blob: 3692d37deffb0421af9ff7e38c117b0b1acb9243 [file] [log] [blame]
J. Richard Barnette24adbf42012-04-11 15:04:53 -07001# Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
Dale Curtisaa5eedb2011-08-23 16:18:52 -07002# Use of this source code is governed by a BSD-style license that can be
3# found in the LICENSE file.
4
mussa584b4462014-06-20 15:13:28 -07005import ConfigParser
Aviv Keshet74c89a92013-02-04 15:18:30 -08006import functools
Christopher Wiley0ed712b2013-04-09 15:25:12 -07007import httplib
Darren Krahn495b0982015-09-21 19:12:51 -07008import json
J. Richard Barnette1d78b012012-05-15 13:56:30 -07009import logging
Dan Shi0f466e82013-02-22 15:44:58 -080010import os
Simran Basid5e5e272012-09-24 15:23:59 -070011import re
Christopher Wileyd78249a2013-03-01 13:05:31 -080012import socket
J. Richard Barnette134ec2c2012-04-25 12:59:37 -070013import time
J. Richard Barnette1d78b012012-05-15 13:56:30 -070014import xmlrpclib
J. Richard Barnette134ec2c2012-04-25 12:59:37 -070015
mussa584b4462014-06-20 15:13:28 -070016import common
J. Richard Barnette45e93de2012-04-11 17:24:15 -070017from autotest_lib.client.bin import utils
Dan Shi9cb0eec2014-06-03 09:04:50 -070018from autotest_lib.client.common_lib import autotemp
Richard Barnette0c73ffc2012-11-19 15:21:18 -080019from autotest_lib.client.common_lib import error
20from autotest_lib.client.common_lib import global_config
Dan Shi549fb822015-03-24 18:01:11 -070021from autotest_lib.client.common_lib import lsbrelease_utils
J. Richard Barnette45e93de2012-04-11 17:24:15 -070022from autotest_lib.client.common_lib.cros import autoupdater
Richard Barnette03a0c132012-11-05 12:40:35 -080023from autotest_lib.client.common_lib.cros import dev_server
Christopher Wileyd78249a2013-03-01 13:05:31 -080024from autotest_lib.client.common_lib.cros import retry
Gabe Blackb72f4fb2015-01-20 16:47:13 -080025from autotest_lib.client.common_lib.cros.graphite import autotest_es
Gabe Black1e1c41b2015-02-04 23:55:15 -080026from autotest_lib.client.common_lib.cros.graphite import autotest_stats
Hsinyu Chaoe0b08e62015-08-11 10:50:37 +000027from autotest_lib.client.cros import constants as client_constants
J. Richard Barnette84890bd2014-02-21 11:05:47 -080028from autotest_lib.client.cros import cros_ui
Cheng-Yi Chiangf4104ff2014-12-23 19:39:01 +080029from autotest_lib.client.cros.audio import cras_utils
Katherine Threlkeldab83d392015-06-18 16:45:57 -070030from autotest_lib.client.cros.input_playback import input_playback
MK Ryu35d661e2014-09-25 17:44:10 -070031from autotest_lib.server import autoserv_parser
32from autotest_lib.server import autotest
33from autotest_lib.server import constants
34from autotest_lib.server import crashcollect
Dan Shia1ecd5c2013-06-06 11:21:31 -070035from autotest_lib.server import utils as server_utils
Dan Shi9cb0eec2014-06-03 09:04:50 -070036from autotest_lib.server.cros import provision
Scott Zawalski89c44dd2013-02-26 09:28:02 -050037from autotest_lib.server.cros.dynamic_suite import constants as ds_constants
Simran Basi5e6339a2013-03-21 11:34:32 -070038from autotest_lib.server.cros.dynamic_suite import tools, frontend_wrappers
Dan Shi9cb0eec2014-06-03 09:04:50 -070039from autotest_lib.server.cros.faft.config.config import Config as FAFTConfig
Fang Deng96667ca2013-08-01 17:46:18 -070040from autotest_lib.server.hosts import abstract_ssh
Tom Wai-Hong Tamefe1c7f2014-01-02 14:00:11 +080041from autotest_lib.server.hosts import chameleon_host
Fang Deng5d518f42013-08-02 14:04:32 -070042from autotest_lib.server.hosts import servo_host
Simran Basidcff4252012-11-20 16:13:20 -080043from autotest_lib.site_utils.rpm_control_system import rpm_client
Simran Basid5e5e272012-09-24 15:23:59 -070044
45
beeps32a63082013-08-22 14:02:29 -070046try:
47 import jsonrpclib
48except ImportError:
49 jsonrpclib = None
Fang Deng96667ca2013-08-01 17:46:18 -070050
Fang Dengd1c2b732013-08-20 12:59:46 -070051
Dan Shib8540a52015-07-16 14:18:23 -070052CONFIG = global_config.global_config
53
Eric Carusoee673ac2015-08-05 17:03:04 -070054LUCID_SLEEP_BOARDS = ['samus', 'lulu']
55
beepsc87ff602013-07-31 21:53:00 -070056class FactoryImageCheckerException(error.AutoservError):
57 """Exception raised when an image is a factory image."""
58 pass
59
60
Aviv Keshet74c89a92013-02-04 15:18:30 -080061def add_label_detector(label_function_list, label_list=None, label=None):
62 """Decorator used to group functions together into the provided list.
63 @param label_function_list: List of label detecting functions to add
64 decorated function to.
65 @param label_list: List of detectable labels to add detectable labels to.
66 (Default: None)
67 @param label: Label string that is detectable by this detection function
68 (Default: None)
J. Richard Barnette7214e0b2013-02-06 15:20:49 -080069 """
Simran Basic6f1f7a2012-10-16 10:47:46 -070070 def add_func(func):
Aviv Keshet74c89a92013-02-04 15:18:30 -080071 """
72 @param func: The function to be added as a detector.
73 """
74 label_function_list.append(func)
75 if label and label_list is not None:
76 label_list.append(label)
Simran Basic6f1f7a2012-10-16 10:47:46 -070077 return func
78 return add_func
79
80
Fang Deng0ca40e22013-08-27 17:47:44 -070081class CrosHost(abstract_ssh.AbstractSSHHost):
J. Richard Barnette45e93de2012-04-11 17:24:15 -070082 """Chromium OS specific subclass of Host."""
83
84 _parser = autoserv_parser.autoserv_parser
Scott Zawalski62bacae2013-03-05 10:40:32 -050085 _AFE = frontend_wrappers.RetryingAFE(timeout_min=5, delay_sec=10)
J. Richard Barnette45e93de2012-04-11 17:24:15 -070086
Richard Barnette03a0c132012-11-05 12:40:35 -080087 # Timeout values (in seconds) associated with various Chrome OS
88 # state changes.
J. Richard Barnette134ec2c2012-04-25 12:59:37 -070089 #
Richard Barnette0c73ffc2012-11-19 15:21:18 -080090 # In general, a good rule of thumb is that the timeout can be up
91 # to twice the typical measured value on the slowest platform.
92 # The times here have not necessarily been empirically tested to
93 # meet this criterion.
J. Richard Barnetteeb69d722012-06-18 17:29:44 -070094 #
95 # SLEEP_TIMEOUT: Time to allow for suspend to memory.
Richard Barnette0c73ffc2012-11-19 15:21:18 -080096 # RESUME_TIMEOUT: Time to allow for resume after suspend, plus
97 # time to restart the netwowrk.
J. Richard Barnette84890bd2014-02-21 11:05:47 -080098 # SHUTDOWN_TIMEOUT: Time to allow for shut down.
J. Richard Barnetteeb69d722012-06-18 17:29:44 -070099 # BOOT_TIMEOUT: Time to allow for boot from power off. Among
Richard Barnette0c73ffc2012-11-19 15:21:18 -0800100 # other things, this must account for the 30 second dev-mode
J. Richard Barnetted4649c62013-03-06 17:42:27 -0800101 # screen delay and time to start the network.
J. Richard Barnetteeb69d722012-06-18 17:29:44 -0700102 # USB_BOOT_TIMEOUT: Time to allow for boot from a USB device,
Richard Barnette0c73ffc2012-11-19 15:21:18 -0800103 # including the 30 second dev-mode delay and time to start the
J. Richard Barnetted4649c62013-03-06 17:42:27 -0800104 # network.
beepsf079cfb2013-09-18 17:49:51 -0700105 # INSTALL_TIMEOUT: Time to allow for chromeos-install.
J. Richard Barnette84890bd2014-02-21 11:05:47 -0800106 # POWERWASH_BOOT_TIMEOUT: Time to allow for a reboot that
107 # includes powerwash.
J. Richard Barnetteeb69d722012-06-18 17:29:44 -0700108
109 SLEEP_TIMEOUT = 2
J. Richard Barnetted4649c62013-03-06 17:42:27 -0800110 RESUME_TIMEOUT = 10
Tom Wai-Hong Tamfe005c22014-12-03 09:25:44 +0800111 SHUTDOWN_TIMEOUT = 10
J. Richard Barnettefbcc7122013-07-24 18:24:59 -0700112 BOOT_TIMEOUT = 60
J. Richard Barnette5bab5f52015-08-03 13:14:38 -0700113 USB_BOOT_TIMEOUT = 300
J. Richard Barnette7817b052014-08-28 09:47:29 -0700114 INSTALL_TIMEOUT = 480
Dan Shi2c88eed2013-11-12 10:18:38 -0800115 POWERWASH_BOOT_TIMEOUT = 60
Chris Sosab76e0ee2013-05-22 16:55:41 -0700116
Dan Shica503482015-03-30 17:23:25 -0700117 # Minimum OS version that supports server side packaging. Older builds may
118 # not have server side package built or with Autotest code change to support
119 # server-side packaging.
Dan Shib8540a52015-07-16 14:18:23 -0700120 MIN_VERSION_SUPPORT_SSP = CONFIG.get_config_value(
Dan Shiced09e42015-04-17 16:09:34 -0700121 'AUTOSERV', 'min_version_support_ssp', type=int)
Dan Shica503482015-03-30 17:23:25 -0700122
J. Richard Barnette84890bd2014-02-21 11:05:47 -0800123 # REBOOT_TIMEOUT: How long to wait for a reboot.
124 #
Chris Sosab76e0ee2013-05-22 16:55:41 -0700125 # We have a long timeout to ensure we don't flakily fail due to other
126 # issues. Shorter timeouts are vetted in platform_RebootAfterUpdate.
Simran Basi1160e2c2013-10-04 16:00:24 -0700127 # TODO(sbasi - crbug.com/276094) Restore to 5 mins once the 'host did not
128 # return from reboot' bug is solved.
129 REBOOT_TIMEOUT = 480
Chris Sosab76e0ee2013-05-22 16:55:41 -0700130
Ismail Noorbasha07fdb612013-02-14 14:13:31 -0800131 # _USB_POWER_TIMEOUT: Time to allow for USB to power toggle ON and OFF.
132 # _POWER_CYCLE_TIMEOUT: Time to allow for manual power cycle.
133 _USB_POWER_TIMEOUT = 5
134 _POWER_CYCLE_TIMEOUT = 10
135
beeps32a63082013-08-22 14:02:29 -0700136 _RPC_PROXY_URL = 'http://localhost:%d'
Christopher Wileydd181852013-10-10 19:56:58 -0700137 _RPC_SHUTDOWN_POLLING_PERIOD_SECONDS = 2
Peter Qiu4410db72014-06-05 10:32:41 -0700138 # Set shutdown timeout to account for the time for restarting the UI.
139 _RPC_SHUTDOWN_TIMEOUT_SECONDS = cros_ui.RESTART_UI_TIMEOUT
Richard Barnette0c73ffc2012-11-19 15:21:18 -0800140
Dan Shib8540a52015-07-16 14:18:23 -0700141 _RPM_RECOVERY_BOARDS = CONFIG.get_config_value('CROS',
Richard Barnette82c35912012-11-20 10:09:10 -0800142 'rpm_recovery_boards', type=str).split(',')
143
144 _MAX_POWER_CYCLE_ATTEMPTS = 6
145 _LAB_MACHINE_FILE = '/mnt/stateful_partition/.labmachine'
Fang Dengdeba14f2014-11-14 11:54:09 -0800146 _RPM_HOSTNAME_REGEX = ('chromeos(\d+)(-row(\d+))?-rack(\d+[a-z]*)'
147 '-host(\d+)')
Katherine Threlkeldab83d392015-06-18 16:45:57 -0700148 _LIGHTSENSOR_FILES = [ "in_illuminance0_input",
149 "in_illuminance_input",
150 "in_illuminance0_raw",
151 "in_illuminance_raw",
152 "illuminance0_input"]
Richard Barnette82c35912012-11-20 10:09:10 -0800153 _LIGHTSENSOR_SEARCH_DIR = '/sys/bus/iio/devices'
154 _LABEL_FUNCTIONS = []
Aviv Keshet74c89a92013-02-04 15:18:30 -0800155 _DETECTABLE_LABELS = []
156 label_decorator = functools.partial(add_label_detector, _LABEL_FUNCTIONS,
157 _DETECTABLE_LABELS)
J. Richard Barnette134ec2c2012-04-25 12:59:37 -0700158
J. Richard Barnetteb6de7e32013-02-14 13:28:04 -0800159 # Constants used in ping_wait_up() and ping_wait_down().
160 #
161 # _PING_WAIT_COUNT is the approximate number of polling
162 # cycles to use when waiting for a host state change.
163 #
164 # _PING_STATUS_DOWN and _PING_STATUS_UP are names used
165 # for arguments to the internal _ping_wait_for_status()
166 # method.
167 _PING_WAIT_COUNT = 40
168 _PING_STATUS_DOWN = False
169 _PING_STATUS_UP = True
170
Ismail Noorbasha07fdb612013-02-14 14:13:31 -0800171 # Allowed values for the power_method argument.
172
173 # POWER_CONTROL_RPM: Passed as default arg for power_off/on/cycle() methods.
174 # POWER_CONTROL_SERVO: Used in set_power() and power_cycle() methods.
175 # POWER_CONTROL_MANUAL: Used in set_power() and power_cycle() methods.
176 POWER_CONTROL_RPM = 'RPM'
177 POWER_CONTROL_SERVO = 'servoj10'
178 POWER_CONTROL_MANUAL = 'manual'
179
180 POWER_CONTROL_VALID_ARGS = (POWER_CONTROL_RPM,
181 POWER_CONTROL_SERVO,
182 POWER_CONTROL_MANUAL)
Richard Barnette0c73ffc2012-11-19 15:21:18 -0800183
Simran Basi5e6339a2013-03-21 11:34:32 -0700184 _RPM_OUTLET_CHANGED = 'outlet_changed'
185
Dan Shi9cb0eec2014-06-03 09:04:50 -0700186 # URL pattern to download firmware image.
Dan Shib8540a52015-07-16 14:18:23 -0700187 _FW_IMAGE_URL_PATTERN = CONFIG.get_config_value(
Dan Shi9cb0eec2014-06-03 09:04:50 -0700188 'CROS', 'firmware_url_pattern', type=str)
beeps687243d2013-07-18 15:29:27 -0700189
MK Ryu35d661e2014-09-25 17:44:10 -0700190 # File that has a list of directories to be collected
191 _LOGS_TO_COLLECT_FILE = os.path.join(
192 common.client_dir, 'common_lib', 'logs_to_collect')
193
194 # Prefix of logging message w.r.t. crash collection
195 _CRASHLOGS_PREFIX = 'collect_crashlogs'
196
197 # Time duration waiting for host up/down check
198 _CHECK_HOST_UP_TIMEOUT_SECS = 15
199
200 # A command that interacts with kernel and hardware (e.g., rm, mkdir, etc)
201 # might not be completely done deep through the hardware when the machine
202 # is powered down right after the command returns.
203 # We should wait for a few seconds to make them done. Finger crossed.
204 _SAFE_WAIT_SECS = 10
205
206
J. Richard Barnette964fba02012-10-24 17:34:29 -0700207 @staticmethod
beeps46dadc92013-11-07 14:07:10 -0800208 def check_host(host, timeout=10):
209 """
210 Check if the given host is a chrome-os host.
211
212 @param host: An ssh host representing a device.
213 @param timeout: The timeout for the run command.
214
215 @return: True if the host device is chromeos.
216
beeps46dadc92013-11-07 14:07:10 -0800217 """
218 try:
Simran Basi933c8af2015-04-29 14:05:07 -0700219 result = host.run(
220 'grep -q CHROMEOS /etc/lsb-release && '
221 '! test -f /mnt/stateful_partition/.android_tester && '
222 '! grep -q moblab /etc/lsb-release',
223 ignore_status=True, timeout=timeout)
beeps46dadc92013-11-07 14:07:10 -0800224 except (error.AutoservRunError, error.AutoservSSHTimeout):
225 return False
226 return result.exit_status == 0
227
228
229 @staticmethod
Tom Wai-Hong Tamefe1c7f2014-01-02 14:00:11 +0800230 def _extract_arguments(args_dict, key_subset):
231 """Extract options from `args_dict` and return a subset result.
J. Richard Barnette7214e0b2013-02-06 15:20:49 -0800232
233 Take the provided dictionary of argument options and return
Tom Wai-Hong Tamefe1c7f2014-01-02 14:00:11 +0800234 a subset that represent standard arguments needed to construct
235 a test-assistant object (chameleon or servo) for a host. The
236 intent is to provide standard argument processing from
Christopher Wiley644ef3e2015-05-15 13:14:14 -0700237 CrosHost for tests that require a test-assistant board
Tom Wai-Hong Tamefe1c7f2014-01-02 14:00:11 +0800238 to operate.
239
240 @param args_dict Dictionary from which to extract the arguments.
241 @param key_subset Tuple of keys to extract from the args_dict, e.g.
242 ('servo_host', 'servo_port').
243 """
244 result = {}
245 for arg in key_subset:
246 if arg in args_dict:
247 result[arg] = args_dict[arg]
248 return result
249
250
251 @staticmethod
252 def get_chameleon_arguments(args_dict):
253 """Extract chameleon options from `args_dict` and return the result.
254
255 Recommended usage:
256 ~~~~~~~~
257 args_dict = utils.args_to_dict(args)
258 chameleon_args = hosts.CrosHost.get_chameleon_arguments(args_dict)
259 host = hosts.create_host(machine, chameleon_args=chameleon_args)
260 ~~~~~~~~
261
262 @param args_dict Dictionary from which to extract the chameleon
263 arguments.
264 """
265 return CrosHost._extract_arguments(
266 args_dict, ('chameleon_host', 'chameleon_port'))
267
268
269 @staticmethod
270 def get_servo_arguments(args_dict):
271 """Extract servo options from `args_dict` and return the result.
J. Richard Barnette7214e0b2013-02-06 15:20:49 -0800272
273 Recommended usage:
274 ~~~~~~~~
275 args_dict = utils.args_to_dict(args)
Fang Deng0ca40e22013-08-27 17:47:44 -0700276 servo_args = hosts.CrosHost.get_servo_arguments(args_dict)
J. Richard Barnette7214e0b2013-02-06 15:20:49 -0800277 host = hosts.create_host(machine, servo_args=servo_args)
278 ~~~~~~~~
279
280 @param args_dict Dictionary from which to extract the servo
281 arguments.
282 """
Tom Wai-Hong Tamefe1c7f2014-01-02 14:00:11 +0800283 return CrosHost._extract_arguments(
284 args_dict, ('servo_host', 'servo_port'))
J. Richard Barnette134ec2c2012-04-25 12:59:37 -0700285
J. Richard Barnette964fba02012-10-24 17:34:29 -0700286
Tom Wai-Hong Tamefe1c7f2014-01-02 14:00:11 +0800287 def _initialize(self, hostname, chameleon_args=None, servo_args=None,
Fang Denge545abb2014-12-30 18:43:47 -0800288 try_lab_servo=False, ssh_verbosity_flag='', ssh_options='',
Fang Dengd1c2b732013-08-20 12:59:46 -0700289 *args, **dargs):
Tom Wai-Hong Tamefe1c7f2014-01-02 14:00:11 +0800290 """Initialize superclasses, |self.chameleon|, and |self.servo|.
