Valid values
2278 are the strings "RPM", "manual", "servoj10".
2279
2280 """
2281 self._set_power('ON', power_method)
2282
2283
2284 def power_cycle(self, power_method=POWER_CONTROL_RPM):
2285 """Cycle power to this host by turning it OFF, then ON.
2286
2287 @param power_method Specifies which method of power control to
2288 use. By default "RPM" will be used. Valid values
2289 are the strings "RPM", "manual", "servoj10".
2290
2291 """
2292 if power_method in (self.POWER_CONTROL_SERVO,
2293 self.POWER_CONTROL_MANUAL):
2294 self.power_off(power_method=power_method)
2295 time.sleep(self._POWER_CYCLE_TIMEOUT)
2296 self.power_on(power_method=power_method)
2297 else:
2298 rpm_client.set_power(self.hostname, 'CYCLE')
Simran Basic6f1f7a2012-10-16 10:47:46 -07002299
2300
2301 def get_platform(self):
2302 """Determine the correct platform label for this host.
2303
2304 @returns a string representing this host's platform.
2305 """
2306 crossystem = utils.Crossystem(self)
2307 crossystem.init()
2308 # Extract fwid value and use the leading part as the platform id.
2309 # fwid generally follow the format of {platform}.{firmware version}
2310 # Example: Alex.X.YYY.Z or Google_Alex.X.YYY.Z
2311 platform = crossystem.fwid().split('.')[0].lower()
2312 # Newer platforms start with 'Google_' while the older ones do not.
2313 return platform.replace('google_', '')
2314
2315
Hung-ying Tyanb1328032014-04-01 14:18:54 +08002316 def get_architecture(self):
2317 """Determine the correct architecture label for this host.
2318
2319 @returns a string representing this host's architecture.
2320 """
2321 crossystem = utils.Crossystem(self)
2322 crossystem.init()
2323 return crossystem.arch()
2324
2325
Luis Lozano40b7d0d2014-01-17 15:12:06 -08002326 def get_chrome_version(self):
2327 """Gets the Chrome version number and milestone as strings.
2328
2329 Invokes "chrome --version" to get the version number and milestone.
2330
2331 @return A tuple (chrome_ver, milestone) where "chrome_ver" is the
2332 current Chrome version number as a string (in the form "W.X.Y.Z")
2333 and "milestone" is the first component of the version number
2334 (the "W" from "W.X.Y.Z"). If the version number cannot be parsed
2335 in the "W.X.Y.Z" format, the "chrome_ver" will be the full output
2336 of "chrome --version" and the milestone will be the empty string.
2337
2338 """
MK Ryu35d661e2014-09-25 17:44:10 -07002339 version_string = self.run(client_constants.CHROME_VERSION_COMMAND).stdout
Luis Lozano40b7d0d2014-01-17 15:12:06 -08002340 return utils.parse_chrome_version(version_string)
2341
Aviv Keshet74c89a92013-02-04 15:18:30 -08002342 @label_decorator()
Simran Basic6f1f7a2012-10-16 10:47:46 -07002343 def get_board(self):
2344 """Determine the correct board label for this host.
2345
2346 @returns a string representing this host's board.
2347 """
2348 release_info = utils.parse_cmd_output('cat /etc/lsb-release',
2349 run_method=self.run)
2350 board = release_info['CHROMEOS_RELEASE_BOARD']
2351 # Devices in the lab generally have the correct board name but our own
2352 # development devices have {board_name}-signed-{key_type}. The board
2353 # name may also begin with 'x86-' which we need to keep.
Simran Basi833814b2013-01-29 13:13:43 -08002354 board_format_string = ds_constants.BOARD_PREFIX + '%s'
Simran Basic6f1f7a2012-10-16 10:47:46 -07002355 if 'x86' not in board:
Simran Basi833814b2013-01-29 13:13:43 -08002356 return board_format_string % board.split('-')[0]
2357 return board_format_string % '-'.join(board.split('-')[0:2])
Simran Basic6f1f7a2012-10-16 10:47:46 -07002358
2359
Ilja H. Friedel1232e8a2014-06-17 21:30:48 -07002360 @label_decorator('board_freq_mem')
2361 def get_board_with_frequency_and_memory(self):
2362 """
2363 Determines the board name with frequency and memory.
2364
2365 @returns a more detailed string representing the board. Examples are
2366 butterfly_1.1GHz_2GB, link_1.8GHz_4GB, x86-zgb_1.7GHz_2GB
2367 """
2368 board = self.run(self.poor_mans_rpc(
2369 'get_board_with_frequency_and_memory()')).stdout
2370 return 'board_freq_mem:%s' % str.strip(board)
2371
2372
Aviv Keshet74c89a92013-02-04 15:18:30 -08002373 @label_decorator('lightsensor')
Simran Basic6f1f7a2012-10-16 10:47:46 -07002374 def has_lightsensor(self):
2375 """Determine the correct board label for this host.
