blob: d8148f8a134dac267e519cb6c66a1ddddf4ef5a6 [file] [log] [blame]
J. Richard Barnette24adbf42012-04-11 15:04:53 -07001# Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
Dale Curtisaa5eedb2011-08-23 16:18:52 -07002# Use of this source code is governed by a BSD-style license that can be
3# found in the LICENSE file.
4
mussa584b4462014-06-20 15:13:28 -07005import ConfigParser
Aviv Keshet74c89a92013-02-04 15:18:30 -08006import functools
Christopher Wiley0ed712b2013-04-09 15:25:12 -07007import httplib
Darren Krahn495b0982015-09-21 19:12:51 -07008import json
J. Richard Barnette1d78b012012-05-15 13:56:30 -07009import logging
Dan Shi0f466e82013-02-22 15:44:58 -080010import os
Simran Basid5e5e272012-09-24 15:23:59 -070011import re
Christopher Wileyd78249a2013-03-01 13:05:31 -080012import socket
J. Richard Barnette134ec2c2012-04-25 12:59:37 -070013import time
J. Richard Barnette1d78b012012-05-15 13:56:30 -070014import xmlrpclib
J. Richard Barnette134ec2c2012-04-25 12:59:37 -070015
mussa584b4462014-06-20 15:13:28 -070016import common
J. Richard Barnette45e93de2012-04-11 17:24:15 -070017from autotest_lib.client.bin import utils
Dan Shi9cb0eec2014-06-03 09:04:50 -070018from autotest_lib.client.common_lib import autotemp
Richard Barnette0c73ffc2012-11-19 15:21:18 -080019from autotest_lib.client.common_lib import error
20from autotest_lib.client.common_lib import global_config
Dan Shi549fb822015-03-24 18:01:11 -070021from autotest_lib.client.common_lib import lsbrelease_utils
J. Richard Barnette45e93de2012-04-11 17:24:15 -070022from autotest_lib.client.common_lib.cros import autoupdater
Richard Barnette03a0c132012-11-05 12:40:35 -080023from autotest_lib.client.common_lib.cros import dev_server
Christopher Wileyd78249a2013-03-01 13:05:31 -080024from autotest_lib.client.common_lib.cros import retry
Gabe Blackb72f4fb2015-01-20 16:47:13 -080025from autotest_lib.client.common_lib.cros.graphite import autotest_es
Gabe Black1e1c41b2015-02-04 23:55:15 -080026from autotest_lib.client.common_lib.cros.graphite import autotest_stats
Hsinyu Chaoe0b08e62015-08-11 10:50:37 +000027from autotest_lib.client.cros import constants as client_constants
J. Richard Barnette84890bd2014-02-21 11:05:47 -080028from autotest_lib.client.cros import cros_ui
Cheng-Yi Chiangf4104ff2014-12-23 19:39:01 +080029from autotest_lib.client.cros.audio import cras_utils
Katherine Threlkeldab83d392015-06-18 16:45:57 -070030from autotest_lib.client.cros.input_playback import input_playback
MK Ryu35d661e2014-09-25 17:44:10 -070031from autotest_lib.server import autoserv_parser
32from autotest_lib.server import autotest
33from autotest_lib.server import constants
34from autotest_lib.server import crashcollect
Dan Shia1ecd5c2013-06-06 11:21:31 -070035from autotest_lib.server import utils as server_utils
Dan Shi9cb0eec2014-06-03 09:04:50 -070036from autotest_lib.server.cros import provision
Scott Zawalski89c44dd2013-02-26 09:28:02 -050037from autotest_lib.server.cros.dynamic_suite import constants as ds_constants
Simran Basi5e6339a2013-03-21 11:34:32 -070038from autotest_lib.server.cros.dynamic_suite import tools, frontend_wrappers
Dan Shi9cb0eec2014-06-03 09:04:50 -070039from autotest_lib.server.cros.faft.config.config import Config as FAFTConfig
Fang Deng96667ca2013-08-01 17:46:18 -070040from autotest_lib.server.hosts import abstract_ssh
Tom Wai-Hong Tamefe1c7f2014-01-02 14:00:11 +080041from autotest_lib.server.hosts import chameleon_host
Fang Deng5d518f42013-08-02 14:04:32 -070042from autotest_lib.server.hosts import servo_host
Simran Basidcff4252012-11-20 16:13:20 -080043from autotest_lib.site_utils.rpm_control_system import rpm_client
Simran Basid5e5e272012-09-24 15:23:59 -070044
45
beeps32a63082013-08-22 14:02:29 -070046try:
47 import jsonrpclib
48except ImportError:
49 jsonrpclib = None
Fang Deng96667ca2013-08-01 17:46:18 -070050
Fang Dengd1c2b732013-08-20 12:59:46 -070051
Dan Shib8540a52015-07-16 14:18:23 -070052CONFIG = global_config.global_config
53
Eric Carusoee673ac2015-08-05 17:03:04 -070054LUCID_SLEEP_BOARDS = ['samus', 'lulu']
55
Dan Shi6731a6c2015-09-24 14:49:25 -070056# A file to indicate provision failure and require Repair job to powerwash the
57# dut.