J. Richard Barnette67ccb872012-04-19 16:34:56 -0700291
Fang Denge545abb2014-12-30 18:43:47 -0800292 This method will attempt to create the test-assistant object
293 (chameleon/servo) when it is needed by the test. Check
294 the docstring of chameleon_host.create_chameleon_host and
295 servo_host.create_servo_host for how this is determined.
Fang Deng5d518f42013-08-02 14:04:32 -0700296
Fang Denge545abb2014-12-30 18:43:47 -0800297 @param hostname: Hostname of the dut.
298 @param chameleon_args: A dictionary that contains args for creating
299 a ChameleonHost. See chameleon_host for details.
300 @param servo_args: A dictionary that contains args for creating
301 a ServoHost object. See servo_host for details.
302 @param try_lab_servo: Boolean, False indicates that ServoHost should
303 not be created for a device in Cros test lab.
304 See servo_host for details.
305 @param ssh_verbosity_flag: String, to pass to the ssh command to control
306 verbosity.
307 @param ssh_options: String, other ssh options to pass to the ssh
308 command.
J. Richard Barnette67ccb872012-04-19 16:34:56 -0700309 """
Fang Deng0ca40e22013-08-27 17:47:44 -0700310 super(CrosHost, self)._initialize(hostname=hostname,
J. Richard Barnette45e93de2012-04-11 17:24:15 -0700311 *args, **dargs)
J. Richard Barnettef0859852012-08-20 14:55:50 -0700312 # self.env is a dictionary of environment variable settings
313 # to be exported for commands run on the host.
314 # LIBC_FATAL_STDERR_ can be useful for diagnosing certain
315 # errors that might happen.
316 self.env['LIBC_FATAL_STDERR_'] = '1'
beeps32a63082013-08-22 14:02:29 -0700317 self._rpc_proxy_map = {}
Fang Dengd1c2b732013-08-20 12:59:46 -0700318 self._ssh_verbosity_flag = ssh_verbosity_flag
Aviv Keshetc5947fa2013-09-04 14:06:29 -0700319 self._ssh_options = ssh_options
Fang Deng5d518f42013-08-02 14:04:32 -0700320 # TODO(fdeng): We need to simplify the
321 # process of servo and servo_host initialization.
322 # crbug.com/298432
Fang Denge545abb2014-12-30 18:43:47 -0800323 self._servo_host = servo_host.create_servo_host(
324 dut=self.hostname, servo_args=servo_args,
325 try_lab_servo=try_lab_servo)
Tom Wai-Hong Tamefe1c7f2014-01-02 14:00:11 +0800326 # TODO(waihong): Do the simplication on Chameleon too.
Tom Wai-Hong Tam3d6790d2014-04-14 16:15:47 +0800327 self._chameleon_host = chameleon_host.create_chameleon_host(
328 dut=self.hostname, chameleon_args=chameleon_args)
329
Dan Shi4d478522014-02-14 13:46:32 -0800330 if self._servo_host is not None:
331 self.servo = self._servo_host.get_servo()
332 else:
333 self.servo = None
334
Tom Wai-Hong Tam3d6790d2014-04-14 16:15:47 +0800335 if self._chameleon_host:
Tom Wai-Hong Tameaee3402014-01-22 08:52:10 +0800336 self.chameleon = self._chameleon_host.create_chameleon_board()
Tom Wai-Hong Tamefe1c7f2014-01-02 14:00:11 +0800337 else:
Tom Wai-Hong Tam3d6790d2014-04-14 16:15:47 +0800338 self.chameleon = None
Fang Deng5d518f42013-08-02 14:04:32 -0700339
340
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500341 def get_repair_image_name(self):
342 """Generate a image_name from variables in the global config.
343
344 @returns a str of $board-version/$BUILD.
345
346 """
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500347 board = self._get_board_from_afe()
348 if board is None:
349 raise error.AutoservError('DUT has no board attribute, '
350 'cannot be repaired.')
Dan Shi6964fa52014-12-18 11:04:27 -0800351 stable_version = self._AFE.run('get_stable_version', board=board)
Dan Shib8540a52015-07-16 14:18:23 -0700352 build_pattern = CONFIG.get_config_value(
Dan Shi6964fa52014-12-18 11:04:27 -0800353 'CROS', 'stable_build_pattern')
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500354 return build_pattern % (board, stable_version)
355
356
Scott Zawalski62bacae2013-03-05 10:40:32 -0500357 def _host_in_AFE(self):
358 """Check if the host is an object the AFE knows.
359
360 @returns the host object.
361 """
362 return self._AFE.get_hosts(hostname=self.hostname)
363
364
Chris Sosab76e0ee2013-05-22 16:55:41 -0700365 def lookup_job_repo_url(self):
366 """Looks up the job_repo_url for the host.
367
368 @returns job_repo_url from AFE or None if not found.
369
370 @raises KeyError if the host does not have a job_repo_url
371 """
Chris Sosab76e0ee2013-05-22 16:55:41 -0700372 hosts = self._AFE.get_hosts(hostname=self.hostname)
beepsb5efc532013-06-04 11:29:34 -0700373 if hosts and ds_constants.JOB_REPO_URL in hosts[0].attributes:
374 return hosts[0].attributes[ds_constants.JOB_REPO_URL]
J. Richard Barnette85d0aac2015-08-20 10:34:39 -0700375 else:
376 return None
Chris Sosab76e0ee2013-05-22 16:55:41 -0700377
378
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500379 def clear_cros_version_labels_and_job_repo_url(self):
380 """Clear cros_version labels and host attribute job_repo_url."""
Scott Zawalski62bacae2013-03-05 10:40:32 -0500381 if not self._host_in_AFE():
Scott Zawalskieadbf702013-03-14 09:23:06 -0400382 return
383
Scott Zawalski62bacae2013-03-05 10:40:32 -0500384 host_list = [self.hostname]
385 labels = self._AFE.get_labels(
386 name__startswith=ds_constants.VERSION_PREFIX,
387 host__hostname=self.hostname)
Dan Shi0f466e82013-02-22 15:44:58 -0800388
Scott Zawalski62bacae2013-03-05 10:40:32 -0500389 for label in labels:
390 label.remove_hosts(hosts=host_list)
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500391
beepscb6f1e22013-06-28 19:14:10 -0700392 self.update_job_repo_url(None, None)
393
394
395 def update_job_repo_url(self, devserver_url, image_name):
396 """
397 Updates the job_repo_url host attribute and asserts it's value.
398
399 @param devserver_url: The devserver to use in the job_repo_url.
400 @param image_name: The name of the image to use in the job_repo_url.
401
402 @raises AutoservError: If we failed to update the job_repo_url.
403 """
404 repo_url = None
405 if devserver_url and image_name:
406 repo_url = tools.get_package_url(devserver_url, image_name)
407 self._AFE.set_host_attribute(ds_constants.JOB_REPO_URL, repo_url,
Scott Zawalski62bacae2013-03-05 10:40:32 -0500408 hostname=self.hostname)
beepscb6f1e22013-06-28 19:14:10 -0700409 if self.lookup_job_repo_url() != repo_url:
410 raise error.AutoservError('Failed to update job_repo_url with %s, '
411 'host %s' % (repo_url, self.hostname))
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500412
413
Dan Shie9309262013-06-19 22:50:21 -0700414 def add_cros_version_labels_and_job_repo_url(self, image_name):
Scott Zawalskieadbf702013-03-14 09:23:06 -0400415 """Add cros_version labels and host attribute job_repo_url.
416
417 @param image_name: The name of the image e.g.
418 lumpy-release/R27-3837.0.0
Dan Shi7458bf62013-06-10 12:50:16 -0700419
Scott Zawalskieadbf702013-03-14 09:23:06 -0400420 """
Scott Zawalski62bacae2013-03-05 10:40:32 -0500421 if not self._host_in_AFE():
Scott Zawalskieadbf702013-03-14 09:23:06 -0400422 return
Scott Zawalski62bacae2013-03-05 10:40:32 -0500423
Scott Zawalskieadbf702013-03-14 09:23:06 -0400424 cros_label = '%s%s' % (ds_constants.VERSION_PREFIX, image_name)
Dan Shie9309262013-06-19 22:50:21 -0700425 devserver_url = dev_server.ImageServer.resolve(image_name).url()
Scott Zawalski62bacae2013-03-05 10:40:32 -0500426
MK Ryufb5e3a82015-07-01 12:21:20 -0700427 self._AFE.run('label_add_hosts', id=cros_label, hosts=[self.hostname])
beepscb6f1e22013-06-28 19:14:10 -0700428 self.update_job_repo_url(devserver_url, image_name)
429
430
beepsdae65fd2013-07-26 16:24:41 -0700431 def verify_job_repo_url(self, tag=''):
beepscb6f1e22013-06-28 19:14:10 -0700432 """
433 Make sure job_repo_url of this host is valid.
434
joychen03eaad92013-06-26 09:55:21 -0700435 Eg: The job_repo_url "http://lmn.cd.ab.xyx:8080/static/\
beepscb6f1e22013-06-28 19:14:10 -0700436 lumpy-release/R29-4279.0.0/autotest/packages" claims to have the
437 autotest package for lumpy-release/R29-4279.0.0. If this isn't the case,
438 download and extract it. If the devserver embedded in the url is
439 unresponsive, update the job_repo_url of the host after staging it on
440 another devserver.
441
442 @param job_repo_url: A url pointing to the devserver where the autotest
443 package for this build should be staged.
beepsdae65fd2013-07-26 16:24:41 -0700444 @param tag: The tag from the server job, in the format
445 <job_id>-<user>/<hostname>, or <hostless> for a server job.
beepscb6f1e22013-06-28 19:14:10 -0700446
447 @raises DevServerException: If we could not resolve a devserver.
448 @raises AutoservError: If we're unable to save the new job_repo_url as
449 a result of choosing a new devserver because the old one failed to
450 respond to a health check.
beeps0c865032013-07-30 11:37:06 -0700451 @raises urllib2.URLError: If the devserver embedded in job_repo_url
452 doesn't respond within the timeout.
beepscb6f1e22013-06-28 19:14:10 -0700453 """
454 job_repo_url = self.lookup_job_repo_url()
455 if not job_repo_url:
456 logging.warning('No job repo url set on host %s', self.hostname)
457 return
458
459 logging.info('Verifying job repo url %s', job_repo_url)
460 devserver_url, image_name = tools.get_devserver_build_from_package_url(
461 job_repo_url)
462
beeps0c865032013-07-30 11:37:06 -0700463 ds = dev_server.ImageServer(devserver_url)
beepscb6f1e22013-06-28 19:14:10 -0700464
465 logging.info('Staging autotest artifacts for %s on devserver %s',
466 image_name, ds.url())
beeps687243d2013-07-18 15:29:27 -0700467
468 start_time = time.time()
Simran Basi25e7a922014-10-31 11:56:10 -0700469 ds.stage_artifacts(image_name, ['autotest_packages'])
beeps687243d2013-07-18 15:29:27 -0700470 stage_time = time.time() - start_time
471
472 # Record how much of the verification time comes from a devserver
473 # restage. If we're doing things right we should not see multiple
474 # devservers for a given board/build/branch path.
475 try:
J. Richard Barnette3cbd76b2013-11-27 12:11:25 -0800476 board, build_type, branch = server_utils.ParseBuildName(
beeps687243d2013-07-18 15:29:27 -0700477 image_name)[:3]
J. Richard Barnette3cbd76b2013-11-27 12:11:25 -0800478 except server_utils.ParseBuildNameException:
beeps687243d2013-07-18 15:29:27 -0700479 pass
480 else:
beeps0c865032013-07-30 11:37:06 -0700481 devserver = devserver_url[
Chris Sosa65425082013-10-16 13:26:22 -0700482 devserver_url.find('/') + 2:devserver_url.rfind(':')]
beeps687243d2013-07-18 15:29:27 -0700483 stats_key = {
484 'board': board,
485 'build_type': build_type,
486 'branch': branch,
beeps0c865032013-07-30 11:37:06 -0700487 'devserver': devserver.replace('.', '_'),
beeps687243d2013-07-18 15:29:27 -0700488 }
Gabe Black1e1c41b2015-02-04 23:55:15 -0800489 autotest_stats.Gauge('verify_job_repo_url').send(
beeps687243d2013-07-18 15:29:27 -0700490 '%(board)s.%(build_type)s.%(branch)s.%(devserver)s' % stats_key,
491 stage_time)
beepscb6f1e22013-06-28 19:14:10 -0700492
Scott Zawalskieadbf702013-03-14 09:23:06 -0400493
Dan Shicf4d2032015-03-12 15:04:21 -0700494 def stage_server_side_package(self, image=None):
495 """Stage autotest server-side package on devserver.
496
497 @param image: Full path of an OS image to install or a build name.
498
499 @return: A url to the autotest server-side package.
500 """
501 if image:
502 image_name = tools.get_build_from_image(image)
503 if not image_name:
504 raise error.AutoservError(
505 'Failed to parse build name from %s' % image)
506 ds = dev_server.ImageServer.resolve(image_name)
507 else:
508 job_repo_url = self.lookup_job_repo_url()
509 if job_repo_url:
510 devserver_url, image_name = (
511 tools.get_devserver_build_from_package_url(job_repo_url))
512 ds = dev_server.ImageServer(devserver_url)
513 else:
514 labels = self._AFE.get_labels(
515 name__startswith=ds_constants.VERSION_PREFIX,
516 host__hostname=self.hostname)
517 if not labels:
518 raise error.AutoservError(
519 'Failed to stage server-side package. The host has '
520 'no job_report_url attribute or version label.')
521 image_name = labels[0].name[len(ds_constants.VERSION_PREFIX):]
522 ds = dev_server.ImageServer.resolve(image_name)
Dan Shica503482015-03-30 17:23:25 -0700523
524 # Get the OS version of the build, for any build older than
525 # MIN_VERSION_SUPPORT_SSP, server side packaging is not supported.
526 match = re.match('.*/R\d+-(\d+)\.', image_name)
527 if match and int(match.group(1)) < self.MIN_VERSION_SUPPORT_SSP:
528 logging.warn('Build %s is older than %s. Server side packaging is '
529 'disabled.', image_name, self.MIN_VERSION_SUPPORT_SSP)
530 return None
531
Dan Shicf4d2032015-03-12 15:04:21 -0700532 ds.stage_artifacts(image_name, ['autotest_server_package'])
533 return '%s/static/%s/%s' % (ds.url(), image_name,
534 'autotest_server_package.tar.bz2')
535
536
Dan Shi0f466e82013-02-22 15:44:58 -0800537 def _try_stateful_update(self, update_url, force_update, updater):
538 """Try to use stateful update to initialize DUT.
539
540 When DUT is already running the same version that machine_install
541 tries to install, stateful update is a much faster way to clean up
542 the DUT for testing, compared to a full reimage. It is implemeted
543 by calling autoupdater.run_update, but skipping updating root, as
544 updating the kernel is time consuming and not necessary.
545
546 @param update_url: url of the image.
547 @param force_update: Set to True to update the image even if the DUT
548 is running the same version.
549 @param updater: ChromiumOSUpdater instance used to update the DUT.
550 @returns: True if the DUT was updated with stateful update.
551
552 """
J. Richard Barnette3f731032014-04-07 17:42:59 -0700553 # TODO(jrbarnette): Yes, I hate this re.match() test case.
554 # It's better than the alternative: see crbug.com/360944.
555 image_name = autoupdater.url_to_image_name(update_url)
556 release_pattern = r'^.*-release/R[0-9]+-[0-9]+\.[0-9]+\.0$'
557 if not re.match(release_pattern, image_name):
558 return False
Dan Shi0f466e82013-02-22 15:44:58 -0800559 if not updater.check_version():
560 return False
561 if not force_update:
562 logging.info('Canceling stateful update because the new and '
563 'old versions are the same.')
564 return False
565 # Following folders should be rebuilt after stateful update.
566 # A test file is used to confirm each folder gets rebuilt after
567 # the stateful update.
568 folders_to_check = ['/var', '/home', '/mnt/stateful_partition']
569 test_file = '.test_file_to_be_deleted'
570 for folder in folders_to_check:
571 touch_path = os.path.join(folder, test_file)
572 self.run('touch %s' % touch_path)
573
Chris Sosae92399e2015-04-24 11:32:59 -0700574 updater.run_update(update_root=False)
Dan Shi0f466e82013-02-22 15:44:58 -0800575
576 # Reboot to complete stateful update.
Chris Sosab76e0ee2013-05-22 16:55:41 -0700577 self.reboot(timeout=self.REBOOT_TIMEOUT, wait=True)
Dan Shi0f466e82013-02-22 15:44:58 -0800578 check_file_cmd = 'test -f %s; echo $?'
579 for folder in folders_to_check:
580 test_file_path = os.path.join(folder, test_file)
581 result = self.run(check_file_cmd % test_file_path,
582 ignore_status=True)
583 if result.exit_status == 1:
584 return False
585 return True
586
587
J. Richard Barnette7275b612013-06-04 18:13:11 -0700588 def _post_update_processing(self, updater, expected_kernel=None):
Dan Shi0f466e82013-02-22 15:44:58 -0800589 """After the DUT is updated, confirm machine_install succeeded.
590
591 @param updater: ChromiumOSUpdater instance used to update the DUT.
J. Richard Barnette7275b612013-06-04 18:13:11 -0700592 @param expected_kernel: kernel expected to be active after reboot,
593 or `None` to skip rollback checking.
Dan Shi0f466e82013-02-22 15:44:58 -0800594
595 """
J. Richard Barnette7275b612013-06-04 18:13:11 -0700596 # Touch the lab machine file to leave a marker that
597 # distinguishes this image from other test images.
598 # Afterwards, we must re-run the autoreboot script because
599 # it depends on the _LAB_MACHINE_FILE.
Dan Shi0f466e82013-02-22 15:44:58 -0800600 self.run('touch %s' % self._LAB_MACHINE_FILE)
Dan Shi0f466e82013-02-22 15:44:58 -0800601 self.run('start autoreboot')
Chris Sosa65425082013-10-16 13:26:22 -0700602 updater.verify_boot_expectations(
603 expected_kernel, rollback_message=
604 'Build %s failed to boot on %s; system rolled back to previous'
605 'build' % (updater.update_version, self.hostname))
J. Richard Barnette7275b612013-06-04 18:13:11 -0700606 # Check that we've got the build we meant to install.
607 if not updater.check_version_to_confirm_install():
608 raise autoupdater.ChromiumOSError(
609 'Failed to update %s to build %s; found build '
610 '%s instead' % (self.hostname,
Chris Sosa65425082013-10-16 13:26:22 -0700611 updater.update_version,
Dan Shi0942b1d2015-03-31 11:07:00 -0700612 self.get_release_version()))
Dan Shi0f466e82013-02-22 15:44:58 -0800613
Chris Sosae92399e2015-04-24 11:32:59 -0700614 logging.debug('Cleaning up old autotest directories.')
615 try:
616 installed_autodir = autotest.Autotest.get_installed_autodir(self)
617 self.run('rm -rf ' + installed_autodir)
618 except autotest.AutodirNotFoundError:
619 logging.debug('No autotest installed directory found.')
620
Dan Shi0f466e82013-02-22 15:44:58 -0800621
J. Richard Barnettee4af8b92013-05-01 13:16:12 -0700622 def _stage_image_for_update(self, image_name=None):
Chris Sosae92399e2015-04-24 11:32:59 -0700623 """Stage a build on a devserver and return the update_url and devserver.