2376
2377 @returns the string 'lightsensor' if this host has a lightsensor or
2378 None if it does not.
2379 """
2380 search_cmd = "find -L %s -maxdepth 4 | egrep '%s'" % (
Richard Barnette82c35912012-11-20 10:09:10 -08002381 self._LIGHTSENSOR_SEARCH_DIR, '|'.join(self._LIGHTSENSOR_FILES))
Simran Basic6f1f7a2012-10-16 10:47:46 -07002382 try:
2383 # Run the search cmd following the symlinks. Stderr_tee is set to
2384 # None as there can be a symlink loop, but the command will still
2385 # execute correctly with a few messages printed to stderr.
2386 self.run(search_cmd, stdout_tee=None, stderr_tee=None)
2387 return 'lightsensor'
2388 except error.AutoservRunError:
2389 # egrep exited with a return code of 1 meaning none of the possible
2390 # lightsensor files existed.
2391 return None
2392
2393
Aviv Keshet74c89a92013-02-04 15:18:30 -08002394 @label_decorator('bluetooth')
Simran Basic6f1f7a2012-10-16 10:47:46 -07002395 def has_bluetooth(self):
2396 """Determine the correct board label for this host.
2397
2398 @returns the string 'bluetooth' if this host has bluetooth or
2399 None if it does not.
2400 """
2401 try:
2402 self.run('test -d /sys/class/bluetooth/hci0')
2403 # test exited with a return code of 0.
2404 return 'bluetooth'
2405 except error.AutoservRunError:
2406 # test exited with a return code 1 meaning the directory did not
2407 # exist.
2408 return None
2409
2410
Ilja H. Friedel1232e8a2014-06-17 21:30:48 -07002411 @label_decorator('gpu_family')
2412 def get_gpu_family(self):
2413 """
2414 Determine GPU family.
2415
2416 @returns a string representing the gpu family. Examples are mali, tegra,
2417 pinetrail, sandybridge, ivybridge, haswell and baytrail.
2418 """
2419 gpu_family = self.run(self.poor_mans_rpc('get_gpu_family()')).stdout
2420 return 'gpu_family:%s' % str.strip(gpu_family)
2421
2422
Ilja Friedel0ce0b602013-08-15 18:45:27 -07002423 @label_decorator('graphics')
2424 def get_graphics(self):
2425 """
2426 Determine the correct board label for this host.
2427
2428 @returns a string representing this host's graphics. For now ARM boards
2429 return graphics:gles while all other boards return graphics:gl. This
2430 may change over time, but for robustness reasons this should avoid
2431 executing code in actual graphics libraries (which may not be ready and
2432 is tested by graphics_GLAPICheck).
2433 """
2434 uname = self.run('uname -a').stdout.lower()
2435 if 'arm' in uname:
2436 return 'graphics:gles'
2437 return 'graphics:gl'
2438
2439
Bill Richardson4f595f52014-02-13 16:20:26 -08002440 @label_decorator('ec')
2441 def get_ec(self):
2442 """
2443 Determine the type of EC on this host.
2444
2445 @returns a string representing this host's embedded controller type.
2446 At present, it only returns "ec:cros", for Chrome OS ECs. Other types
2447 of EC (or none) don't return any strings, since no tests depend on
2448 those.
2449 """
2450 cmd = 'mosys ec info'
2451 # The output should look like these, so that the last field should
2452 # match our EC version scheme:
2453 #
2454 # stm | stm32f100 | snow_v1.3.139-375eb9f
2455 # ti | Unknown-10de | peppy_v1.5.114-5d52788
2456 #
2457 # Non-Chrome OS ECs will look like these:
2458 #
2459 # ENE | KB932 | 00BE107A00
2460 # ite | it8518 | 3.08
2461 #
2462 # And some systems don't have ECs at all (Lumpy, for example).