58PROVISION_FAILED = '/var/tmp/provision_failed'
59
beepsc87ff602013-07-31 21:53:00 -070060class FactoryImageCheckerException(error.AutoservError):
61 """Exception raised when an image is a factory image."""
62 pass
63
64
Aviv Keshet74c89a92013-02-04 15:18:30 -080065def add_label_detector(label_function_list, label_list=None, label=None):
66 """Decorator used to group functions together into the provided list.
67 @param label_function_list: List of label detecting functions to add
68 decorated function to.
69 @param label_list: List of detectable labels to add detectable labels to.
70 (Default: None)
71 @param label: Label string that is detectable by this detection function
72 (Default: None)
J. Richard Barnette7214e0b2013-02-06 15:20:49 -080073 """
Simran Basic6f1f7a2012-10-16 10:47:46 -070074 def add_func(func):
Aviv Keshet74c89a92013-02-04 15:18:30 -080075 """
76 @param func: The function to be added as a detector.
77 """
78 label_function_list.append(func)
79 if label and label_list is not None:
80 label_list.append(label)
Simran Basic6f1f7a2012-10-16 10:47:46 -070081 return func
82 return add_func
83
84
Fang Deng0ca40e22013-08-27 17:47:44 -070085class CrosHost(abstract_ssh.AbstractSSHHost):
J. Richard Barnette45e93de2012-04-11 17:24:15 -070086 """Chromium OS specific subclass of Host."""
87
88 _parser = autoserv_parser.autoserv_parser
Scott Zawalski62bacae2013-03-05 10:40:32 -050089 _AFE = frontend_wrappers.RetryingAFE(timeout_min=5, delay_sec=10)
J. Richard Barnette45e93de2012-04-11 17:24:15 -070090
Richard Barnette03a0c132012-11-05 12:40:35 -080091 # Timeout values (in seconds) associated with various Chrome OS
92 # state changes.
J. Richard Barnette134ec2c2012-04-25 12:59:37 -070093 #
Richard Barnette0c73ffc2012-11-19 15:21:18 -080094 # In general, a good rule of thumb is that the timeout can be up
95 # to twice the typical measured value on the slowest platform.
96 # The times here have not necessarily been empirically tested to
97 # meet this criterion.
J. Richard Barnetteeb69d722012-06-18 17:29:44 -070098 #
99 # SLEEP_TIMEOUT: Time to allow for suspend to memory.
Richard Barnette0c73ffc2012-11-19 15:21:18 -0800100 # RESUME_TIMEOUT: Time to allow for resume after suspend, plus
101 # time to restart the netwowrk.
J. Richard Barnette84890bd2014-02-21 11:05:47 -0800102 # SHUTDOWN_TIMEOUT: Time to allow for shut down.
J. Richard Barnetteeb69d722012-06-18 17:29:44 -0700103 # BOOT_TIMEOUT: Time to allow for boot from power off. Among
Richard Barnette0c73ffc2012-11-19 15:21:18 -0800104 # other things, this must account for the 30 second dev-mode
J. Richard Barnetted4649c62013-03-06 17:42:27 -0800105 # screen delay and time to start the network.
J. Richard Barnetteeb69d722012-06-18 17:29:44 -0700106 # USB_BOOT_TIMEOUT: Time to allow for boot from a USB device,
Richard Barnette0c73ffc2012-11-19 15:21:18 -0800107 # including the 30 second dev-mode delay and time to start the
J. Richard Barnetted4649c62013-03-06 17:42:27 -0800108 # network.
beepsf079cfb2013-09-18 17:49:51 -0700109 # INSTALL_TIMEOUT: Time to allow for chromeos-install.
J. Richard Barnette84890bd2014-02-21 11:05:47 -0800110 # POWERWASH_BOOT_TIMEOUT: Time to allow for a reboot that
111 # includes powerwash.
J. Richard Barnetteeb69d722012-06-18 17:29:44 -0700112
113 SLEEP_TIMEOUT = 2
J. Richard Barnetted4649c62013-03-06 17:42:27 -0800114 RESUME_TIMEOUT = 10
Tom Wai-Hong Tamfe005c22014-12-03 09:25:44 +0800115 SHUTDOWN_TIMEOUT = 10
J. Richard Barnettefbcc7122013-07-24 18:24:59 -0700116 BOOT_TIMEOUT = 60
J. Richard Barnette5bab5f52015-08-03 13:14:38 -0700117 USB_BOOT_TIMEOUT = 300
J. Richard Barnette7817b052014-08-28 09:47:29 -0700118 INSTALL_TIMEOUT = 480
Dan Shi2c88eed2013-11-12 10:18:38 -0800119 POWERWASH_BOOT_TIMEOUT = 60
Chris Sosab76e0ee2013-05-22 16:55:41 -0700120
Dan Shica503482015-03-30 17:23:25 -0700121 # Minimum OS version that supports server side packaging. Older builds may
122 # not have server side package built or with Autotest code change to support
123 # server-side packaging.