Scott Zawalskieadbf702013-03-14 09:23:06 -0400624
625 @param image_name: a name like lumpy-release/R27-3837.0.0
Chris Sosae92399e2015-04-24 11:32:59 -0700626 @returns a tuple with an update URL like:
Scott Zawalskieadbf702013-03-14 09:23:06 -0400627 http://172.22.50.205:8082/update/lumpy-release/R27-3837.0.0
Chris Sosae92399e2015-04-24 11:32:59 -0700628 and the devserver instance.
Scott Zawalskieadbf702013-03-14 09:23:06 -0400629 """
J. Richard Barnettee4af8b92013-05-01 13:16:12 -0700630 if not image_name:
631 image_name = self.get_repair_image_name()
Chris Sosae92399e2015-04-24 11:32:59 -0700632
J. Richard Barnettee4af8b92013-05-01 13:16:12 -0700633 logging.info('Staging build for AU: %s', image_name)
Scott Zawalskieadbf702013-03-14 09:23:06 -0400634 devserver = dev_server.ImageServer.resolve(image_name)
635 devserver.trigger_download(image_name, synchronous=False)
Chris Sosae92399e2015-04-24 11:32:59 -0700636 return (tools.image_url_pattern() % (devserver.url(), image_name),
637 devserver)
Scott Zawalskieadbf702013-03-14 09:23:06 -0400638
639
J. Richard Barnettee4af8b92013-05-01 13:16:12 -0700640 def stage_image_for_servo(self, image_name=None):
641 """Stage a build on a devserver and return the update_url.
642
643 @param image_name: a name like lumpy-release/R27-3837.0.0
644 @returns an update URL like:
645 http://172.22.50.205:8082/update/lumpy-release/R27-3837.0.0
646 """
647 if not image_name:
648 image_name = self.get_repair_image_name()
649 logging.info('Staging build for servo install: %s', image_name)
650 devserver = dev_server.ImageServer.resolve(image_name)
651 devserver.stage_artifacts(image_name, ['test_image'])
652 return devserver.get_test_image_url(image_name)
653
654
beepse539be02013-07-31 21:57:39 -0700655 def stage_factory_image_for_servo(self, image_name):
656 """Stage a build on a devserver and return the update_url.
657
658 @param image_name: a name like <baord>/4262.204.0
beeps12c0a3c2013-09-03 11:58:27 -0700659
beepse539be02013-07-31 21:57:39 -0700660 @return: An update URL, eg:
661 http://<devserver>/static/canary-channel/\
662 <board>/4262.204.0/factory_test/chromiumos_factory_image.bin
beeps12c0a3c2013-09-03 11:58:27 -0700663
664 @raises: ValueError if the factory artifact name is missing from
665 the config.
666
beepse539be02013-07-31 21:57:39 -0700667 """
668 if not image_name:
669 logging.error('Need an image_name to stage a factory image.')
670 return
671
Dan Shib8540a52015-07-16 14:18:23 -0700672 factory_artifact = CONFIG.get_config_value(
beeps12c0a3c2013-09-03 11:58:27 -0700673 'CROS', 'factory_artifact', type=str, default='')
674 if not factory_artifact:
675 raise ValueError('Cannot retrieve the factory artifact name from '
676 'autotest config, and hence cannot stage factory '
677 'artifacts.')
678
beepse539be02013-07-31 21:57:39 -0700679 logging.info('Staging build for servo install: %s', image_name)
680 devserver = dev_server.ImageServer.resolve(image_name)
681 devserver.stage_artifacts(
682 image_name,
beeps12c0a3c2013-09-03 11:58:27 -0700683 [factory_artifact],
684 archive_url=None)
beepse539be02013-07-31 21:57:39 -0700685
686 return tools.factory_image_url_pattern() % (devserver.url(), image_name)
687
688
Chris Sosaa3ac2152012-05-23 22:23:13 -0700689 def machine_install(self, update_url=None, force_update=False,
Richard Barnette0b023a72015-04-24 16:07:30 +0000690 local_devserver=False, repair=False,
691 force_full_update=False):
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500692 """Install the DUT.
693
Dan Shi0f466e82013-02-22 15:44:58 -0800694 Use stateful update if the DUT is already running the same build.
695 Stateful update does not update kernel and tends to run much faster
696 than a full reimage. If the DUT is running a different build, or it
697 failed to do a stateful update, full update, including kernel update,
698 will be applied to the DUT.
699
Scott Zawalskieadbf702013-03-14 09:23:06 -0400700 Once a host enters machine_install its cros_version label will be
701 removed as well as its host attribute job_repo_url (used for
702 package install).
703
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500704 @param update_url: The url to use for the update
705 pattern: http://$devserver:###/update/$build
706 If update_url is None and repair is True we will install the
Dan Shi6964fa52014-12-18 11:04:27 -0800707 stable image listed in afe_stable_versions table. If the table
708 is not setup, global_config value under CROS.stable_cros_version
709 will be used instead.
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500710 @param force_update: Force an update even if the version installed
711 is the same. Default:False
Christopher Wiley6a4ff932015-05-15 14:00:47 -0700712 @param local_devserver: Used by test_that to allow people to
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500713 use their local devserver. Default: False
Chris Sosae92399e2015-04-24 11:32:59 -0700714 @param repair: Forces update to repair image. Implies force_update.
Fang Deng3d3b9272014-12-22 12:20:28 -0800715 @param force_full_update: If True, do not attempt to run stateful
716 update, force a full reimage. If False, try stateful update
717 first when the dut is already installed with the same version.
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500718 @raises autoupdater.ChromiumOSError
719
720 """
Chris Sosae92399e2015-04-24 11:32:59 -0700721 devserver = None
Richard Barnette0b023a72015-04-24 16:07:30 +0000722 if repair:
Chris Sosae92399e2015-04-24 11:32:59 -0700723 update_url, devserver = self._stage_image_for_update()
Richard Barnette0b023a72015-04-24 16:07:30 +0000724 force_update = True
Dan Shi0f466e82013-02-22 15:44:58 -0800725
Chris Sosae92399e2015-04-24 11:32:59 -0700726 if not update_url and not self._parser.options.image:
727 raise error.AutoservError(
728 'There is no update URL, nor a method to get one.')
729
730 if not update_url and self._parser.options.image:
731 # This is the base case where we have no given update URL i.e.
732 # dynamic suites logic etc. This is the most flexible case where we
733 # can serve an update from any of our fleet of devservers.
734 requested_build = self._parser.options.image
735 if not requested_build.startswith('http://'):
736 logging.debug('Update will be staged for this installation')
737 update_url, devserver = self._stage_image_for_update(
738 requested_build)
739 else:
740 update_url = requested_build
741
742 logging.debug('Update URL is %s', update_url)
743
Scott Zawalskieadbf702013-03-14 09:23:06 -0400744 # Remove cros-version and job_repo_url host attribute from host.
745 self.clear_cros_version_labels_and_job_repo_url()
Chris Sosae92399e2015-04-24 11:32:59 -0700746
747 update_complete = False
748 updater = autoupdater.ChromiumOSUpdater(
749 update_url, host=self, local_devserver=local_devserver)
Fang Deng3d3b9272014-12-22 12:20:28 -0800750 if not force_full_update:
751 try:
Chris Sosae92399e2015-04-24 11:32:59 -0700752 # If the DUT is already running the same build, try stateful
753 # update first as it's much quicker than a full re-image.
754 update_complete = self._try_stateful_update(
755 update_url, force_update, updater)
Fang Deng3d3b9272014-12-22 12:20:28 -0800756 except Exception as e:
757 logging.exception(e)
J. Richard Barnette45e93de2012-04-11 17:24:15 -0700758
Dan Shi0f466e82013-02-22 15:44:58 -0800759 inactive_kernel = None
Chris Sosae92399e2015-04-24 11:32:59 -0700760 if update_complete or (not force_update and updater.check_version()):
761 logging.info('Install complete without full update')
762 else:
763 logging.info('DUT requires full update.')
764 self.reboot(timeout=self.REBOOT_TIMEOUT, wait=True)
765 num_of_attempts = provision.FLAKY_DEVSERVER_ATTEMPTS
Chris Sosab7612bc2013-03-21 10:32:37 -0700766
Chris Sosae92399e2015-04-24 11:32:59 -0700767 while num_of_attempts > 0:
768 num_of_attempts -= 1
769 try:
770 updater.run_update()
771 except Exception:
772 logging.warn('Autoupdate did not complete.')
773 # Do additional check for the devserver health. Ideally,
774 # the autoupdater.py could raise an exception when it
775 # detected network flake but that would require
776 # instrumenting the update engine and parsing it log.
777 if (num_of_attempts <= 0 or
778 devserver is None or
779 dev_server.DevServer.devserver_healthy(
780 devserver.url())):
781 raise
J. Richard Barnette45e93de2012-04-11 17:24:15 -0700782
Chris Sosae92399e2015-04-24 11:32:59 -0700783 logging.warn('Devserver looks unhealthy. Trying another')
784 update_url, devserver = self._stage_image_for_update(
785 requested_build)
786 logging.debug('New Update URL is %s', update_url)
787 updater = autoupdater.ChromiumOSUpdater(
788 update_url, host=self,
789 local_devserver=local_devserver)
790 else:
791 break
J. Richard Barnette45e93de2012-04-11 17:24:15 -0700792
Chris Sosae92399e2015-04-24 11:32:59 -0700793 # Give it some time in case of IO issues.
794 time.sleep(10)
Dan Shi5699ac22014-12-19 10:55:49 -0800795
Chris Sosae92399e2015-04-24 11:32:59 -0700796 # Figure out active and inactive kernel.
797 active_kernel, inactive_kernel = updater.get_kernel_state()
Simran Basi13fa1ba2013-03-04 10:56:47 -0800798
Chris Sosae92399e2015-04-24 11:32:59 -0700799 # Ensure inactive kernel has higher priority than active.
800 if (updater.get_kernel_priority(inactive_kernel)
801 < updater.get_kernel_priority(active_kernel)):
802 raise autoupdater.ChromiumOSError(
803 'Update failed. The priority of the inactive kernel'
804 ' partition is less than that of the active kernel'
805 ' partition.')
806
807 # Updater has returned successfully; reboot the host.
808 self.reboot(timeout=self.REBOOT_TIMEOUT, wait=True)
809
810 self._post_update_processing(updater, inactive_kernel)
811 self.add_cros_version_labels_and_job_repo_url(
812 autoupdater.url_to_image_name(update_url))
J. Richard Barnette45e93de2012-04-11 17:24:15 -0700813
814
Dan Shi9cb0eec2014-06-03 09:04:50 -0700815 def _clear_fw_version_labels(self):
816 """Clear firmware version labels from the machine."""
817 labels = self._AFE.get_labels(
Dan Shi0723bf52015-06-24 10:52:38 -0700818 name__startswith=provision.FW_RW_VERSION_PREFIX,
Dan Shi9cb0eec2014-06-03 09:04:50 -0700819 host__hostname=self.hostname)
820 for label in labels:
821 label.remove_hosts(hosts=[self.hostname])
822
823
824 def _add_fw_version_label(self, build):
825 """Add firmware version label to the machine.
826
827 @param build: Build of firmware.
828
829 """
830 fw_label = provision.fw_version_to_label(build)
MK Ryu73be9862015-07-06 12:25:00 -0700831 self._AFE.run('label_add_hosts', id=fw_label, hosts=[self.hostname])
Dan Shi9cb0eec2014-06-03 09:04:50 -0700832
833
834 def firmware_install(self, build=None):
835 """Install firmware to the DUT.
836
837 Use stateful update if the DUT is already running the same build.
838 Stateful update does not update kernel and tends to run much faster
839 than a full reimage. If the DUT is running a different build, or it
840 failed to do a stateful update, full update, including kernel update,
841 will be applied to the DUT.
842
843 Once a host enters firmware_install its fw_version label will be
844 removed. After the firmware is updated successfully, a new fw_version
845 label will be added to the host.
846
847 @param build: The build version to which we want to provision the
848 firmware of the machine,
849 e.g. 'link-firmware/R22-2695.1.144'.
850
851 TODO(dshi): After bug 381718 is fixed, update here with corresponding
852 exceptions that could be raised.
853
854 """
855 if not self.servo:
856 raise error.TestError('Host %s does not have servo.' %
857 self.hostname)
858
859 # TODO(fdeng): use host.get_board() after
860 # crbug.com/271834 is fixed.
861 board = self._get_board_from_afe()
862
Chris Sosae92399e2015-04-24 11:32:59 -0700863 # If build is not set, try to install firmware from stable CrOS.
Dan Shi9cb0eec2014-06-03 09:04:50 -0700864 if not build:
865 build = self.get_repair_image_name()
866
867 config = FAFTConfig(board)
868 if config.use_u_boot:
869 ap_image = 'image-%s.bin' % board
870 else: # Depthcharge platform
871 ap_image = 'image.bin'
872 ec_image = 'ec.bin'
873 ds = dev_server.ImageServer.resolve(build)
874 ds.stage_artifacts(build, ['firmware'])
875
876 tmpd = autotemp.tempdir(unique_id='fwimage')
877 try:
878 fwurl = self._FW_IMAGE_URL_PATTERN % (ds.url(), build)
879 local_tarball = os.path.join(tmpd.name, os.path.basename(fwurl))
880 server_utils.system('wget -O %s %s' % (local_tarball, fwurl),
881 timeout=60)
882 server_utils.system('tar xf %s -C %s %s %s' %
883 (local_tarball, tmpd.name, ap_image, ec_image),
884 timeout=60)
885 server_utils.system('tar xf %s --wildcards -C %s "dts/*"' %
886 (local_tarball, tmpd.name),
887 timeout=60, ignore_status=True)
888
889 self._clear_fw_version_labels()
890 logging.info('Will re-program EC now')
891 self.servo.program_ec(os.path.join(tmpd.name, ec_image))
892 logging.info('Will re-program BIOS now')
893 self.servo.program_bios(os.path.join(tmpd.name, ap_image))
894 self.servo.get_power_state_controller().reset()
895 time.sleep(self.servo.BOOT_DELAY)
Dan Shia5fef052015-05-18 23:28:47 -0700896 self._add_fw_version_label(build)
Dan Shi9cb0eec2014-06-03 09:04:50 -0700897 finally:
898 tmpd.clean()
899
900
Dan Shi10e992b2013-08-30 11:02:59 -0700901 def show_update_engine_log(self):
902 """Output update engine log."""
MK Ryu35d661e2014-09-25 17:44:10 -0700903 logging.debug('Dumping %s', client_constants.UPDATE_ENGINE_LOG)
904 self.run('cat %s' % client_constants.UPDATE_ENGINE_LOG)
Dan Shi10e992b2013-08-30 11:02:59 -0700905
906
Richard Barnette82c35912012-11-20 10:09:10 -0800907 def _get_board_from_afe(self):
908 """Retrieve this host's board from its labels in the AFE.
909
910 Looks for a host label of the form "board:<board>", and
911 returns the "<board>" part of the label. `None` is returned
912 if there is not a single, unique label matching the pattern.
913
914 @returns board from label, or `None`.
915 """
Dan Shia1ecd5c2013-06-06 11:21:31 -0700916 return server_utils.get_board_from_afe(self.hostname, self._AFE)
Simran Basi833814b2013-01-29 13:13:43 -0800917
918
919 def get_build(self):
920 """Retrieve the current build for this Host from the AFE.
921
922 Looks through this host's labels in the AFE to determine its build.
923
924 @returns The current build or None if it could not find it or if there
925 were multiple build labels assigned to this host.
926 """
Dan Shia1ecd5c2013-06-06 11:21:31 -0700927 return server_utils.get_build_from_afe(self.hostname, self._AFE)
Richard Barnette82c35912012-11-20 10:09:10 -0800928
929
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500930 def _install_repair(self):
Chris Sosae92399e2015-04-24 11:32:59 -0700931 """Attempt to repair this host using the update-engine.
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500932
933 If the host is up, try installing the DUT with a stable
Dan Shi6964fa52014-12-18 11:04:27 -0800934 "repair" version of Chrome OS as defined in afe_stable_versions table.
935 If the table is not setup, global_config value under
936 CROS.stable_cros_version will be used instead.
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500937
Scott Zawalski62bacae2013-03-05 10:40:32 -0500938 @raises AutoservRepairMethodNA if the DUT is not reachable.
939 @raises ChromiumOSError if the install failed for some reason.
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500940
941 """
942 if not self.is_up():
Scott Zawalski62bacae2013-03-05 10:40:32 -0500943 raise error.AutoservRepairMethodNA('DUT unreachable for install.')
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500944 logging.info('Attempting to reimage machine to repair image.')
945 try:
Richard Barnette0b023a72015-04-24 16:07:30 +0000946 self.machine_install(repair=True)
Fang Dengd0672f32013-03-18 17:18:09 -0700947 except autoupdater.ChromiumOSError as e:
948 logging.exception(e)
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500949 logging.info('Repair via install failed.')
Scott Zawalski62bacae2013-03-05 10:40:32 -0500950 raise
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500951
952
Dan Shi2c88eed2013-11-12 10:18:38 -0800953 def _install_repair_with_powerwash(self):
Dan Shi9cc48452013-11-12 12:39:26 -0800954 """Attempt to powerwash first then repair this host using update-engine.
Dan Shi2c88eed2013-11-12 10:18:38 -0800955
Dan Shi9cc48452013-11-12 12:39:26 -0800956 update-engine may fail due to a bad image. In such case, powerwash
957 may help to cleanup the DUT for update-engine to work again.
Dan Shi2c88eed2013-11-12 10:18:38 -0800958
959 @raises AutoservRepairMethodNA if the DUT is not reachable.
960 @raises ChromiumOSError if the install failed for some reason.
961
962 """
963 if not self.is_up():
964 raise error.AutoservRepairMethodNA('DUT unreachable for install.')
965
966 logging.info('Attempting to powerwash the DUT.')
967 self.run('echo "fast safe" > '
968 '/mnt/stateful_partition/factory_install_reset')
969 self.reboot(timeout=self.POWERWASH_BOOT_TIMEOUT, wait=True)
970 if not self.is_up():
Dan Shi9cc48452013-11-12 12:39:26 -0800971 logging.error('Powerwash failed. DUT did not come back after '
Dan Shi2c88eed2013-11-12 10:18:38 -0800972 'reboot.')
973 raise error.AutoservRepairFailure(
974 'DUT failed to boot from powerwash after %d seconds' %
975 self.POWERWASH_BOOT_TIMEOUT)
976
977 logging.info('Powerwash succeeded.')
978 self._install_repair()
979
980
beepsf079cfb2013-09-18 17:49:51 -0700981 def servo_install(self, image_url=None, usb_boot_timeout=USB_BOOT_TIMEOUT,
982 install_timeout=INSTALL_TIMEOUT):
Scott Zawalski62bacae2013-03-05 10:40:32 -0500983 """
984 Re-install the OS on the DUT by:
985 1) installing a test image on a USB storage device attached to the Servo
986 board,
Richard Barnette03a0c132012-11-05 12:40:35 -0800987 2) booting that image in recovery mode, and then
J. Richard Barnette31b2e312013-04-04 16:05:22 -0700988 3) installing the image with chromeos-install.
989
Scott Zawalski62bacae2013-03-05 10:40:32 -0500990 @param image_url: If specified use as the url to install on the DUT.
991 otherwise boot the currently staged image on the USB stick.
beepsf079cfb2013-09-18 17:49:51 -0700992 @param usb_boot_timeout: The usb_boot_timeout to use during reimage.
993 Factory images need a longer usb_boot_timeout than regular
994 cros images.
995 @param install_timeout: The timeout to use when installing the chromeos
996 image. Factory images need a longer install_timeout.