2463 regexp = r'^.*\|\s*(\S+_v\d+\.\d+\.\d+-[0-9a-f]+)\s*$'
2464
2465 ecinfo = self.run(command=cmd, ignore_status=True)
2466 if ecinfo.exit_status == 0:
2467 res = re.search(regexp, ecinfo.stdout)
2468 if res:
2469 logging.info("EC version is %s", res.groups()[0])
2470 return 'ec:cros'
2471 logging.info("%s got: %s", cmd, ecinfo.stdout)
2472 # Has an EC, but it's not a Chrome OS EC
2473 return None
2474 logging.info("%s exited with status %d", cmd, ecinfo.exit_status)
2475 # No EC present
2476 return None
2477
2478
Alec Berg31b932b2014-04-04 16:09:11 -07002479 @label_decorator('accels')
2480 def get_accels(self):
2481 """
2482 Determine the type of accelerometers on this host.
2483
2484 @returns a string representing this host's accelerometer type.
2485 At present, it only returns "accel:cros-ec", for accelerometers
2486 attached to a Chrome OS EC, or none, if no accelerometers.
2487 """
2488 # Check to make sure we have ectool
2489 rv = self.run('which ectool', ignore_status=True)
2490 if rv.exit_status:
2491 logging.info("No ectool cmd found, assuming no EC accelerometers")
2492 return None
2493
2494 # Check that the EC supports the motionsense command
2495 rv = self.run('ectool motionsense', ignore_status=True)
2496 if rv.exit_status:
2497 logging.info("EC does not support motionsense command "
2498 "assuming no EC accelerometers")
2499 return None
2500
2501 # Check that EC motion sensors are active
2502 active = self.run('ectool motionsense active').stdout.split('\n')
2503 if active[0] == "0":
2504 logging.info("Motion sense inactive, assuming no EC accelerometers")
2505 return None
2506
2507 logging.info("EC accelerometers found")
2508 return 'accel:cros-ec'
2509
2510
Tom Wai-Hong Tam3d6790d2014-04-14 16:15:47 +08002511 @label_decorator('chameleon')
2512 def has_chameleon(self):
2513 """Determine if a Chameleon connected to this host.
2514
Tom Wai-Hong Tambadbb332014-10-10 02:59:41 +08002515 @returns a list containing two strings ('chameleon' and
2516 'chameleon:' + label, e.g. 'chameleon:hdmi') if this host
2517 has a Chameleon or None if it has not.
Tom Wai-Hong Tam3d6790d2014-04-14 16:15:47 +08002518 """
2519 if self._chameleon_host:
Tom Wai-Hong Tambadbb332014-10-10 02:59:41 +08002520 return ['chameleon', 'chameleon:' + self.chameleon.get_label()]
Tom Wai-Hong Tam3d6790d2014-04-14 16:15:47 +08002521 else:
2522 return None
2523
2524
Cheng-Yi Chiangf4104ff2014-12-23 19:39:01 +08002525 @label_decorator('audio_loopback_dongle')
2526 def has_loopback_dongle(self):
2527 """Determine if an audio loopback dongle is plugged to this host.
2528
2529 @returns 'audio_loopback_dongle' when there is an audio loopback dongle
2530 plugged to this host.
2531 None when there is no audio loopback dongle
2532 plugged to this host.
2533 """
2534 server_info = self.run(command='cras_test_client --dump_s',
2535 ignore_status=True).stdout
2536 if (cras_utils.node_type_is_plugged('HEADPHONE', server_info) and
2537 cras_utils.node_type_is_plugged('MIC', server_info)):
2538 return 'audio_loopback_dongle'
2539 else:
2540 return None
2541
2542
Derek Basehorec71ff622014-07-07 15:18:40 -07002543 @label_decorator('power_supply')
2544 def get_power_supply(self):
2545 """
2546 Determine what type of power supply the host has
2547
2548 @returns a string representing this host's power supply.
2549 'power:battery' when the device has a battery intended for
2550 extended use
2551 'power:AC_primary' when the device has a battery not intended
2552 for extended use (for moving the machine, etc)
2553 'power:AC_only' when the device has no battery at all.
2554 """
2555 psu = self.run(command='mosys psu type', ignore_status=True)
2556 if psu.exit_status:
2557 # The psu command for mosys is not included for all platforms. The
2558 # assumption is that the device will have a battery if the command
2559 # is not found.