Richard Barnette03a0c132012-11-05 12:40:35 -0800997
Scott Zawalski62bacae2013-03-05 10:40:32 -0500998 @raises AutoservError if the image fails to boot.
beepsf079cfb2013-09-18 17:49:51 -0700999
J. Richard Barnette0199cc82014-12-05 17:08:40 -08001000 """
beepsf079cfb2013-09-18 17:49:51 -07001001 usb_boot_timer_key = ('servo_install.usb_boot_timeout_%s'
1002 % usb_boot_timeout)
1003 logging.info('Downloading image to USB, then booting from it. Usb boot '
1004 'timeout = %s', usb_boot_timeout)
Gabe Black1e1c41b2015-02-04 23:55:15 -08001005 timer = autotest_stats.Timer(usb_boot_timer_key)
beepsf079cfb2013-09-18 17:49:51 -07001006 timer.start()
J. Richard Barnette31b2e312013-04-04 16:05:22 -07001007 self.servo.install_recovery_image(image_url)
beepsf079cfb2013-09-18 17:49:51 -07001008 if not self.wait_up(timeout=usb_boot_timeout):
Scott Zawalski62bacae2013-03-05 10:40:32 -05001009 raise error.AutoservRepairFailure(
1010 'DUT failed to boot from USB after %d seconds' %
beepsf079cfb2013-09-18 17:49:51 -07001011 usb_boot_timeout)
1012 timer.stop()
Scott Zawalski62bacae2013-03-05 10:40:32 -05001013
Tom Wai-Hong Tamf6b4f812015-08-08 04:14:59 +08001014 # The new chromeos-tpm-recovery has been merged since R44-7073.0.0.
1015 # In old CrOS images, this command fails. Skip the error.
Tom Wai-Hong Tam27af7332015-07-25 06:09:39 +08001016 logging.info('Resetting the TPM status')
Tom Wai-Hong Tamf6b4f812015-08-08 04:14:59 +08001017 try:
1018 self.run('chromeos-tpm-recovery')
1019 except error.AutoservRunError:
1020 logging.warn('chromeos-tpm-recovery is too old.')
1021
Tom Wai-Hong Tam27af7332015-07-25 06:09:39 +08001022
beepsf079cfb2013-09-18 17:49:51 -07001023 install_timer_key = ('servo_install.install_timeout_%s'
1024 % install_timeout)
Gabe Black1e1c41b2015-02-04 23:55:15 -08001025 timer = autotest_stats.Timer(install_timer_key)
beepsf079cfb2013-09-18 17:49:51 -07001026 timer.start()
1027 logging.info('Installing image through chromeos-install.')
J. Richard Barnette2522a8f2015-03-04 15:59:15 -08001028 self.run('chromeos-install --yes',
MK Ryu35d661e2014-09-25 17:44:10 -07001029 timeout=install_timeout)
J. Richard Barnette709024c2015-08-20 12:06:54 -07001030 self.run('( sleep 1 ; halt ) </dev/null >/dev/null 2>&1 &')
beepsf079cfb2013-09-18 17:49:51 -07001031 timer.stop()
1032
1033 logging.info('Power cycling DUT through servo.')
J. Richard Barnette0199cc82014-12-05 17:08:40 -08001034 self.servo.get_power_state_controller().power_off()
Fang Dengafb88142013-05-30 17:44:31 -07001035 self.servo.switch_usbkey('off')
J. Richard Barnette0199cc82014-12-05 17:08:40 -08001036 # N.B. The Servo API requires that we use power_on() here
1037 # for two reasons:
1038 # 1) After turning on a DUT in recovery mode, you must turn
1039 # it off and then on with power_on() once more to
1040 # disable recovery mode (this is a Parrot specific
1041 # requirement).
1042 # 2) After power_off(), the only way to turn on is with
1043 # power_on() (this is a Storm specific requirement).
J. Richard Barnettefbcc7122013-07-24 18:24:59 -07001044 self.servo.get_power_state_controller().power_on()
beepsf079cfb2013-09-18 17:49:51 -07001045
1046 logging.info('Waiting for DUT to come back up.')
Richard Barnette03a0c132012-11-05 12:40:35 -08001047 if not self.wait_up(timeout=self.BOOT_TIMEOUT):
1048 raise error.AutoservError('DUT failed to reboot installed '
1049 'test image after %d seconds' %
Scott Zawalski62bacae2013-03-05 10:40:32 -05001050 self.BOOT_TIMEOUT)
1051
1052
Dan Shic1b8bdd2015-09-14 23:11:24 -07001053 def _setup_servo(self):
1054 """Try to force to create servo object if it's not set up yet.
1055 """
1056 if self.servo:
1057 return
1058
1059 try:
1060 # Setting servo_args to {} will force it to create the servo_host
1061 # object if possible.
1062 self._servo_host = servo_host.create_servo_host(
1063 dut=self.hostname, servo_args={})
1064 if self._servo_host:
1065 self.servo = self._servo_host.get_servo()
1066 else:
1067 logging.error('Failed to create servo_host object.')
1068 except Exception as e:
1069 logging.error('Failed to create servo object: %s', e)
1070
1071
J. Richard Barnettee4af8b92013-05-01 13:16:12 -07001072 def _servo_repair_reinstall(self):
Scott Zawalski62bacae2013-03-05 10:40:32 -05001073 """Reinstall the DUT utilizing servo and a test image.
1074
1075 Re-install the OS on the DUT by:
1076 1) installing a test image on a USB storage device attached to the Servo
1077 board,
Tom Wai-Hong Tam27af7332015-07-25 06:09:39 +08001078 2) booting that image in recovery mode,
1079 3) resetting the TPM status, and then
1080 4) installing the image with chromeos-install.
Scott Zawalski62bacae2013-03-05 10:40:32 -05001081
Scott Zawalski62bacae2013-03-05 10:40:32 -05001082 @raises AutoservRepairMethodNA if the device does not have servo
1083 support.
1084
1085 """
Dan Shic1b8bdd2015-09-14 23:11:24 -07001086 # To repair a DUT connected to a moblab, try to create a servo object if
1087 # it was failed to be created earlier as there may be a servo_host host
1088 # attribute for this host.
1089 if utils.is_moblab():
1090 self._setup_servo()
1091
Scott Zawalski62bacae2013-03-05 10:40:32 -05001092 if not self.servo:
1093 raise error.AutoservRepairMethodNA('Repair Reinstall NA: '
1094 'DUT has no servo support.')
1095
1096 logging.info('Attempting to recovery servo enabled device with '
1097 'servo_repair_reinstall')
1098
J. Richard Barnettee4af8b92013-05-01 13:16:12 -07001099 image_url = self.stage_image_for_servo()
Scott Zawalski62bacae2013-03-05 10:40:32 -05001100 self.servo_install(image_url)
1101
1102
1103 def _servo_repair_power(self):
1104 """Attempt to repair DUT using an attached Servo.
1105
1106 Attempt to power on the DUT via power_long_press.
1107
1108 @raises AutoservRepairMethodNA if the device does not have servo
1109 support.
1110 @raises AutoservRepairFailure if the repair fails for any reason.
1111 """
1112 if not self.servo:
1113 raise error.AutoservRepairMethodNA('Repair Power NA: '
1114 'DUT has no servo support.')
1115
1116 logging.info('Attempting to recover servo enabled device by '
1117 'powering it off and on.')
1118 self.servo.get_power_state_controller().power_off()
1119 self.servo.get_power_state_controller().power_on()
1120 if self.wait_up(self.BOOT_TIMEOUT):
1121 return
1122
1123 raise error.AutoservRepairFailure('DUT did not boot after long_press.')
Richard Barnette03a0c132012-11-05 12:40:35 -08001124
1125
Richard Barnette82c35912012-11-20 10:09:10 -08001126 def _powercycle_to_repair(self):
1127 """Utilize the RPM Infrastructure to bring the host back up.
1128
1129 If the host is not up/repaired after the first powercycle we utilize
1130 auto fallback to the last good install by powercycling and rebooting the
1131 host 6 times.
Scott Zawalski62bacae2013-03-05 10:40:32 -05001132
1133 @raises AutoservRepairMethodNA if the device does not support remote
1134 power.
1135 @raises AutoservRepairFailure if the repair fails for any reason.
1136
Richard Barnette82c35912012-11-20 10:09:10 -08001137 """
Scott Zawalski62bacae2013-03-05 10:40:32 -05001138 if not self.has_power():
1139 raise error.AutoservRepairMethodNA('Device does not support power.')
1140
Richard Barnette82c35912012-11-20 10:09:10 -08001141 logging.info('Attempting repair via RPM powercycle.')
1142 failed_cycles = 0
1143 self.power_cycle()
1144 while not self.wait_up(timeout=self.BOOT_TIMEOUT):
1145 failed_cycles += 1
1146 if failed_cycles >= self._MAX_POWER_CYCLE_ATTEMPTS:
Scott Zawalski62bacae2013-03-05 10:40:32 -05001147 raise error.AutoservRepairFailure(
1148 'Powercycled host %s %d times; device did not come back'
1149 ' online.' % (self.hostname, failed_cycles))
Richard Barnette82c35912012-11-20 10:09:10 -08001150 self.power_cycle()
1151 if failed_cycles == 0:
1152 logging.info('Powercycling was successful first time.')
1153 else:
1154 logging.info('Powercycling was successful after %d failures.',
1155 failed_cycles)
1156
1157
MK Ryu35d661e2014-09-25 17:44:10 -07001158 def _reboot_repair(self):
1159 """SSH to this host and reboot."""
1160 if not self.is_up(self._CHECK_HOST_UP_TIMEOUT_SECS):
1161 raise error.AutoservRepairMethodNA('DUT unreachable for reboot.')
1162 logging.info('Attempting repair via SSH reboot.')
1163 self.reboot(timeout=self.BOOT_TIMEOUT, wait=True)
1164
1165
Prashanth B4d8184f2014-05-05 12:22:02 -07001166 def check_device(self):
1167 """Check if a device is ssh-able, and if so, clean and verify it.
1168
1169 @raise AutoservSSHTimeout: If the ssh ping times out.
1170 @raise AutoservSshPermissionDeniedError: If ssh ping fails due to
1171 permissions.
1172 @raise AutoservSshPingHostError: For other AutoservRunErrors during
1173 ssh_ping.
1174 @raises AutoservError: As appropriate, during cleanup and verify.
1175 """
1176 self.ssh_ping()
1177 self.cleanup()
1178 self.verify()
1179
1180
Richard Barnette82c35912012-11-20 10:09:10 -08001181 def repair_full(self):
1182 """Repair a host for repair level NO_PROTECTION.
1183
1184 This overrides the base class function for repair; it does
1185 not call back to the parent class, but instead offers a
1186 simplified implementation based on the capabilities in the
1187 Chrome OS test lab.
1188
Fang Deng5d518f42013-08-02 14:04:32 -07001189 It first verifies and repairs servo if it is a DUT in CrOS
Fang Deng03590af2013-10-07 17:34:20 -07001190 lab and a servo is attached.
Fang Deng5d518f42013-08-02 14:04:32 -07001191
Jakob Juelich82b7d1c2014-09-15 16:10:57 -07001192 This escalates in order through the following procedures and verifies
1193 the status using `self.check_device()` after each of them. This is done
1194 until both the repair and the veryfing step succeed.
1195
MK Ryu35d661e2014-09-25 17:44:10 -07001196 Escalation order of repair procedures from less intrusive to
1197 more intrusive repairs:
1198 1. SSH to the DUT and reboot.
Scott Zawalski62bacae2013-03-05 10:40:32 -05001199 2. If there's a servo for the DUT, try to power the DUT off and
1200 on.
MK Ryu35d661e2014-09-25 17:44:10 -07001201 3. If the DUT can be power-cycled via RPM, try to repair
Richard Barnette82c35912012-11-20 10:09:10 -08001202 by power-cycling.
MK Ryu35d661e2014-09-25 17:44:10 -07001203 4. Try to re-install to a known stable image using
1204 auto-update.
1205 5. If there's a servo for the DUT, try to re-install via
1206 the servo.
Richard Barnette82c35912012-11-20 10:09:10 -08001207
1208 As with the parent method, the last operation performed on
Prashanth B4d8184f2014-05-05 12:22:02 -07001209 the DUT must be to call `self.check_device()`; If that call fails the
1210 exception it raises is passed back to the caller.
J. Richard Barnettefde55fc2013-03-15 17:47:01 -07001211
Scott Zawalski62bacae2013-03-05 10:40:32 -05001212 @raises AutoservRepairTotalFailure if the repair process fails to
1213 fix the DUT.
Fang Deng5d518f42013-08-02 14:04:32 -07001214 @raises ServoHostRepairTotalFailure if the repair process fails to
1215 fix the servo host if one is attached to the DUT.
1216 @raises AutoservSshPermissionDeniedError if it is unable
1217 to ssh to the servo host due to permission error.
1218
Richard Barnette82c35912012-11-20 10:09:10 -08001219 """
Jakob Juelich82b7d1c2014-09-15 16:10:57 -07001220 # Caution: Deleting shards relies on repair to always reboot the DUT.
1221
Dan Shi4d478522014-02-14 13:46:32 -08001222 if self._servo_host and not self.servo:
Fang Deng03590af2013-10-07 17:34:20 -07001223 try:
Dan Shi4d478522014-02-14 13:46:32 -08001224 self._servo_host.repair_full()
Fang Deng03590af2013-10-07 17:34:20 -07001225 except Exception as e:
Fang Deng03590af2013-10-07 17:34:20 -07001226 logging.error('Could not create a healthy servo: %s', e)
Dan Shi4d478522014-02-14 13:46:32 -08001227 self.servo = self._servo_host.get_servo()
Fang Deng5d518f42013-08-02 14:04:32 -07001228
MK Ryu35d661e2014-09-25 17:44:10 -07001229 self.try_collect_crashlogs()
1230
Scott Zawalski62bacae2013-03-05 10:40:32 -05001231 # TODO(scottz): This should use something similar to label_decorator,
1232 # but needs to be populated in order so DUTs are repaired with the
1233 # least amount of effort.
MK Ryu35d661e2014-09-25 17:44:10 -07001234 repair_funcs = [self._reboot_repair,
1235 self._servo_repair_power,
1236 self._powercycle_to_repair,
Dan Shi849a1c42014-03-05 11:10:43 -08001237 self._install_repair,
Dan Shi2c88eed2013-11-12 10:18:38 -08001238 self._install_repair_with_powerwash,
MK Ryu35d661e2014-09-25 17:44:10 -07001239 self._servo_repair_reinstall]
Scott Zawalski62bacae2013-03-05 10:40:32 -05001240 errors = []
Simran Basie6130932013-10-01 14:07:52 -07001241 board = self._get_board_from_afe()
Scott Zawalski62bacae2013-03-05 10:40:32 -05001242 for repair_func in repair_funcs:
1243 try:
1244 repair_func()
MK Ryu35d661e2014-09-25 17:44:10 -07001245 self.try_collect_crashlogs()
Prashanth B4d8184f2014-05-05 12:22:02 -07001246 self.check_device()
Gabe Black1e1c41b2015-02-04 23:55:15 -08001247 autotest_stats.Counter(
Simran Basie6130932013-10-01 14:07:52 -07001248 '%s.SUCCEEDED' % repair_func.__name__).increment()
1249 if board:
Gabe Black1e1c41b2015-02-04 23:55:15 -08001250 autotest_stats.Counter(
Dan Shib87c3aa2014-02-12 15:40:31 -08001251 '%s.%s.SUCCEEDED' % (repair_func.__name__,
Simran Basie6130932013-10-01 14:07:52 -07001252 board)).increment()
Scott Zawalski62bacae2013-03-05 10:40:32 -05001253 return
Simran Basie6130932013-10-01 14:07:52 -07001254 except error.AutoservRepairMethodNA as e:
Gabe Black1e1c41b2015-02-04 23:55:15 -08001255 autotest_stats.Counter(
Simran Basie6130932013-10-01 14:07:52 -07001256 '%s.RepairNA' % repair_func.__name__).increment()
1257 if board:
Gabe Black1e1c41b2015-02-04 23:55:15 -08001258 autotest_stats.Counter(
Dan Shib87c3aa2014-02-12 15:40:31 -08001259 '%s.%s.RepairNA' % (repair_func.__name__,
Simran Basie6130932013-10-01 14:07:52 -07001260 board)).increment()
Ilja H. Friedel04be2bd2014-05-07 21:29:59 -07001261 logging.warning('Repair function NA: %s', e)
Simran Basie6130932013-10-01 14:07:52 -07001262 errors.append(str(e))
Scott Zawalski62bacae2013-03-05 10:40:32 -05001263 except Exception as e:
Gabe Black1e1c41b2015-02-04 23:55:15 -08001264 autotest_stats.Counter(
Simran Basie6130932013-10-01 14:07:52 -07001265 '%s.FAILED' % repair_func.__name__).increment()
1266 if board:
Gabe Black1e1c41b2015-02-04 23:55:15 -08001267 autotest_stats.Counter(
Dan Shib87c3aa2014-02-12 15:40:31 -08001268 '%s.%s.FAILED' % (repair_func.__name__,
Simran Basie6130932013-10-01 14:07:52 -07001269 board)).increment()
Ilja H. Friedel04be2bd2014-05-07 21:29:59 -07001270 logging.warning('Failed to repair device: %s', e)
Scott Zawalski62bacae2013-03-05 10:40:32 -05001271 errors.append(str(e))
Scott Zawalski89c44dd2013-02-26 09:28:02 -05001272
Gabe Black1e1c41b2015-02-04 23:55:15 -08001273 autotest_stats.Counter('Full_Repair_Failed').increment()
Simran Basie6130932013-10-01 14:07:52 -07001274 if board:
Gabe Black1e1c41b2015-02-04 23:55:15 -08001275 autotest_stats.Counter(
Simran Basie6130932013-10-01 14:07:52 -07001276 'Full_Repair_Failed.%s' % board).increment()
Scott Zawalski62bacae2013-03-05 10:40:32 -05001277 raise error.AutoservRepairTotalFailure(
1278 'All attempts at repairing the device failed:\n%s' %
1279 '\n'.join(errors))
Richard Barnette82c35912012-11-20 10:09:10 -08001280
1281
MK Ryu35d661e2014-09-25 17:44:10 -07001282 def try_collect_crashlogs(self, check_host_up=True):
1283 """
1284 Check if a host is up and logs need to be collected from the host,
1285 if yes, collect them.
1286
1287 @param check_host_up: Flag for checking host is up. Default is True.
1288 """
1289 try:
1290 crash_job = self._need_crash_logs()
1291 if crash_job:
1292 logging.debug('%s: Job %s was crashed', self._CRASHLOGS_PREFIX,
1293 crash_job)
1294 if not check_host_up or self.is_up(
1295 self._CHECK_HOST_UP_TIMEOUT_SECS):
1296 self._collect_crashlogs(crash_job)
1297 logging.debug('%s: Completed collecting logs for the '
1298 'crashed job %s', self._CRASHLOGS_PREFIX,
1299 crash_job)
1300 except Exception as e:
1301 # Exception should not result in repair failure.
1302 # Therefore, suppress all exceptions here.
1303 logging.error('%s: Failed while trying to collect crash-logs: %s',
1304 self._CRASHLOGS_PREFIX, e)
1305
1306
1307 def _need_crash_logs(self):
1308 """Get the value of need_crash_logs attribute of this host.
1309
1310 @return: Value string of need_crash_logs attribute
1311 None if there is no need_crash_logs attribute
1312 """
1313 attrs = self._AFE.get_host_attribute(constants.CRASHLOGS_HOST_ATTRIBUTE,
1314 hostname=self.hostname)
1315 assert len(attrs) < 2
1316 return attrs[0].value if attrs else None
1317
1318
1319 def _collect_crashlogs(self, job_id):
1320 """Grab logs from the host where a job was crashed.
1321
1322 First, check if PRIOR_LOGS_DIR exists in the host.
1323 If yes, collect them.
1324 Otherwise, check if a lab-machine marker (_LAB_MACHINE_FILE) exists
1325 in the host.
1326 If yes, the host was repaired automatically, and we collect normal
1327 system logs.
1328
1329 @param job_id: Id of the job that was crashed.
1330 """
1331 crashlogs_dir = crashcollect.get_crashinfo_dir(self,
1332 constants.CRASHLOGS_DEST_DIR_PREFIX)
1333 flag_prior_logs = False
1334
1335 if self.path_exists(client_constants.PRIOR_LOGS_DIR):
1336 flag_prior_logs = True
1337 self._collect_prior_logs(crashlogs_dir)
1338 elif self.path_exists(self._LAB_MACHINE_FILE):
1339 self._collect_system_logs(crashlogs_dir)
1340 else:
1341 logging.warning('%s: Host was manually re-installed without '
1342 '--lab_preserve_log option. Skip collecting '
1343 'crash-logs.', self._CRASHLOGS_PREFIX)
1344
1345 # We make crash collection be one-time effort.
1346 # _collect_prior_logs() and _collect_system_logs() will not throw
1347 # any exception, and following codes will be executed even when
1348 # those methods fail.
1349 # _collect_crashlogs() is called only when the host is up (refer
1350 # to try_collect_crashlogs()). We assume _collect_prior_logs() and
1351 # _collect_system_logs() fail rarely when the host is up.
1352 # In addition, it is not clear how many times we should try crash
1353 # collection again while not triggering next repair unnecessarily.
1354 # Threfore, we try crash collection one time.
1355
1356 # Create a marker file as soon as log collection is done.
1357 # Leave the job id to this marker for gs_offloader to consume.
1358 marker_file = os.path.join(crashlogs_dir, constants.CRASHLOGS_MARKER)
1359 with open(marker_file, 'a') as f:
1360 f.write('%s\n' % job_id)
1361
1362 # Remove need_crash_logs attribute
1363 logging.debug('%s: Remove attribute need_crash_logs from host %s',
1364 self._CRASHLOGS_PREFIX, self.hostname)
1365 self._AFE.set_host_attribute(constants.CRASHLOGS_HOST_ATTRIBUTE,
1366 None, hostname=self.hostname)
1367
1368 if flag_prior_logs:
1369 logging.debug('%s: Remove %s from host %s', self._CRASHLOGS_PREFIX,
1370 client_constants.PRIOR_LOGS_DIR, self.hostname)
1371 self.run('rm -rf %s; sync' % client_constants.PRIOR_LOGS_DIR)
1372 # Wait for a few seconds to make sure the prior command is
1373 # done deep through storage.
1374 time.sleep(self._SAFE_WAIT_SECS)
1375
1376
1377 def _collect_prior_logs(self, crashlogs_dir):
1378 """Grab prior logs that were stashed before re-installing a host.
1379
1380 @param crashlogs_dir: Directory path where crash-logs are stored.
1381 """
1382 logging.debug('%s: Found %s, collecting them...',
1383 self._CRASHLOGS_PREFIX, client_constants.PRIOR_LOGS_DIR)
1384 try:
1385 self.collect_logs(client_constants.PRIOR_LOGS_DIR,
1386 crashlogs_dir, False)
1387 logging.debug('%s: %s is collected',
1388 self._CRASHLOGS_PREFIX, client_constants.PRIOR_LOGS_DIR)
1389 except Exception as e:
1390 logging.error('%s: Failed to collect %s: %s',
1391 self._CRASHLOGS_PREFIX, client_constants.PRIOR_LOGS_DIR,
1392 e)
1393
1394
1395 def _collect_system_logs(self, crashlogs_dir):
1396 """Grab normal system logs from a host.
1397
1398 @param crashlogs_dir: Directory path where crash-logs are stored.
1399 """
1400 logging.debug('%s: Found %s, collecting system logs...',
1401 self._CRASHLOGS_PREFIX, self._LAB_MACHINE_FILE)
1402 sources = server_utils.parse_simple_config(self._LOGS_TO_COLLECT_FILE)
1403 for src in sources:
1404 try:
1405 if self.path_exists(src):
1406 logging.debug('%s: Collecting %s...',
1407 self._CRASHLOGS_PREFIX, src)
1408 dest = server_utils.concat_path_except_last(
1409 crashlogs_dir, src)
1410 self.collect_logs(src, dest, False)
1411 logging.debug('%s: %s is collected',
1412 self._CRASHLOGS_PREFIX, src)
1413 except Exception as e:
1414 logging.error('%s: Failed to collect %s: %s',
1415 self._CRASHLOGS_PREFIX, src, e)
1416
1417
J. Richard Barnette1d78b012012-05-15 13:56:30 -07001418 def close(self):
beeps32a63082013-08-22 14:02:29 -07001419 self.rpc_disconnect_all()
Fang Deng0ca40e22013-08-27 17:47:44 -07001420 super(CrosHost, self).close()
J. Richard Barnette1d78b012012-05-15 13:56:30 -07001421
1422
Dan Shi49ca0932014-11-14 11:22:27 -08001423 def get_power_supply_info(self):
1424 """Get the output of power_supply_info.
1425
1426 power_supply_info outputs the info of each power supply, e.g.,
1427 Device: Line Power
1428 online: no
1429 type: Mains
1430 voltage (V): 0
1431 current (A): 0
1432 Device: Battery
1433 state: Discharging
1434 percentage: 95.9276
1435 technology: Li-ion
1436
1437 Above output shows two devices, Line Power and Battery, with details of
1438 each device listed. This function parses the output into a dictionary,
1439 with key being the device name, and value being a dictionary of details
1440 of the device info.
1441
1442 @return: The dictionary of power_supply_info, e.g.,
1443 {'Line Power': {'online': 'yes', 'type': 'main'},
1444 'Battery': {'vendor': 'xyz', 'percentage': '100'}}
Dan Shie9b765d2014-12-29 16:59:49 -08001445 @raise error.AutoservRunError if power_supply_info tool is not found in
1446 the DUT. Caller should handle this error to avoid false failure
1447 on verification.
Dan Shi49ca0932014-11-14 11:22:27 -08001448 """
1449 result = self.run('power_supply_info').stdout.strip()
1450 info = {}
1451 device_name = None
1452 device_info = {}
1453 for line in result.split('\n'):
1454 pair = [v.strip() for v in line.split(':')]
1455 if len(pair) != 2:
1456 continue
1457 if pair[0] == 'Device':
1458 if device_name:
1459 info[device_name] = device_info
1460 device_name = pair[1]
1461 device_info = {}
1462 else:
1463 device_info[pair[0]] = pair[1]
1464 if device_name and not device_name in info:
1465 info[device_name] = device_info
1466 return info
1467
1468
1469 def get_battery_percentage(self):
1470 """Get the battery percentage.
1471
1472 @return: The percentage of battery level, value range from 0-100. Return
1473 None if the battery info cannot be retrieved.
1474 """
1475 try:
1476 info = self.get_power_supply_info()
1477 logging.info(info)
1478 return float(info['Battery']['percentage'])
Dan Shie9b765d2014-12-29 16:59:49 -08001479 except (KeyError, ValueError, error.AutoservRunError):
Dan Shi49ca0932014-11-14 11:22:27 -08001480 return None
1481
1482
1483 def is_ac_connected(self):
1484 """Check if the dut has power adapter connected and charging.
1485
1486 @return: True if power adapter is connected and charging.
1487 """
1488 try:
1489 info = self.get_power_supply_info()
1490 return info['Line Power']['online'] == 'yes'
Dan Shie9b765d2014-12-29 16:59:49 -08001491 except (KeyError, error.AutoservRunError):
1492 return None
Dan Shi49ca0932014-11-14 11:22:27 -08001493
1494
Simran Basi5e6339a2013-03-21 11:34:32 -07001495 def _cleanup_poweron(self):
1496 """Special cleanup method to make sure hosts always get power back."""
1497 afe = frontend_wrappers.RetryingAFE(timeout_min=5, delay_sec=10)
1498 hosts = afe.get_hosts(hostname=self.hostname)
1499 if not hosts or not (self._RPM_OUTLET_CHANGED in
1500 hosts[0].attributes):
1501 return
1502 logging.debug('This host has recently interacted with the RPM'
1503 ' Infrastructure. Ensuring power is on.')
1504 try:
1505 self.power_on()
Dan Shi7dca56e2014-11-11 17:07:56 -08001506 afe.set_host_attribute(self._RPM_OUTLET_CHANGED, None,
1507 hostname=self.hostname)
Simran Basi5e6339a2013-03-21 11:34:32 -07001508 except rpm_client.RemotePowerException:
Simran Basi5e6339a2013-03-21 11:34:32 -07001509 logging.error('Failed to turn Power On for this host after '
1510 'cleanup through the RPM Infrastructure.')
Gabe Blackb72f4fb2015-01-20 16:47:13 -08001511 autotest_es.post(
Dan Shi7dca56e2014-11-11 17:07:56 -08001512 type_str='RPM_poweron_failure',
1513 metadata={'hostname': self.hostname})
Dan Shi49ca0932014-11-14 11:22:27 -08001514
1515 battery_percentage = self.get_battery_percentage()
Dan Shif01ebe22014-12-05 13:10:57 -08001516 if battery_percentage and battery_percentage < 50:
Dan Shi49ca0932014-11-14 11:22:27 -08001517 raise
1518 elif self.is_ac_connected():
1519 logging.info('The device has power adapter connected and '
1520 'charging. No need to try to turn RPM on '
1521 'again.')
1522 afe.set_host_attribute(self._RPM_OUTLET_CHANGED, None,
1523 hostname=self.hostname)
1524 logging.info('Battery level is now at %s%%. The device may '
1525 'still have enough power to run test, so no '
1526 'exception will be raised.', battery_percentage)
1527
Simran Basi5e6339a2013-03-21 11:34:32 -07001528
beepsc87ff602013-07-31 21:53:00 -07001529 def _is_factory_image(self):
1530 """Checks if the image on the DUT is a factory image.
1531
1532 @return: True if the image on the DUT is a factory image.
1533 False otherwise.
1534 """
1535 result = self.run('[ -f /root/.factory_test ]', ignore_status=True)
1536 return result.exit_status == 0
1537
1538
1539 def _restart_ui(self):
J. Richard Barnette84890bd2014-02-21 11:05:47 -08001540 """Restart the Chrome UI.
beepsc87ff602013-07-31 21:53:00 -07001541
1542 @raises: FactoryImageCheckerException for factory images, since
1543 we cannot attempt to restart ui on them.
1544 error.AutoservRunError for any other type of error that
1545 occurs while restarting ui.
1546 """
1547 if self._is_factory_image():
Dan Shi549fb822015-03-24 18:01:11 -07001548 raise FactoryImageCheckerException('Cannot restart ui on factory '
1549 'images')
beepsc87ff602013-07-31 21:53:00 -07001550
J. Richard Barnette84890bd2014-02-21 11:05:47 -08001551 # TODO(jrbarnette): The command to stop/start the ui job
1552 # should live inside cros_ui, too. However that would seem
1553 # to imply interface changes to the existing start()/restart()
1554 # functions, which is a bridge too far (for now).
J. Richard Barnette6069aa12015-06-08 09:10:24 -07001555 prompt = cros_ui.get_chrome_session_ident(self)
J. Richard Barnette84890bd2014-02-21 11:05:47 -08001556 self.run('stop ui; start ui')
1557 cros_ui.wait_for_chrome_ready(prompt, self)
beepsc87ff602013-07-31 21:53:00 -07001558
1559
Dan Shi549fb822015-03-24 18:01:11 -07001560 def get_release_version(self):
1561 """Get the value of attribute CHROMEOS_RELEASE_VERSION from lsb-release.
1562
1563 @returns The version string in lsb-release, under attribute
1564 CHROMEOS_RELEASE_VERSION.
1565 """
1566 lsb_release_content = self.run(
1567 'cat "%s"' % client_constants.LSB_RELEASE).stdout.strip()
1568 return lsbrelease_utils.get_chromeos_release_version(
1569 lsb_release_content=lsb_release_content)
1570
1571
1572 def verify_cros_version_label(self):
1573 """ Make sure host's cros-version label match the actual image in dut.
1574
1575 Remove any cros-version: label that doesn't match that installed in
1576 the dut.
1577
1578 @param raise_error: Set to True to raise exception if any mismatch found
1579
1580 @raise error.AutoservError: If any mismatch between cros-version label
1581 and the build installed in dut is found.
1582 """
1583 labels = self._AFE.get_labels(
1584 name__startswith=ds_constants.VERSION_PREFIX,
1585 host__hostname=self.hostname)
1586 mismatch_found = False
1587 if labels:
1588 # Get CHROMEOS_RELEASE_VERSION from lsb-release, e.g., 6908.0.0.
1589 # Note that it's different from cros-version label, which has
1590 # builder and branch info, e.g.,
1591 # cros-version:peppy-release/R43-6908.0.0
1592 release_version = self.get_release_version()
1593 host_list = [self.hostname]
1594 for label in labels:
1595 # Remove any cros-version label that does not match
1596 # release_version.
1597 build_version = label.name[len(ds_constants.VERSION_PREFIX):]
1598 if not utils.version_match(build_version, release_version):
1599 logging.warn('cros-version label "%s" does not match '
1600 'release version %s. Removing the label.',
1601 label.name, release_version)
1602 label.remove_hosts(hosts=host_list)
1603 mismatch_found = True
1604 if mismatch_found:
Dan Shi1057bae2015-03-30 11:35:09 -07001605 autotest_es.post(use_http=True,
1606 type_str='cros_version_label_mismatch',
1607 metadata={'hostname': self.hostname})
Dan Shi549fb822015-03-24 18:01:11 -07001608 raise error.AutoservError('The host has wrong cros-version label.')
1609
1610
Darren Krahn495b0982015-09-21 19:12:51 -07001611 def verify_tpm_status(self):
1612 """ Verify the host's TPM is in a good state.
1613
1614 @raise error.AutoservError: If state is not good.
1615 """
1616 # This cryptohome command emits status information in JSON format. It
1617 # looks something like this:
1618 # {
1619 # "installattrs": {
1620 # "first_install": false,
1621 # "initialized": true,
1622 # "invalid": false,
1623 # "lockbox_index": 536870916,
1624 # "lockbox_nvram_version": 2,
1625 # "secure": true,
1626 # "size": 0,
1627 # "version": 1
1628 # },
1629 # "mounts": [ {
1630 # "enterprise": false,
1631 # "keysets": [ {
1632 # "current": true,
1633 # "index": 0,
1634 # "last_activity": 1330111359,
1635 # "ok": true,
1636 # "scrypt": true,
1637 # "tpm": false
1638 # } ],
1639 # "mounted": true,
1640 # "owner": "dbb3dd34edb181245130e136be51fa08478d3909"
1641 # } ],
1642 # "tpm": {
1643 # "being_owned": false,
1644 # "can_connect": true,
1645 # "can_decrypt": false,
1646 # "can_encrypt": false,
1647 # "can_load_srk": true,
1648 # "can_load_srk_pubkey": true,
1649 # "enabled": true,
1650 # "has_context": true,
1651 # "has_cryptohome_key": false,
1652 # "has_key_handle": false,
1653 # "last_error": 0,
1654 # "owned": true
1655 # }
1656 # }
1657 output = self.run('cryptohome --action=status').stdout.strip()
1658 try:
1659 status = json.loads(output)
1660 except ValueError:
1661 logging.error('TPM_VERIFY: Cryptohome did not return valid status.')
1662 return
1663 try:
1664 tpm = status['tpm']
1665 if (not tpm['enabled'] or not tpm['can_connect'] or
1666 (tpm['owned'] and not tpm['can_load_srk']) or
1667 (tpm['can_load_srk'] and not tpm['can_load_srk_pubkey'])):
1668 logging.error('TPM_VERIFY: The host TPM is in a bad state.')
1669 raise error.AutoservError('The host TPM is in a bad state.')
1670 else:
1671 logging.debug('TPM_VERIFY: The host TPM is in a good state.')
1672 except KeyError:
1673 logging.error('TPM_VERIFY: Cryptohome did not return valid status.')
1674
1675
beepsc87ff602013-07-31 21:53:00 -07001676 def cleanup(self):
MK Ryu35d661e2014-09-25 17:44:10 -07001677 self.run('rm -f %s' % client_constants.CLEANUP_LOGS_PAUSED_FILE)
Scott Zawalskiddbc31e2012-11-15 11:29:01 -05001678 try:
beepsc87ff602013-07-31 21:53:00 -07001679 self._restart_ui()
1680 except (error.AutotestRunError, error.AutoservRunError,
1681 FactoryImageCheckerException):
Ilja H. Friedel04be2bd2014-05-07 21:29:59 -07001682 logging.warning('Unable to restart ui, rebooting device.')
Scott Zawalskiddbc31e2012-11-15 11:29:01 -05001683 # Since restarting the UI fails fall back to normal Autotest
1684 # cleanup routines, i.e. reboot the machine.
Fang Deng0ca40e22013-08-27 17:47:44 -07001685 super(CrosHost, self).cleanup()
Simran Basi5e6339a2013-03-21 11:34:32 -07001686 # Check if the rpm outlet was manipulated.
Simran Basid5e5e272012-09-24 15:23:59 -07001687 if self.has_power():
Simran Basi5e6339a2013-03-21 11:34:32 -07001688 self._cleanup_poweron()
Dan Shi549fb822015-03-24 18:01:11 -07001689 self.verify_cros_version_label()
J. Richard Barnette45e93de2012-04-11 17:24:15 -07001690
1691
Yu-Ju Honga2be94a2012-07-31 09:48:52 -07001692 def reboot(self, **dargs):
1693 """
1694 This function reboots the site host. The more generic
1695 RemoteHost.reboot() performs sync and sleeps for 5
1696 seconds. This is not necessary for Chrome OS devices as the
1697 sync should be finished in a short time during the reboot
1698 command.
1699 """
Tom Wai-Hong Tamf5cd1d42012-08-13 12:04:08 +08001700 if 'reboot_cmd' not in dargs:
Doug Anderson7d5aeb22014-02-27 15:12:17 -08001701 reboot_timeout = dargs.get('reboot_timeout', 10)
1702 dargs['reboot_cmd'] = ('((reboot & sleep %d; reboot -f &)'
1703 ' </dev/null >/dev/null 2>&1 &)' %
1704 reboot_timeout)
Yu-Ju Honga2be94a2012-07-31 09:48:52 -07001705 # Enable fastsync to avoid running extra sync commands before reboot.
Tom Wai-Hong Tamf5cd1d42012-08-13 12:04:08 +08001706 if 'fastsync' not in dargs:
1707 dargs['fastsync'] = True
Michael Liangda8c60a2014-06-03 13:24:51 -07001708
Charlie Mooneya8e6dab2014-05-29 14:37:55 -07001709 # For purposes of logging reboot times:
1710 # Get the board name i.e. 'daisy_spring'
Michael Liangca4f5a62014-07-10 15:45:13 -07001711 board_fullname = self.get_board()
1712
1713 # Strip the prefix and add it to dargs.
1714 dargs['board'] = board_fullname[board_fullname.find(':')+1:]
Fang Deng0ca40e22013-08-27 17:47:44 -07001715 super(CrosHost, self).reboot(**dargs)
Yu-Ju Honga2be94a2012-07-31 09:48:52 -07001716
1717
Gwendal Grignou7a61d2f2014-05-23 11:05:51 -07001718 def suspend(self, **dargs):
1719 """
1720 This function suspends the site host.
1721 """
1722 suspend_time = dargs.get('suspend_time', 60)
1723 dargs['timeout'] = suspend_time
1724 if 'suspend_cmd' not in dargs:
1725 cmd = ' && '.join(['echo 0 > /sys/class/rtc/rtc0/wakealarm',
1726 'echo +%d > /sys/class/rtc/rtc0/wakealarm' % suspend_time,
1727 'powerd_dbus_suspend --delay=0 &'])
1728 dargs['suspend_cmd'] = ('(( %s )'
1729 '< /dev/null >/dev/null 2>&1 &)' % cmd)
1730 super(CrosHost, self).suspend(**dargs)
1731
1732
Simran Basiec564392014-08-25 16:48:09 -07001733 def upstart_status(self, service_name):
1734 """Check the status of an upstart init script.