2560 return 'power:battery'
2561
2562 psu_str = psu.stdout.strip()
2563 if psu_str == 'unknown':
2564 return None
2565
2566 return 'power:%s' % psu_str
2567
2568
Puthikorn Voravootivatfa011242014-03-14 18:45:11 -07002569 @label_decorator('storage')
2570 def get_storage(self):
2571 """
2572 Determine the type of boot device for this host.
2573
2574 Determine if the internal device is SCSI or dw_mmc device.
2575 Then check that it is SSD or HDD or eMMC or something else.
2576
2577 @returns a string representing this host's internal device type.
2578 'storage:ssd' when internal device is solid state drive
2579 'storage:hdd' when internal device is hard disk drive
2580 'storage:mmc' when internal device is mmc drive
2581 None When internal device is something else or
2582 when we are unable to determine the type
2583 """
2584 # The output should be /dev/mmcblk* for SD/eMMC or /dev/sd* for scsi
2585 rootdev_cmd = ' '.join(['. /usr/sbin/write_gpt.sh;',
2586 '. /usr/share/misc/chromeos-common.sh;',
2587 'load_base_vars;',
2588 'get_fixed_dst_drive'])
Puthikorn Voravootivat03c51682014-04-24 13:52:12 -07002589 rootdev = self.run(command=rootdev_cmd, ignore_status=True)
2590 if rootdev.exit_status:
2591 logging.info("Fail to run %s", rootdev_cmd)
2592 return None
Puthikorn Voravootivatfa011242014-03-14 18:45:11 -07002593 rootdev_str = rootdev.stdout.strip()
2594
2595 if not rootdev_str:
2596 return None
2597
2598 rootdev_base = os.path.basename(rootdev_str)
2599
2600 mmc_pattern = '/dev/mmcblk[0-9]'
2601 if re.match(mmc_pattern, rootdev_str):
2602 # Use type to determine if the internal device is eMMC or somthing
2603 # else. We can assume that MMC is always an internal device.
2604 type_cmd = 'cat /sys/block/%s/device/type' % rootdev_base
Puthikorn Voravootivat03c51682014-04-24 13:52:12 -07002605 type = self.run(command=type_cmd, ignore_status=True)
2606 if type.exit_status:
2607 logging.info("Fail to run %s", type_cmd)
2608 return None
Puthikorn Voravootivatfa011242014-03-14 18:45:11 -07002609 type_str = type.stdout.strip()
2610
2611 if type_str == 'MMC':
2612 return 'storage:mmc'
2613
2614 scsi_pattern = '/dev/sd[a-z]+'
2615 if re.match(scsi_pattern, rootdev.stdout):
2616 # Read symlink for /sys/block/sd* to determine if the internal
2617 # device is connected via ata or usb.
2618 link_cmd = 'readlink /sys/block/%s' % rootdev_base
Puthikorn Voravootivat03c51682014-04-24 13:52:12 -07002619 link = self.run(command=link_cmd, ignore_status=True)
2620 if link.exit_status:
2621 logging.info("Fail to run %s", link_cmd)
2622 return None
Puthikorn Voravootivatfa011242014-03-14 18:45:11 -07002623 link_str = link.stdout.strip()
2624 if 'usb' in link_str:
2625 return None
2626
2627 # Read rotation to determine if the internal device is ssd or hdd.
2628 rotate_cmd = str('cat /sys/block/%s/queue/rotational'
2629 % rootdev_base)
Puthikorn Voravootivat03c51682014-04-24 13:52:12 -07002630 rotate = self.run(command=rotate_cmd, ignore_status=True)
2631 if rotate.exit_status:
2632 logging.info("Fail to run %s", rotate_cmd)
2633 return None
Puthikorn Voravootivatfa011242014-03-14 18:45:11 -07002634 rotate_str = rotate.stdout.strip()
2635
2636 rotate_dict = {'0':'storage:ssd', '1':'storage:hdd'}
2637 return rotate_dict.get(rotate_str)
2638
2639 # All other internal device / error case will always fall here
2640 return None
2641
2642
Dan Shi4e9a2aa2014-03-24 14:28:42 -07002643 @label_decorator('servo')
2644 def get_servo(self):
2645 """Determine if the host has a servo attached.
2646
2647 If the host has a working servo attached, it should have a servo label.
2648
2649 @return: string 'servo' if the host has servo attached. Otherwise,
2650 returns None.
2651 """
2652 return 'servo' if self._servo_host else None
2653
2654
Dan Shi5beba472014-05-28 22:46:07 -07002655 @label_decorator('video_labels')
2656 def get_video_labels(self):
2657 """Run /usr/local/bin/avtest_label_detect to get a list of video labels.