1735
1736 @param service_name: Service to look up.
1737
1738 @returns True if the service is running, False otherwise.
1739 """
1740 return self.run('status %s | grep start/running' %
1741 service_name).stdout.strip() != ''
1742
1743
J. Richard Barnette45e93de2012-04-11 17:24:15 -07001744 def verify_software(self):
Richard Barnetteb2bc13c2013-01-08 17:32:51 -08001745 """Verify working software on a Chrome OS system.
J. Richard Barnette45e93de2012-04-11 17:24:15 -07001746
Richard Barnetteb2bc13c2013-01-08 17:32:51 -08001747 Tests for the following conditions:
1748 1. All conditions tested by the parent version of this
1749 function.
1750 2. Sufficient space in /mnt/stateful_partition.
Fang Deng6b05f5b2013-03-20 13:42:11 -07001751 3. Sufficient space in /mnt/stateful_partition/encrypted.
1752 4. update_engine answers a simple status request over DBus.
J. Richard Barnette45e93de2012-04-11 17:24:15 -07001753
J. Richard Barnette45e93de2012-04-11 17:24:15 -07001754 """
MK Ryu35d661e2014-09-25 17:44:10 -07001755 # Check if a job was crashed on this host.
1756 # If yes, avoid verification until crash-logs are collected.
1757 if self._need_crash_logs():
1758 raise error.AutoservCrashLogCollectRequired(
1759 'Need to collect crash-logs before verification')
1760
Fang Deng0ca40e22013-08-27 17:47:44 -07001761 super(CrosHost, self).verify_software()
Dan Shib8540a52015-07-16 14:18:23 -07001762 default_kilo_inodes_required = CONFIG.get_config_value(
1763 'SERVER', 'kilo_inodes_required', type=int, default=100)
1764 board = self.get_board().replace(ds_constants.BOARD_PREFIX, '')
1765 kilo_inodes_required = CONFIG.get_config_value(
1766 'SERVER', 'kilo_inodes_required_%s' % board,
1767 type=int, default=default_kilo_inodes_required)
1768 self.check_inodes('/mnt/stateful_partition', kilo_inodes_required)
J. Richard Barnette45e93de2012-04-11 17:24:15 -07001769 self.check_diskspace(
1770 '/mnt/stateful_partition',
Dan Shib8540a52015-07-16 14:18:23 -07001771 CONFIG.get_config_value(
Fang Deng6b05f5b2013-03-20 13:42:11 -07001772 'SERVER', 'gb_diskspace_required', type=float,
1773 default=20.0))
Gaurav Shahe448af82014-06-19 15:18:59 -07001774 encrypted_stateful_path = '/mnt/stateful_partition/encrypted'
1775 # Not all targets build with encrypted stateful support.
1776 if self.path_exists(encrypted_stateful_path):
1777 self.check_diskspace(
1778 encrypted_stateful_path,
Dan Shib8540a52015-07-16 14:18:23 -07001779 CONFIG.get_config_value(
Gaurav Shahe448af82014-06-19 15:18:59 -07001780 'SERVER', 'gb_encrypted_diskspace_required', type=float,
1781 default=0.1))
beepsc87ff602013-07-31 21:53:00 -07001782
Simran Basiec564392014-08-25 16:48:09 -07001783 if not self.upstart_status('system-services'):
Prashanth B5d0a0512014-04-25 12:26:08 -07001784 raise error.AutoservError('Chrome failed to reach login. '
1785 'System services not running.')
1786
beepsc87ff602013-07-31 21:53:00 -07001787 # Factory images don't run update engine,
1788 # goofy controls dbus on these DUTs.
1789 if not self._is_factory_image():
1790 self.run('update_engine_client --status')
Scott Zawalskifbca4a92013-03-04 15:56:42 -05001791 # Makes sure python is present, loads and can use built in functions.
1792 # We have seen cases where importing cPickle fails with undefined
1793 # symbols in cPickle.so.
1794 self.run('python -c "import cPickle"')
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07001795
Dan Shi549fb822015-03-24 18:01:11 -07001796 self.verify_cros_version_label()
1797
Darren Krahn495b0982015-09-21 19:12:51 -07001798 self.verify_tpm_status()
1799
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07001800
Dan Shi49ca0932014-11-14 11:22:27 -08001801 def verify_hardware(self):
1802 """Verify hardware system of a Chrome OS system.
1803
1804 Check following hardware conditions:
1805 1. Battery level.
1806 2. Is power adapter connected.
1807 """
1808 logging.info('Battery percentage: %s', self.get_battery_percentage())
Dan Shie9b765d2014-12-29 16:59:49 -08001809 if self.is_ac_connected() is None:
1810 logging.info('Can not determine if the device has power adapter '
1811 'connected.')
1812 else:
1813 logging.info('Device %s power adapter connected and charging.',
1814 'has' if self.is_ac_connected() else 'does not have')
Dan Shi49ca0932014-11-14 11:22:27 -08001815
1816
Fang Deng96667ca2013-08-01 17:46:18 -07001817 def make_ssh_command(self, user='root', port=22, opts='', hosts_file=None,
1818 connect_timeout=None, alive_interval=None):
1819 """Override default make_ssh_command to use options tuned for Chrome OS.
1820
1821 Tuning changes:
1822 - ConnectTimeout=30; maximum of 30 seconds allowed for an SSH
1823 connection failure. Consistency with remote_access.sh.
1824
Samuel Tan2ce155b2015-06-23 18:24:38 -07001825 - ServerAliveInterval=900; which causes SSH to ping connection every
1826 900 seconds. In conjunction with ServerAliveCountMax ensures
1827 that if the connection dies, Autotest will bail out.
Fang Deng96667ca2013-08-01 17:46:18 -07001828 Originally tried 60 secs, but saw frequent job ABORTS where
Samuel Tan2ce155b2015-06-23 18:24:38 -07001829 the test completed successfully. Later increased from 180 seconds to
1830 900 seconds to account for tests where the DUT is suspended for
1831 longer periods of time.
Fang Deng96667ca2013-08-01 17:46:18 -07001832
1833 - ServerAliveCountMax=3; consistency with remote_access.sh.
1834
1835 - ConnectAttempts=4; reduce flakiness in connection errors;
1836 consistency with remote_access.sh.
1837
1838 - UserKnownHostsFile=/dev/null; we don't care about the keys.
1839 Host keys change with every new installation, don't waste
1840 memory/space saving them.
1841
1842 - SSH protocol forced to 2; needed for ServerAliveInterval.
1843
1844 @param user User name to use for the ssh connection.
1845 @param port Port on the target host to use for ssh connection.
1846 @param opts Additional options to the ssh command.
1847 @param hosts_file Ignored.
1848 @param connect_timeout Ignored.
1849 @param alive_interval Ignored.
1850 """
Aviv Keshetc5947fa2013-09-04 14:06:29 -07001851 base_command = ('/usr/bin/ssh -a -x %s %s %s'
1852 ' -o StrictHostKeyChecking=no'
Fang Deng96667ca2013-08-01 17:46:18 -07001853 ' -o UserKnownHostsFile=/dev/null -o BatchMode=yes'
Samuel Tan2ce155b2015-06-23 18:24:38 -07001854 ' -o ConnectTimeout=30 -o ServerAliveInterval=900'
Fang Deng96667ca2013-08-01 17:46:18 -07001855 ' -o ServerAliveCountMax=3 -o ConnectionAttempts=4'
1856 ' -o Protocol=2 -l %s -p %d')
Aviv Keshetc5947fa2013-09-04 14:06:29 -07001857 return base_command % (self._ssh_verbosity_flag, self._ssh_options,
1858 opts, user, port)
Fang Deng96667ca2013-08-01 17:46:18 -07001859
1860
Christopher Wileydd181852013-10-10 19:56:58 -07001861 def _setup_rpc(self, port, command_name, remote_pid=None):
beeps32a63082013-08-22 14:02:29 -07001862 """Sets up a tunnel process and performs rpc connection book keeping.
1863
Cheng-Yi Chianga155e7e2015-08-20 20:42:04 +08001864 Chrome OS on the target closes down most external ports for security.
1865 We could open the port, but doing that would conflict with security
1866 tests that check that only expected ports are open. So, to get to
1867 the port on the target we use an ssh tunnel.
1868
beeps32a63082013-08-22 14:02:29 -07001869 This method assumes that xmlrpc and jsonrpc never conflict, since
1870 we can only either have an xmlrpc or a jsonrpc server listening on
1871 a remote port. As such, it enforces a single proxy->remote port
1872 policy, i.e if one starts a jsonrpc proxy/server from port A->B,
1873 and then tries to start an xmlrpc proxy forwarded to the same port,
1874 the xmlrpc proxy will override the jsonrpc tunnel process, however:
1875
1876 1. None of the methods on the xmlrpc proxy will work because
1877 the server listening on B is jsonrpc.
1878
1879 2. The xmlrpc client cannot initiate a termination of the JsonRPC
1880 server, as the only use case currently is goofy, which is tied to
1881 the factory image. It is much easier to handle a failed xmlrpc
1882 call on the client than it is to terminate goofy in this scenario,
1883 as doing the latter might leave the DUT in a hard to recover state.
1884
1885 With the current implementation newer rpc proxy connections will
1886 terminate the tunnel processes of older rpc connections tunneling
1887 to the same remote port. If methods are invoked on the client
1888 after this has happened they will fail with connection closed errors.
1889
1890 @param port: The remote forwarding port.
1891 @param command_name: The name of the remote process, to terminate
1892 using pkill.
1893
1894 @return A url that we can use to initiate the rpc connection.
1895 """
1896 self.rpc_disconnect(port)
1897 local_port = utils.get_unused_port()
1898 tunnel_proc = self._create_ssh_tunnel(port, local_port)
Christopher Wileydd181852013-10-10 19:56:58 -07001899 self._rpc_proxy_map[port] = (command_name, tunnel_proc, remote_pid)
beeps32a63082013-08-22 14:02:29 -07001900 return self._RPC_PROXY_URL % local_port
1901
1902
Christopher Wileyd78249a2013-03-01 13:05:31 -08001903 def xmlrpc_connect(self, command, port, command_name=None,
Yusuf Mohsinallyfff89d62013-11-18 16:34:07 -08001904 ready_test_name=None, timeout_seconds=10,
1905 logfile='/dev/null'):
J. Richard Barnette1d78b012012-05-15 13:56:30 -07001906 """Connect to an XMLRPC server on the host.
1907
1908 The `command` argument should be a simple shell command that
1909 starts an XMLRPC server on the given `port`. The command
1910 must not daemonize, and must terminate cleanly on SIGTERM.
1911 The command is started in the background on the host, and a
1912 local XMLRPC client for the server is created and returned
1913 to the caller.
1914
1915 Note that the process of creating an XMLRPC client makes no
1916 attempt to connect to the remote server; the caller is
1917 responsible for determining whether the server is running
1918 correctly, and is ready to serve requests.
1919
Christopher Wileyd78249a2013-03-01 13:05:31 -08001920 Optionally, the caller can pass ready_test_name, a string
1921 containing the name of a method to call on the proxy. This
1922 method should take no parameters and return successfully only
1923 when the server is ready to process client requests. When
1924 ready_test_name is set, xmlrpc_connect will block until the
1925 proxy is ready, and throw a TestError if the server isn't
1926 ready by timeout_seconds.
1927
beeps32a63082013-08-22 14:02:29 -07001928 If a server is already running on the remote port, this
1929 method will kill it and disconnect the tunnel process
1930 associated with the connection before establishing a new one,
1931 by consulting the rpc_proxy_map in rpc_disconnect.
1932
J. Richard Barnette1d78b012012-05-15 13:56:30 -07001933 @param command Shell command to start the server.
1934 @param port Port number on which the server is expected to
1935 be serving.
J. Richard Barnette7214e0b2013-02-06 15:20:49 -08001936 @param command_name String to use as input to `pkill` to
1937 terminate the XMLRPC server on the host.
Christopher Wileyd78249a2013-03-01 13:05:31 -08001938 @param ready_test_name String containing the name of a
1939 method defined on the XMLRPC server.
1940 @param timeout_seconds Number of seconds to wait
1941 for the server to become 'ready.' Will throw a
1942 TestFail error if server is not ready in time.
Yusuf Mohsinallyfff89d62013-11-18 16:34:07 -08001943 @param logfile Logfile to send output when running
1944 'command' argument.
Yusuf Mohsinally8d19e3c2013-11-21 14:25:45 -08001945
J. Richard Barnette1d78b012012-05-15 13:56:30 -07001946 """
Christopher Wileyc14f06a2013-10-16 13:55:39 -07001947 # Clean up any existing state. If the caller is willing
1948 # to believe their server is down, we ought to clean up
1949 # any tunnels we might have sitting around.
1950 self.rpc_disconnect(port)
J. Richard Barnette1d78b012012-05-15 13:56:30 -07001951 # Start the server on the host. Redirection in the command
1952 # below is necessary, because 'ssh' won't terminate until
1953 # background child processes close stdin, stdout, and
1954 # stderr.
Yusuf Mohsinallyfff89d62013-11-18 16:34:07 -08001955 remote_cmd = '%s </dev/null >%s 2>&1 & echo $!' % (command, logfile)
Christopher Wileydd181852013-10-10 19:56:58 -07001956 remote_pid = self.run(remote_cmd).stdout.rstrip('\n')
J. Richard Barnette1d78b012012-05-15 13:56:30 -07001957 logging.debug('Started XMLRPC server on host %s, pid = %s',
1958 self.hostname, remote_pid)
1959
Christopher Wileydd181852013-10-10 19:56:58 -07001960 # Tunnel through SSH to be able to reach that remote port.
1961 rpc_url = self._setup_rpc(port, command_name, remote_pid=remote_pid)
Christopher Wileyd78249a2013-03-01 13:05:31 -08001962 proxy = xmlrpclib.ServerProxy(rpc_url, allow_none=True)
Christopher Wileydd181852013-10-10 19:56:58 -07001963
Christopher Wileyd78249a2013-03-01 13:05:31 -08001964 if ready_test_name is not None:
J. Richard Barnette13eb7c02013-03-07 12:06:29 -08001965 # retry.retry logs each attempt; calculate delay_sec to
1966 # keep log spam to a dull roar.
Christopher Wiley0ed712b2013-04-09 15:25:12 -07001967 @retry.retry((socket.error,
1968 xmlrpclib.ProtocolError,
1969 httplib.BadStatusLine),
Chris Sosa65425082013-10-16 13:26:22 -07001970 timeout_min=timeout_seconds / 60.0,
1971 delay_sec=min(max(timeout_seconds / 20.0, 0.1), 1))
Christopher Wileyd78249a2013-03-01 13:05:31 -08001972 def ready_test():
1973 """ Call proxy.ready_test_name(). """
1974 getattr(proxy, ready_test_name)()
1975 successful = False
1976 try:
1977 logging.info('Waiting %d seconds for XMLRPC server '
1978 'to start.', timeout_seconds)
1979 ready_test()
1980 successful = True
Christopher Wileyd78249a2013-03-01 13:05:31 -08001981 finally:
1982 if not successful:
1983 logging.error('Failed to start XMLRPC server.')
beeps32a63082013-08-22 14:02:29 -07001984 self.rpc_disconnect(port)
Christopher Wileyd78249a2013-03-01 13:05:31 -08001985 logging.info('XMLRPC server started successfully.')
1986 return proxy
J. Richard Barnette1d78b012012-05-15 13:56:30 -07001987
J. Richard Barnette1d78b012012-05-15 13:56:30 -07001988
Jason Abeleb6f924f2013-11-13 16:01:54 -08001989 def syslog(self, message, tag='autotest'):
1990 """Logs a message to syslog on host.
1991
1992 @param message String message to log into syslog
1993 @param tag String tag prefix for syslog
1994
1995 """
1996 self.run('logger -t "%s" "%s"' % (tag, message))
1997
1998
beeps32a63082013-08-22 14:02:29 -07001999 def jsonrpc_connect(self, port):
2000 """Creates a jsonrpc proxy connection through an ssh tunnel.
2001
2002 This method exists to facilitate communication with goofy (which is
2003 the default system manager on all factory images) and as such, leaves
2004 most of the rpc server sanity checking to the caller. Unlike
2005 xmlrpc_connect, this method does not facilitate the creation of a remote
2006 jsonrpc server, as the only clients of this code are factory tests,
2007 for which the goofy system manager is built in to the image and starts
2008 when the target boots.
2009
2010 One can theoretically create multiple jsonrpc proxies all forwarded
2011 to the same remote port, provided the remote port has an rpc server
2012 listening. However, in doing so we stand the risk of leaking an
2013 existing tunnel process, so we always disconnect any older tunnels
2014 we might have through rpc_disconnect.
2015
2016 @param port: port on the remote host that is serving this proxy.
2017
2018 @return: The client proxy.
2019 """
2020 if not jsonrpclib:
2021 logging.warning('Jsonrpclib could not be imported. Check that '
2022 'site-packages contains jsonrpclib.')
2023 return None
2024
2025 proxy = jsonrpclib.jsonrpc.ServerProxy(self._setup_rpc(port, None))
2026
2027 logging.info('Established a jsonrpc connection through port %s.', port)
2028 return proxy
2029
2030
2031 def rpc_disconnect(self, port):
2032 """Disconnect from an RPC server on the host.
2033
2034 Terminates the remote RPC server previously started for
J. Richard Barnette1d78b012012-05-15 13:56:30 -07002035 the given `port`. Also closes the local ssh tunnel created
2036 for the connection to the host. This function does not
beeps32a63082013-08-22 14:02:29 -07002037 directly alter the state of a previously returned RPC
J. Richard Barnette1d78b012012-05-15 13:56:30 -07002038 client object; however disconnection will cause all
2039 subsequent calls to methods on the object to fail.
2040
2041 This function does nothing if requested to disconnect a port
beeps32a63082013-08-22 14:02:29 -07002042 that was not previously connected via _setup_rpc.
J. Richard Barnette1d78b012012-05-15 13:56:30 -07002043
2044 @param port Port number passed to a previous call to
beeps32a63082013-08-22 14:02:29 -07002045 `_setup_rpc()`.
J. Richard Barnette1d78b012012-05-15 13:56:30 -07002046 """
beeps32a63082013-08-22 14:02:29 -07002047 if port not in self._rpc_proxy_map:
J. Richard Barnette1d78b012012-05-15 13:56:30 -07002048 return
Christopher Wileydd181852013-10-10 19:56:58 -07002049 remote_name, tunnel_proc, remote_pid = self._rpc_proxy_map[port]
J. Richard Barnette1d78b012012-05-15 13:56:30 -07002050 if remote_name:
2051 # We use 'pkill' to find our target process rather than
2052 # a PID, because the host may have rebooted since
2053 # connecting, and we don't want to kill an innocent
2054 # process with the same PID.
2055 #
2056 # 'pkill' helpfully exits with status 1 if no target
2057 # process is found, for which run() will throw an
Simran Basid5e5e272012-09-24 15:23:59 -07002058 # exception. We don't want that, so we the ignore
J. Richard Barnette1d78b012012-05-15 13:56:30 -07002059 # status.
2060 self.run("pkill -f '%s'" % remote_name, ignore_status=True)
Christopher Wileydd181852013-10-10 19:56:58 -07002061 if remote_pid:
2062 logging.info('Waiting for RPC server "%s" shutdown',
2063 remote_name)
2064 start_time = time.time()
2065 while (time.time() - start_time <
2066 self._RPC_SHUTDOWN_TIMEOUT_SECONDS):
2067 running_processes = self.run(
2068 "pgrep -f '%s'" % remote_name,
2069 ignore_status=True).stdout.split()
2070 if not remote_pid in running_processes:
2071 logging.info('Shut down RPC server.')
2072 break
2073 time.sleep(self._RPC_SHUTDOWN_POLLING_PERIOD_SECONDS)
2074 else:
2075 raise error.TestError('Failed to shutdown RPC server %s' %
2076 remote_name)
J. Richard Barnette1d78b012012-05-15 13:56:30 -07002077
2078 if tunnel_proc.poll() is None:
2079 tunnel_proc.terminate()
2080 logging.debug('Terminated tunnel, pid %d', tunnel_proc.pid)
2081 else:
2082 logging.debug('Tunnel pid %d terminated early, status %d',
2083 tunnel_proc.pid, tunnel_proc.returncode)
beeps32a63082013-08-22 14:02:29 -07002084 del self._rpc_proxy_map[port]
J. Richard Barnette1d78b012012-05-15 13:56:30 -07002085
2086
beeps32a63082013-08-22 14:02:29 -07002087 def rpc_disconnect_all(self):
2088 """Disconnect all known RPC proxy ports."""
2089 for port in self._rpc_proxy_map.keys():
2090 self.rpc_disconnect(port)
J. Richard Barnette1d78b012012-05-15 13:56:30 -07002091
2092
Ilja H. Friedel1232e8a2014-06-17 21:30:48 -07002093 def poor_mans_rpc(self, fun):
2094 """
2095 Calls a function from client utils on the host and returns a string.
2096
2097 @param fun function in client utils namespace.
2098 @return output string from calling fun.
2099 """
Simran Basi263a9d32014-08-19 11:16:51 -07002100 script = 'cd %s/bin; ' % autotest.Autotest.get_installed_autodir(self)
Ilja H. Friedel1232e8a2014-06-17 21:30:48 -07002101 script += 'python -c "import common; import utils;'
2102 script += 'print utils.%s"' % fun
2103 return script
2104
2105
J. Richard Barnetteb6de7e32013-02-14 13:28:04 -08002106 def _ping_check_status(self, status):
2107 """Ping the host once, and return whether it has a given status.
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002108
J. Richard Barnetteb6de7e32013-02-14 13:28:04 -08002109 @param status Check the ping status against this value.
2110 @return True iff `status` and the result of ping are the same
2111 (i.e. both True or both False).
2112
2113 """
2114 ping_val = utils.ping(self.hostname, tries=1, deadline=1)
2115 return not (status ^ (ping_val == 0))
2116
2117 def _ping_wait_for_status(self, status, timeout):
2118 """Wait for the host to have a given status (UP or DOWN).
2119
2120 Status is checked by polling. Polling will not last longer
2121 than the number of seconds in `timeout`. The polling
2122 interval will be long enough that only approximately
2123 _PING_WAIT_COUNT polling cycles will be executed, subject
2124 to a maximum interval of about one minute.
2125
2126 @param status Waiting will stop immediately if `ping` of the
2127 host returns this status.
2128 @param timeout Poll for at most this many seconds.
2129 @return True iff the host status from `ping` matched the
2130 requested status at the time of return.
2131
2132 """
2133 # _ping_check_status() takes about 1 second, hence the
2134 # "- 1" in the formula below.
2135 poll_interval = min(int(timeout / self._PING_WAIT_COUNT), 60) - 1
2136 end_time = time.time() + timeout
2137 while time.time() <= end_time:
2138 if self._ping_check_status(status):
2139 return True
2140 if poll_interval > 0:
2141 time.sleep(poll_interval)
2142
2143 # The last thing we did was sleep(poll_interval), so it may
2144 # have been too long since the last `ping`. Check one more
2145 # time, just to be sure.
2146 return self._ping_check_status(status)
2147
2148 def ping_wait_up(self, timeout):
2149 """Wait for the host to respond to `ping`.
2150
2151 N.B. This method is not a reliable substitute for
2152 `wait_up()`, because a host that responds to ping will not
2153 necessarily respond to ssh. This method should only be used
2154 if the target DUT can be considered functional even if it
2155 can't be reached via ssh.
2156
2157 @param timeout Minimum time to allow before declaring the
2158 host to be non-responsive.
2159 @return True iff the host answered to ping before the timeout.
2160
2161 """
2162 return self._ping_wait_for_status(self._PING_STATUS_UP, timeout)
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002163
Andrew Bresticker678c0c72013-01-22 10:44:09 -08002164 def ping_wait_down(self, timeout):
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002165 """Wait until the host no longer responds to `ping`.
2166
J. Richard Barnetteb6de7e32013-02-14 13:28:04 -08002167 This function can be used as a slightly faster version of
2168 `wait_down()`, by avoiding potentially long ssh timeouts.
2169
2170 @param timeout Minimum time to allow for the host to become
2171 non-responsive.
2172 @return True iff the host quit answering ping before the
2173 timeout.
2174
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002175 """
J. Richard Barnetteb6de7e32013-02-14 13:28:04 -08002176 return self._ping_wait_for_status(self._PING_STATUS_DOWN, timeout)
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002177
Tom Wai-Hong Tamfced4f62014-04-17 10:56:30 +08002178 def test_wait_for_sleep(self, sleep_timeout=None):
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002179 """Wait for the client to enter low-power sleep mode.
2180
2181 The test for "is asleep" can't distinguish a system that is
2182 powered off; to confirm that the unit was asleep, it is
2183 necessary to force resume, and then call
2184 `test_wait_for_resume()`.
2185
2186 This function is expected to be called from a test as part
2187 of a sequence like the following:
2188
2189 ~~~~~~~~
2190 boot_id = host.get_boot_id()
2191 # trigger sleep on the host
2192 host.test_wait_for_sleep()
2193 # trigger resume on the host
2194 host.test_wait_for_resume(boot_id)
2195 ~~~~~~~~
2196
Tom Wai-Hong Tamfced4f62014-04-17 10:56:30 +08002197 @param sleep_timeout time limit in seconds to allow the host sleep.
2198
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002199 @exception TestFail The host did not go to sleep within
2200 the allowed time.
2201 """
Tom Wai-Hong Tamfced4f62014-04-17 10:56:30 +08002202 if sleep_timeout is None:
2203 sleep_timeout = self.SLEEP_TIMEOUT
2204
2205 if not self.ping_wait_down(timeout=sleep_timeout):
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002206 raise error.TestFail(
Tom Wai-Hong Tamfced4f62014-04-17 10:56:30 +08002207 'client failed to sleep after %d seconds' % sleep_timeout)
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002208
2209
Tom Wai-Hong Tamfced4f62014-04-17 10:56:30 +08002210 def test_wait_for_resume(self, old_boot_id, resume_timeout=None):
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002211 """Wait for the client to resume from low-power sleep mode.
2212
2213 The `old_boot_id` parameter should be the value from
2214 `get_boot_id()` obtained prior to entering sleep mode. A
2215 `TestFail` exception is raised if the boot id changes.
2216
2217 See @ref test_wait_for_sleep for more on this function's
2218 usage.
2219
J. Richard Barnette7214e0b2013-02-06 15:20:49 -08002220 @param old_boot_id A boot id value obtained before the
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002221 target host went to sleep.
Tom Wai-Hong Tamfced4f62014-04-17 10:56:30 +08002222 @param resume_timeout time limit in seconds to allow the host up.
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002223
2224 @exception TestFail The host did not respond within the
2225 allowed time.
2226 @exception TestFail The host responded, but the boot id test
2227 indicated a reboot rather than a sleep
2228 cycle.
2229 """
Tom Wai-Hong Tamfced4f62014-04-17 10:56:30 +08002230 if resume_timeout is None:
2231 resume_timeout = self.RESUME_TIMEOUT
2232
2233 if not self.wait_up(timeout=resume_timeout):
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002234 raise error.TestFail(
2235 'client failed to resume from sleep after %d seconds' %
Tom Wai-Hong Tamfced4f62014-04-17 10:56:30 +08002236 resume_timeout)
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002237 else:
2238 new_boot_id = self.get_boot_id()
2239 if new_boot_id != old_boot_id:
Tom Wai-Hong Tam01792682015-01-06 08:00:46 +08002240 logging.error('client rebooted (old boot %s, new boot %s)',
2241 old_boot_id, new_boot_id)
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002242 raise error.TestFail(
Tom Wai-Hong Tam01792682015-01-06 08:00:46 +08002243 'client rebooted, but sleep was expected')
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002244
2245
Tom Wai-Hong Tamfe005c22014-12-03 09:25:44 +08002246 def test_wait_for_shutdown(self, shutdown_timeout=None):
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002247 """Wait for the client to shut down.
2248
2249 The test for "has shut down" can't distinguish a system that
2250 is merely asleep; to confirm that the unit was down, it is
2251 necessary to force boot, and then call test_wait_for_boot().
2252
2253 This function is expected to be called from a test as part
2254 of a sequence like the following:
2255
2256 ~~~~~~~~
2257 boot_id = host.get_boot_id()
2258 # trigger shutdown on the host
2259 host.test_wait_for_shutdown()
2260 # trigger boot on the host
2261 host.test_wait_for_boot(boot_id)
2262 ~~~~~~~~
2263
Tom Wai-Hong Tamfe005c22014-12-03 09:25:44 +08002264 @param shutdown_timeout time limit in seconds to allow the host down.
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002265 @exception TestFail The host did not shut down within the
2266 allowed time.
2267 """
Tom Wai-Hong Tamfe005c22014-12-03 09:25:44 +08002268 if shutdown_timeout is None:
2269 shutdown_timeout = self.SHUTDOWN_TIMEOUT
2270
2271 if not self.ping_wait_down(timeout=shutdown_timeout):
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002272 raise error.TestFail(
2273 'client failed to shut down after %d seconds' %
Tom Wai-Hong Tamfe005c22014-12-03 09:25:44 +08002274 shutdown_timeout)
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002275
2276
2277 def test_wait_for_boot(self, old_boot_id=None):
2278 """Wait for the client to boot from cold power.
2279
2280 The `old_boot_id` parameter should be the value from
2281 `get_boot_id()` obtained prior to shutting down. A
2282 `TestFail` exception is raised if the boot id does not
2283 change. The boot id test is omitted if `old_boot_id` is not
2284 specified.
2285
2286 See @ref test_wait_for_shutdown for more on this function's
2287 usage.
2288
J. Richard Barnette7214e0b2013-02-06 15:20:49 -08002289 @param old_boot_id A boot id value obtained before the
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002290 shut down.
2291
2292 @exception TestFail The host did not respond within the
2293 allowed time.
2294 @exception TestFail The host responded, but the boot id test
2295 indicated that there was no reboot.
2296 """
J. Richard Barnetteeb69d722012-06-18 17:29:44 -07002297 if not self.wait_up(timeout=self.REBOOT_TIMEOUT):
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002298 raise error.TestFail(
2299 'client failed to reboot after %d seconds' %
J. Richard Barnetteeb69d722012-06-18 17:29:44 -07002300 self.REBOOT_TIMEOUT)
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002301 elif old_boot_id:
2302 if self.get_boot_id() == old_boot_id:
Tom Wai-Hong Tam01792682015-01-06 08:00:46 +08002303 logging.error('client not rebooted (boot %s)',
2304 old_boot_id)
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002305 raise error.TestFail(
Tom Wai-Hong Tam01792682015-01-06 08:00:46 +08002306 'client is back up, but did not reboot')
Simran Basid5e5e272012-09-24 15:23:59 -07002307
2308
2309 @staticmethod
2310 def check_for_rpm_support(hostname):
2311 """For a given hostname, return whether or not it is powered by an RPM.
2312
Simran Basi1df55112013-09-06 11:25:09 -07002313 @param hostname: hostname to check for rpm support.
2314
Simran Basid5e5e272012-09-24 15:23:59 -07002315 @return None if this host does not follows the defined naming format
2316 for RPM powered DUT's in the lab. If it does follow the format,
2317 it returns a regular expression MatchObject instead.
2318 """
Fang Dengbaff9082015-01-06 13:46:15 -08002319 return re.match(CrosHost._RPM_HOSTNAME_REGEX, hostname)
Simran Basid5e5e272012-09-24 15:23:59 -07002320
2321
2322 def has_power(self):
2323 """For this host, return whether or not it is powered by an RPM.
2324
2325 @return True if this host is in the CROS lab and follows the defined
2326 naming format.
2327 """
Fang Deng0ca40e22013-08-27 17:47:44 -07002328 return CrosHost.check_for_rpm_support(self.hostname)
Simran Basid5e5e272012-09-24 15:23:59 -07002329
2330
Ismail Noorbasha07fdb612013-02-14 14:13:31 -08002331 def _set_power(self, state, power_method):
2332 """Sets the power to the host via RPM, Servo or manual.
2333
2334 @param state Specifies which power state to set to DUT
2335 @param power_method Specifies which method of power control to
2336 use. By default "RPM" will be used. Valid values
2337 are the strings "RPM", "manual", "servoj10".
2338
2339 """
2340 ACCEPTABLE_STATES = ['ON', 'OFF']
2341
2342 if state.upper() not in ACCEPTABLE_STATES:
2343 raise error.TestError('State must be one of: %s.'
2344 % (ACCEPTABLE_STATES,))
2345
2346 if power_method == self.POWER_CONTROL_SERVO:
2347 logging.info('Setting servo port J10 to %s', state)
2348 self.servo.set('prtctl3_pwren', state.lower())
2349 time.sleep(self._USB_POWER_TIMEOUT)
2350 elif power_method == self.POWER_CONTROL_MANUAL:
2351 logging.info('You have %d seconds to set the AC power to %s.',
2352 self._POWER_CYCLE_TIMEOUT, state)
2353 time.sleep(self._POWER_CYCLE_TIMEOUT)
2354 else:
2355 if not self.has_power():
2356 raise error.TestFail('DUT does not have RPM connected.')
Simran Basi5e6339a2013-03-21 11:34:32 -07002357 afe = frontend_wrappers.RetryingAFE(timeout_min=5, delay_sec=10)
2358 afe.set_host_attribute(self._RPM_OUTLET_CHANGED, True,
2359 hostname=self.hostname)
Simran Basi1df55112013-09-06 11:25:09 -07002360 rpm_client.set_power(self.hostname, state.upper(), timeout_mins=5)
Simran Basid5e5e272012-09-24 15:23:59 -07002361
2362
Ismail Noorbasha07fdb612013-02-14 14:13:31 -08002363 def power_off(self, power_method=POWER_CONTROL_RPM):
2364 """Turn off power to this host via RPM, Servo or manual.
2365
2366 @param power_method Specifies which method of power control to
2367 use. By default "RPM" will be used. Valid values
2368 are the strings "RPM", "manual", "servoj10".
2369
2370 """
2371 self._set_power('OFF', power_method)
Simran Basid5e5e272012-09-24 15:23:59 -07002372
2373
Ismail Noorbasha07fdb612013-02-14 14:13:31 -08002374 def power_on(self, power_method=POWER_CONTROL_RPM):
2375 """Turn on power to this host via RPM, Servo or manual.
2376
2377 @param power_method Specifies which method of power control to
2378 use. By default "RPM" will be used. Valid values
2379 are the strings "RPM", "manual", "servoj10".
2380
2381 """
2382 self._set_power('ON', power_method)
2383
2384
2385 def power_cycle(self, power_method=POWER_CONTROL_RPM):
2386 """Cycle power to this host by turning it OFF, then ON.
2387
2388 @param power_method Specifies which method of power control to
2389 use. By default "RPM" will be used. Valid values
2390 are the strings "RPM", "manual", "servoj10".
2391
2392 """
2393 if power_method in (self.POWER_CONTROL_SERVO,
2394 self.POWER_CONTROL_MANUAL):
2395 self.power_off(power_method=power_method)
2396 time.sleep(self._POWER_CYCLE_TIMEOUT)
2397 self.power_on(power_method=power_method)
2398 else:
2399 rpm_client.set_power(self.hostname, 'CYCLE')
Simran Basic6f1f7a2012-10-16 10:47:46 -07002400
2401
2402 def get_platform(self):
2403 """Determine the correct platform label for this host.
2404
2405 @returns a string representing this host's platform.
2406 """
2407 crossystem = utils.Crossystem(self)
2408 crossystem.init()
2409 # Extract fwid value and use the leading part as the platform id.
2410 # fwid generally follow the format of {platform}.{firmware version}
2411 # Example: Alex.X.YYY.Z or Google_Alex.X.YYY.Z
2412 platform = crossystem.fwid().split('.')[0].lower()
2413 # Newer platforms start with 'Google_' while the older ones do not.
2414 return platform.replace('google_', '')
2415
2416
Hung-ying Tyanb1328032014-04-01 14:18:54 +08002417 def get_architecture(self):
2418 """Determine the correct architecture label for this host.
2419
2420 @returns a string representing this host's architecture.
2421 """
2422 crossystem = utils.Crossystem(self)
2423 crossystem.init()
2424 return crossystem.arch()
2425
2426
Luis Lozano40b7d0d2014-01-17 15:12:06 -08002427 def get_chrome_version(self):
2428 """Gets the Chrome version number and milestone as strings.
2429
2430 Invokes "chrome --version" to get the version number and milestone.
2431
2432 @return A tuple (chrome_ver, milestone) where "chrome_ver" is the
2433 current Chrome version number as a string (in the form "W.X.Y.Z")
2434 and "milestone" is the first component of the version number
2435 (the "W" from "W.X.Y.Z"). If the version number cannot be parsed
2436 in the "W.X.Y.Z" format, the "chrome_ver" will be the full output
2437 of "chrome --version" and the milestone will be the empty string.
2438
2439 """
MK Ryu35d661e2014-09-25 17:44:10 -07002440 version_string = self.run(client_constants.CHROME_VERSION_COMMAND).stdout
Luis Lozano40b7d0d2014-01-17 15:12:06 -08002441 return utils.parse_chrome_version(version_string)
2442
Aviv Keshet74c89a92013-02-04 15:18:30 -08002443 @label_decorator()
Simran Basic6f1f7a2012-10-16 10:47:46 -07002444 def get_board(self):
2445 """Determine the correct board label for this host.
2446
2447 @returns a string representing this host's board.
2448 """
2449 release_info = utils.parse_cmd_output('cat /etc/lsb-release',
2450 run_method=self.run)
2451 board = release_info['CHROMEOS_RELEASE_BOARD']
2452 # Devices in the lab generally have the correct board name but our own
2453 # development devices have {board_name}-signed-{key_type}. The board
2454 # name may also begin with 'x86-' which we need to keep.
Simran Basi833814b2013-01-29 13:13:43 -08002455 board_format_string = ds_constants.BOARD_PREFIX + '%s'
Simran Basic6f1f7a2012-10-16 10:47:46 -07002456 if 'x86' not in board:
Simran Basi833814b2013-01-29 13:13:43 -08002457 return board_format_string % board.split('-')[0]
2458 return board_format_string % '-'.join(board.split('-')[0:2])
Simran Basic6f1f7a2012-10-16 10:47:46 -07002459
2460
Ilja H. Friedel1232e8a2014-06-17 21:30:48 -07002461 @label_decorator('board_freq_mem')
2462 def get_board_with_frequency_and_memory(self):
2463 """
2464 Determines the board name with frequency and memory.
2465
2466 @returns a more detailed string representing the board. Examples are
2467 butterfly_1.1GHz_2GB, link_1.8GHz_4GB, x86-zgb_1.7GHz_2GB
2468 """
2469 board = self.run(self.poor_mans_rpc(
2470 'get_board_with_frequency_and_memory()')).stdout
2471 return 'board_freq_mem:%s' % str.strip(board)
2472
2473
Aviv Keshet74c89a92013-02-04 15:18:30 -08002474 @label_decorator('lightsensor')
Simran Basic6f1f7a2012-10-16 10:47:46 -07002475 def has_lightsensor(self):
2476 """Determine the correct board label for this host.