2658
2659 Sample output of avtest_label_detect:
2660 Detected label: hw_video_acc_vp8
2661 Detected label: webcam
2662
2663 @return: A list of labels detected by tool avtest_label_detect.
2664 """
2665 try:
2666 result = self.run('/usr/local/bin/avtest_label_detect').stdout
2667 return re.findall('^Detected label: (\w+)$', result, re.M)
2668 except error.AutoservRunError:
2669 # The tool is not installed.
2670 return []
2671
2672
mussa584b4462014-06-20 15:13:28 -07002673 @label_decorator('video_glitch_detection')
2674 def is_video_glitch_detection_supported(self):
2675 """ Determine if a board under test is supported for video glitch
2676 detection tests.
2677
2678 @return: 'video_glitch_detection' if board is supported, None otherwise.
2679 """
2680 parser = ConfigParser.SafeConfigParser()
2681 filename = os.path.join(
2682 common.autotest_dir, 'client/cros/video/device_spec.conf')
2683
2684 dut = self.get_board().replace(ds_constants.BOARD_PREFIX, '')
2685
2686 try:
2687 parser.read(filename)
mussa584b4462014-06-20 15:13:28 -07002688 supported_boards = parser.sections()
2689
Mussa83c84d62014-10-02 12:11:28 -07002690 return 'video_glitch_detection' if dut in supported_boards else None
mussa584b4462014-06-20 15:13:28 -07002691
2692 except ConfigParser.error:
2693 # something went wrong while parsing the conf file
2694 return None
2695
Katherine Threlkeld7b97a9f2014-06-24 13:47:14 -07002696 @label_decorator('touch_labels')
2697 def get_touch(self):
2698 """
2699 Determine whether board under test has a touchpad or touchscreen.
2700
2701 @return: A list of some combination of 'touchscreen' and 'touchpad',
2702 depending on what is present on the device.
2703 """
2704 labels = []
2705 input_cmd = '/opt/google/input/inputcontrol --names -t %s'
2706 for elt in ['touchpad', 'touchscreen']:
2707 if self.run(input_cmd % elt).stdout:
2708 labels.append(elt)
2709 return labels
2710
2711
mussa584b4462014-06-20 15:13:28 -07002712
Simran Basic6f1f7a2012-10-16 10:47:46 -07002713 def get_labels(self):
2714 """Return a list of labels for this given host.
2715
2716 This is the main way to retrieve all the automatic labels for a host
2717 as it will run through all the currently implemented label functions.
2718 """
2719 labels = []
Richard Barnette82c35912012-11-20 10:09:10 -08002720 for label_function in self._LABEL_FUNCTIONS:
J. Richard Barnetteb869b222014-09-03 17:55:44 -07002721 try:
2722 label = label_function(self)
2723 except Exception as e:
2724 logging.error('Label function %s failed; ignoring it.',
2725 label_function.__name__)
2726 logging.exception(e)
2727 label = None
Simran Basic6f1f7a2012-10-16 10:47:46 -07002728 if label:
Dan Shi5beba472014-05-28 22:46:07 -07002729 if type(label) is str:
2730 labels.append(label)
2731 elif type(label) is list:
2732 labels.extend(label)
Simran Basic6f1f7a2012-10-16 10:47:46 -07002733 return labels
Dan Shi85276d42014-04-08 22:11:45 -07002734
2735
2736 def is_boot_from_usb(self):
2737 """Check if DUT is boot from USB.
2738
2739 @return: True if DUT is boot from usb.
2740 """
2741 device = self.run('rootdev -s -d').stdout.strip()
2742 removable = int(self.run('cat /sys/block/%s/removable' %
2743 os.path.basename(device)).stdout.strip())
2744 return removable == 1
Helen Zhang17dae2b2014-11-11 09:25:52 -08002745
2746
2747 def read_from_meminfo(self, key):
Dan Shi49ca0932014-11-14 11:22:27 -08002748 """Return the memory info from /proc/meminfo
Helen Zhang17dae2b2014-11-11 09:25:52 -08002749
2750 @param key: meminfo requested
2751
2752 @return the memory value as a string
2753
2754 """
Helen Zhang17dae2b2014-11-11 09:25:52 -08002755 meminfo = self.run('grep %s /proc/meminfo' % key).stdout.strip()
2756 logging.debug('%s', meminfo)
2757 return int(re.search(r'\d+', meminfo).group(0))