2477
2478 @returns the string 'lightsensor' if this host has a lightsensor or
2479 None if it does not.
2480 """
2481 search_cmd = "find -L %s -maxdepth 4 | egrep '%s'" % (
Richard Barnette82c35912012-11-20 10:09:10 -08002482 self._LIGHTSENSOR_SEARCH_DIR, '|'.join(self._LIGHTSENSOR_FILES))
Simran Basic6f1f7a2012-10-16 10:47:46 -07002483 try:
2484 # Run the search cmd following the symlinks. Stderr_tee is set to
2485 # None as there can be a symlink loop, but the command will still
2486 # execute correctly with a few messages printed to stderr.
2487 self.run(search_cmd, stdout_tee=None, stderr_tee=None)
2488 return 'lightsensor'
2489 except error.AutoservRunError:
2490 # egrep exited with a return code of 1 meaning none of the possible
2491 # lightsensor files existed.
2492 return None
2493
2494
Aviv Keshet74c89a92013-02-04 15:18:30 -08002495 @label_decorator('bluetooth')
Simran Basic6f1f7a2012-10-16 10:47:46 -07002496 def has_bluetooth(self):
2497 """Determine the correct board label for this host.
2498
2499 @returns the string 'bluetooth' if this host has bluetooth or
2500 None if it does not.
2501 """
2502 try:
2503 self.run('test -d /sys/class/bluetooth/hci0')
2504 # test exited with a return code of 0.
2505 return 'bluetooth'
2506 except error.AutoservRunError:
2507 # test exited with a return code 1 meaning the directory did not
2508 # exist.
2509 return None
2510
2511
Ilja H. Friedel1232e8a2014-06-17 21:30:48 -07002512 @label_decorator('gpu_family')
2513 def get_gpu_family(self):
2514 """
2515 Determine GPU family.
2516
2517 @returns a string representing the gpu family. Examples are mali, tegra,
2518 pinetrail, sandybridge, ivybridge, haswell and baytrail.
2519 """
2520 gpu_family = self.run(self.poor_mans_rpc('get_gpu_family()')).stdout
2521 return 'gpu_family:%s' % str.strip(gpu_family)
2522
2523
Ilja Friedel0ce0b602013-08-15 18:45:27 -07002524 @label_decorator('graphics')
2525 def get_graphics(self):
2526 """
2527 Determine the correct board label for this host.
2528
2529 @returns a string representing this host's graphics. For now ARM boards
2530 return graphics:gles while all other boards return graphics:gl. This
2531 may change over time, but for robustness reasons this should avoid
2532 executing code in actual graphics libraries (which may not be ready and
2533 is tested by graphics_GLAPICheck).
2534 """
2535 uname = self.run('uname -a').stdout.lower()
2536 if 'arm' in uname:
2537 return 'graphics:gles'
2538 return 'graphics:gl'
2539
2540
Bill Richardson4f595f52014-02-13 16:20:26 -08002541 @label_decorator('ec')
2542 def get_ec(self):
2543 """
2544 Determine the type of EC on this host.
2545
2546 @returns a string representing this host's embedded controller type.
2547 At present, it only returns "ec:cros", for Chrome OS ECs. Other types
2548 of EC (or none) don't return any strings, since no tests depend on
2549 those.
2550 """
2551 cmd = 'mosys ec info'
2552 # The output should look like these, so that the last field should
2553 # match our EC version scheme:
2554 #
2555 # stm | stm32f100 | snow_v1.3.139-375eb9f
2556 # ti | Unknown-10de | peppy_v1.5.114-5d52788
2557 #
2558 # Non-Chrome OS ECs will look like these:
2559 #
2560 # ENE | KB932 | 00BE107A00
2561 # ite | it8518 | 3.08
2562 #
2563 # And some systems don't have ECs at all (Lumpy, for example).
2564 regexp = r'^.*\|\s*(\S+_v\d+\.\d+\.\d+-[0-9a-f]+)\s*$'
2565
2566 ecinfo = self.run(command=cmd, ignore_status=True)
2567 if ecinfo.exit_status == 0:
2568 res = re.search(regexp, ecinfo.stdout)
2569 if res:
2570 logging.info("EC version is %s", res.groups()[0])
2571 return 'ec:cros'
2572 logging.info("%s got: %s", cmd, ecinfo.stdout)
2573 # Has an EC, but it's not a Chrome OS EC
2574 return None
2575 logging.info("%s exited with status %d", cmd, ecinfo.exit_status)
2576 # No EC present
2577 return None
2578
2579
Alec Berg31b932b2014-04-04 16:09:11 -07002580 @label_decorator('accels')
2581 def get_accels(self):
2582 """
2583 Determine the type of accelerometers on this host.
2584
2585 @returns a string representing this host's accelerometer type.
2586 At present, it only returns "accel:cros-ec", for accelerometers
2587 attached to a Chrome OS EC, or none, if no accelerometers.
2588 """
2589 # Check to make sure we have ectool
2590 rv = self.run('which ectool', ignore_status=True)
2591 if rv.exit_status:
2592 logging.info("No ectool cmd found, assuming no EC accelerometers")
2593 return None
2594
2595 # Check that the EC supports the motionsense command
2596 rv = self.run('ectool motionsense', ignore_status=True)
2597 if rv.exit_status:
2598 logging.info("EC does not support motionsense command "
2599 "assuming no EC accelerometers")
2600 return None
2601
2602 # Check that EC motion sensors are active
2603 active = self.run('ectool motionsense active').stdout.split('\n')
2604 if active[0] == "0":
2605 logging.info("Motion sense inactive, assuming no EC accelerometers")
2606 return None
2607
2608 logging.info("EC accelerometers found")
2609 return 'accel:cros-ec'
2610
2611
Tom Wai-Hong Tam3d6790d2014-04-14 16:15:47 +08002612 @label_decorator('chameleon')
2613 def has_chameleon(self):
2614 """Determine if a Chameleon connected to this host.
2615
Tom Wai-Hong Tambadbb332014-10-10 02:59:41 +08002616 @returns a list containing two strings ('chameleon' and
2617 'chameleon:' + label, e.g. 'chameleon:hdmi') if this host
2618 has a Chameleon or None if it has not.
Tom Wai-Hong Tam3d6790d2014-04-14 16:15:47 +08002619 """
2620 if self._chameleon_host:
Tom Wai-Hong Tambadbb332014-10-10 02:59:41 +08002621 return ['chameleon', 'chameleon:' + self.chameleon.get_label()]
Tom Wai-Hong Tam3d6790d2014-04-14 16:15:47 +08002622 else:
2623 return None
2624
2625
Cheng-Yi Chiangf4104ff2014-12-23 19:39:01 +08002626 @label_decorator('audio_loopback_dongle')
2627 def has_loopback_dongle(self):
2628 """Determine if an audio loopback dongle is plugged to this host.
2629
2630 @returns 'audio_loopback_dongle' when there is an audio loopback dongle
2631 plugged to this host.
2632 None when there is no audio loopback dongle
2633 plugged to this host.
2634 """
Cheng-Yi Chiang8de78112015-05-27 14:47:08 +08002635 nodes_info = self.run(command=cras_utils.get_cras_nodes_cmd(),
2636 ignore_status=True).stdout
2637 if (cras_utils.node_type_is_plugged('HEADPHONE', nodes_info) and
2638 cras_utils.node_type_is_plugged('MIC', nodes_info)):
Cheng-Yi Chiangf4104ff2014-12-23 19:39:01 +08002639 return 'audio_loopback_dongle'
2640 else:
2641 return None
2642
2643
Derek Basehorec71ff622014-07-07 15:18:40 -07002644 @label_decorator('power_supply')
2645 def get_power_supply(self):
2646 """
2647 Determine what type of power supply the host has
2648
2649 @returns a string representing this host's power supply.
2650 'power:battery' when the device has a battery intended for
2651 extended use
2652 'power:AC_primary' when the device has a battery not intended
2653 for extended use (for moving the machine, etc)
2654 'power:AC_only' when the device has no battery at all.
2655 """
2656 psu = self.run(command='mosys psu type', ignore_status=True)
2657 if psu.exit_status:
2658 # The psu command for mosys is not included for all platforms. The
2659 # assumption is that the device will have a battery if the command
2660 # is not found.
2661 return 'power:battery'
2662
2663 psu_str = psu.stdout.strip()
2664 if psu_str == 'unknown':
2665 return None
2666
2667 return 'power:%s' % psu_str
2668
2669
Puthikorn Voravootivatfa011242014-03-14 18:45:11 -07002670 @label_decorator('storage')
2671 def get_storage(self):
2672 """
2673 Determine the type of boot device for this host.
2674
2675 Determine if the internal device is SCSI or dw_mmc device.
2676 Then check that it is SSD or HDD or eMMC or something else.
2677
2678 @returns a string representing this host's internal device type.
2679 'storage:ssd' when internal device is solid state drive
2680 'storage:hdd' when internal device is hard disk drive
2681 'storage:mmc' when internal device is mmc drive
2682 None When internal device is something else or
2683 when we are unable to determine the type
2684 """
2685 # The output should be /dev/mmcblk* for SD/eMMC or /dev/sd* for scsi
2686 rootdev_cmd = ' '.join(['. /usr/sbin/write_gpt.sh;',
2687 '. /usr/share/misc/chromeos-common.sh;',
2688 'load_base_vars;',
2689 'get_fixed_dst_drive'])
Puthikorn Voravootivat03c51682014-04-24 13:52:12 -07002690 rootdev = self.run(command=rootdev_cmd, ignore_status=True)
2691 if rootdev.exit_status:
2692 logging.info("Fail to run %s", rootdev_cmd)
2693 return None
Puthikorn Voravootivatfa011242014-03-14 18:45:11 -07002694 rootdev_str = rootdev.stdout.strip()
2695
2696 if not rootdev_str:
2697 return None
2698
2699 rootdev_base = os.path.basename(rootdev_str)
2700
2701 mmc_pattern = '/dev/mmcblk[0-9]'
2702 if re.match(mmc_pattern, rootdev_str):
2703 # Use type to determine if the internal device is eMMC or somthing
2704 # else. We can assume that MMC is always an internal device.
2705 type_cmd = 'cat /sys/block/%s/device/type' % rootdev_base
Puthikorn Voravootivat03c51682014-04-24 13:52:12 -07002706 type = self.run(command=type_cmd, ignore_status=True)
2707 if type.exit_status:
2708 logging.info("Fail to run %s", type_cmd)
2709 return None
Puthikorn Voravootivatfa011242014-03-14 18:45:11 -07002710 type_str = type.stdout.strip()
2711
2712 if type_str == 'MMC':
2713 return 'storage:mmc'
2714
2715 scsi_pattern = '/dev/sd[a-z]+'
2716 if re.match(scsi_pattern, rootdev.stdout):
2717 # Read symlink for /sys/block/sd* to determine if the internal
2718 # device is connected via ata or usb.
2719 link_cmd = 'readlink /sys/block/%s' % rootdev_base
Puthikorn Voravootivat03c51682014-04-24 13:52:12 -07002720 link = self.run(command=link_cmd, ignore_status=True)
2721 if link.exit_status:
2722 logging.info("Fail to run %s", link_cmd)
2723 return None
Puthikorn Voravootivatfa011242014-03-14 18:45:11 -07002724 link_str = link.stdout.strip()
2725 if 'usb' in link_str:
2726 return None
2727
2728 # Read rotation to determine if the internal device is ssd or hdd.
2729 rotate_cmd = str('cat /sys/block/%s/queue/rotational'
2730 % rootdev_base)
Puthikorn Voravootivat03c51682014-04-24 13:52:12 -07002731 rotate = self.run(command=rotate_cmd, ignore_status=True)
2732 if rotate.exit_status:
2733 logging.info("Fail to run %s", rotate_cmd)
2734 return None
Puthikorn Voravootivatfa011242014-03-14 18:45:11 -07002735 rotate_str = rotate.stdout.strip()
2736
2737 rotate_dict = {'0':'storage:ssd', '1':'storage:hdd'}
2738 return rotate_dict.get(rotate_str)
2739
2740 # All other internal device / error case will always fall here
2741 return None
2742
2743
Dan Shi4e9a2aa2014-03-24 14:28:42 -07002744 @label_decorator('servo')
2745 def get_servo(self):
2746 """Determine if the host has a servo attached.
2747
2748 If the host has a working servo attached, it should have a servo label.
2749
2750 @return: string 'servo' if the host has servo attached. Otherwise,
2751 returns None.
2752 """
2753 return 'servo' if self._servo_host else None
2754
2755
Dan Shi5beba472014-05-28 22:46:07 -07002756 @label_decorator('video_labels')
2757 def get_video_labels(self):
2758 """Run /usr/local/bin/avtest_label_detect to get a list of video labels.
2759
2760 Sample output of avtest_label_detect:
2761 Detected label: hw_video_acc_vp8
2762 Detected label: webcam
2763
2764 @return: A list of labels detected by tool avtest_label_detect.
2765 """
2766 try:
2767 result = self.run('/usr/local/bin/avtest_label_detect').stdout
2768 return re.findall('^Detected label: (\w+)$', result, re.M)
2769 except error.AutoservRunError:
2770 # The tool is not installed.
2771 return []
2772
2773
mussa584b4462014-06-20 15:13:28 -07002774 @label_decorator('video_glitch_detection')
2775 def is_video_glitch_detection_supported(self):
2776 """ Determine if a board under test is supported for video glitch
2777 detection tests.
2778
2779 @return: 'video_glitch_detection' if board is supported, None otherwise.
2780 """
2781 parser = ConfigParser.SafeConfigParser()
2782 filename = os.path.join(
2783 common.autotest_dir, 'client/cros/video/device_spec.conf')
2784
2785 dut = self.get_board().replace(ds_constants.BOARD_PREFIX, '')
2786
2787 try:
2788 parser.read(filename)
mussa584b4462014-06-20 15:13:28 -07002789 supported_boards = parser.sections()
2790
Mussa83c84d62014-10-02 12:11:28 -07002791 return 'video_glitch_detection' if dut in supported_boards else None
mussa584b4462014-06-20 15:13:28 -07002792
2793 except ConfigParser.error:
2794 # something went wrong while parsing the conf file
2795 return None
2796
Katherine Threlkeld7b97a9f2014-06-24 13:47:14 -07002797 @label_decorator('touch_labels')
2798 def get_touch(self):
2799 """
2800 Determine whether board under test has a touchpad or touchscreen.
2801
2802 @return: A list of some combination of 'touchscreen' and 'touchpad',
2803 depending on what is present on the device.
Katherine Threlkeldab83d392015-06-18 16:45:57 -07002804
Katherine Threlkeld7b97a9f2014-06-24 13:47:14 -07002805 """
2806 labels = []
Katherine Threlkeldab83d392015-06-18 16:45:57 -07002807 looking_for = ['touchpad', 'touchscreen']
2808 player = input_playback.InputPlayback()
2809 input_events = self.run('ls /dev/input/event*').stdout.strip().split()
2810 filename = '/tmp/touch_labels'
2811 for event in input_events:
2812 self.run('evtest %s > %s' % (event, filename), timeout=1,
2813 ignore_timeout=True)
2814 properties = self.run('cat %s' % filename).stdout
2815 input_type = player._determine_input_type(properties)
2816 if input_type in looking_for:
2817 labels.append(input_type)
2818 looking_for.remove(input_type)
2819 if len(looking_for) == 0:
2820 break
2821 self.run('rm %s' % filename)
2822
Katherine Threlkeld7b97a9f2014-06-24 13:47:14 -07002823 return labels
2824
Hung-ying Tyana39b0542015-06-30 10:36:42 +08002825
2826 @label_decorator('internal_display')
2827 def has_internal_display(self):
2828 """Determine if the device under test is equipped with an internal
2829 display.
2830
2831 @return: 'internal_display' if one is present; None otherwise.
2832 """
2833 from autotest_lib.client.cros.graphics import graphics_utils
2834 from autotest_lib.client.common_lib import utils as common_utils
2835
2836 def __system_output(cmd):
2837 return self.run(cmd).stdout
2838
2839 def __read_file(remote_path):
2840 return self.run('cat %s' % remote_path).stdout
2841
2842 # Hijack the necessary client functions so that we can take advantage
2843 # of the client lib here.
2844 # FIXME: find a less hacky way than this
2845 original_system_output = utils.system_output
2846 original_read_file = common_utils.read_file
2847 utils.system_output = __system_output
2848 common_utils.read_file = __read_file
2849 try:
2850 return ('internal_display' if graphics_utils.has_internal_display()
2851 else None)
2852 finally:
2853 utils.system_output = original_system_output
2854 common_utils.read_file = original_read_file
2855
2856
Eric Carusoee673ac2015-08-05 17:03:04 -07002857 @label_decorator('lucidsleep')
2858 def has_lucid_sleep_support(self):
2859 """Determine if the device under test has support for lucid sleep.
2860
2861 @return 'lucidsleep' if this board supports lucid sleep; None otherwise
2862 """
2863 board = self.get_board().replace(ds_constants.BOARD_PREFIX, '')
2864 return 'lucidsleep' if board in LUCID_SLEEP_BOARDS else None
2865
2866
Simran Basic6f1f7a2012-10-16 10:47:46 -07002867 def get_labels(self):
2868 """Return a list of labels for this given host.
2869
2870 This is the main way to retrieve all the automatic labels for a host
2871 as it will run through all the currently implemented label functions.
2872 """
2873 labels = []
Richard Barnette82c35912012-11-20 10:09:10 -08002874 for label_function in self._LABEL_FUNCTIONS:
J. Richard Barnetteb869b222014-09-03 17:55:44 -07002875 try:
2876 label = label_function(self)
2877 except Exception as e:
2878 logging.error('Label function %s failed; ignoring it.',
2879 label_function.__name__)
2880 logging.exception(e)
2881 label = None
Simran Basic6f1f7a2012-10-16 10:47:46 -07002882 if label:
Dan Shi5beba472014-05-28 22:46:07 -07002883 if type(label) is str:
2884 labels.append(label)
2885 elif type(label) is list:
2886 labels.extend(label)
Simran Basic6f1f7a2012-10-16 10:47:46 -07002887 return labels
Dan Shi85276d42014-04-08 22:11:45 -07002888
2889
2890 def is_boot_from_usb(self):
2891 """Check if DUT is boot from USB.
2892
2893 @return: True if DUT is boot from usb.
2894 """
2895 device = self.run('rootdev -s -d').stdout.strip()
2896 removable = int(self.run('cat /sys/block/%s/removable' %
2897 os.path.basename(device)).stdout.strip())
2898 return removable == 1
Helen Zhang17dae2b2014-11-11 09:25:52 -08002899
2900
2901 def read_from_meminfo(self, key):
Dan Shi49ca0932014-11-14 11:22:27 -08002902 """Return the memory info from /proc/meminfo
Helen Zhang17dae2b2014-11-11 09:25:52 -08002903
2904 @param key: meminfo requested
2905
2906 @return the memory value as a string
2907
2908 """
Helen Zhang17dae2b2014-11-11 09:25:52 -08002909 meminfo = self.run('grep %s /proc/meminfo' % key).stdout.strip()
2910 logging.debug('%s', meminfo)
2911 return int(re.search(r'\d+', meminfo).group(0))
Rohit Makasana8a4923c2015-08-13 17:04:26 -07002912
2913
2914 def get_board_type(self):
2915 """
2916 Get the DUT's device type from /etc/lsb-release.
Danny Chan471a8d12015-08-18 14:57:41 -07002917 DEVICETYPE can be one of CHROMEBOX, CHROMEBASE, CHROMEBOOK or more.
2918
2919 @return value of DEVICETYPE param from lsb-release.
Rohit Makasana8a4923c2015-08-13 17:04:26 -07002920 """
Danny Chan471a8d12015-08-18 14:57:41 -07002921 device_type = self.run('grep DEVICETYPE /etc/lsb-release',
2922 ignore_status=True).stdout
2923 if device_type:
Kalin Stoyanov524310b2015-08-21 16:24:04 -07002924 return device_type.split('=')[-1].strip()
Danny Chan471a8d12015-08-18 14:57:41 -07002925 return ''