Dan Shib8540a52015-07-16 14:18:23 -0700124 MIN_VERSION_SUPPORT_SSP = CONFIG.get_config_value(
Dan Shiced09e42015-04-17 16:09:34 -0700125 'AUTOSERV', 'min_version_support_ssp', type=int)
Dan Shica503482015-03-30 17:23:25 -0700126
J. Richard Barnette84890bd2014-02-21 11:05:47 -0800127 # REBOOT_TIMEOUT: How long to wait for a reboot.
128 #
Chris Sosab76e0ee2013-05-22 16:55:41 -0700129 # We have a long timeout to ensure we don't flakily fail due to other
130 # issues. Shorter timeouts are vetted in platform_RebootAfterUpdate.
Simran Basi1160e2c2013-10-04 16:00:24 -0700131 # TODO(sbasi - crbug.com/276094) Restore to 5 mins once the 'host did not
132 # return from reboot' bug is solved.
133 REBOOT_TIMEOUT = 480
Chris Sosab76e0ee2013-05-22 16:55:41 -0700134
Ismail Noorbasha07fdb612013-02-14 14:13:31 -0800135 # _USB_POWER_TIMEOUT: Time to allow for USB to power toggle ON and OFF.
136 # _POWER_CYCLE_TIMEOUT: Time to allow for manual power cycle.
137 _USB_POWER_TIMEOUT = 5
138 _POWER_CYCLE_TIMEOUT = 10
139
beeps32a63082013-08-22 14:02:29 -0700140 _RPC_PROXY_URL = 'http://localhost:%d'
Christopher Wileydd181852013-10-10 19:56:58 -0700141 _RPC_SHUTDOWN_POLLING_PERIOD_SECONDS = 2
Peter Qiu4410db72014-06-05 10:32:41 -0700142 # Set shutdown timeout to account for the time for restarting the UI.
143 _RPC_SHUTDOWN_TIMEOUT_SECONDS = cros_ui.RESTART_UI_TIMEOUT
Richard Barnette0c73ffc2012-11-19 15:21:18 -0800144
Dan Shib8540a52015-07-16 14:18:23 -0700145 _RPM_RECOVERY_BOARDS = CONFIG.get_config_value('CROS',
Richard Barnette82c35912012-11-20 10:09:10 -0800146 'rpm_recovery_boards', type=str).split(',')
147
148 _MAX_POWER_CYCLE_ATTEMPTS = 6
149 _LAB_MACHINE_FILE = '/mnt/stateful_partition/.labmachine'
Fang Dengdeba14f2014-11-14 11:54:09 -0800150 _RPM_HOSTNAME_REGEX = ('chromeos(\d+)(-row(\d+))?-rack(\d+[a-z]*)'
151 '-host(\d+)')
Katherine Threlkeldab83d392015-06-18 16:45:57 -0700152 _LIGHTSENSOR_FILES = [ "in_illuminance0_input",
153 "in_illuminance_input",
154 "in_illuminance0_raw",
155 "in_illuminance_raw",
156 "illuminance0_input"]
Richard Barnette82c35912012-11-20 10:09:10 -0800157 _LIGHTSENSOR_SEARCH_DIR = '/sys/bus/iio/devices'
158 _LABEL_FUNCTIONS = []
Aviv Keshet74c89a92013-02-04 15:18:30 -0800159 _DETECTABLE_LABELS = []
160 label_decorator = functools.partial(add_label_detector, _LABEL_FUNCTIONS,
161 _DETECTABLE_LABELS)
J. Richard Barnette134ec2c2012-04-25 12:59:37 -0700162
J. Richard Barnetteb6de7e32013-02-14 13:28:04 -0800163 # Constants used in ping_wait_up() and ping_wait_down().
164 #
165 # _PING_WAIT_COUNT is the approximate number of polling
166 # cycles to use when waiting for a host state change.
167 #
168 # _PING_STATUS_DOWN and _PING_STATUS_UP are names used
169 # for arguments to the internal _ping_wait_for_status()
170 # method.
171 _PING_WAIT_COUNT = 40
172 _PING_STATUS_DOWN = False
173 _PING_STATUS_UP = True
174
Ismail Noorbasha07fdb612013-02-14 14:13:31 -0800175 # Allowed values for the power_method argument.
176
177 # POWER_CONTROL_RPM: Passed as default arg for power_off/on/cycle() methods.
178 # POWER_CONTROL_SERVO: Used in set_power() and power_cycle() methods.
179 # POWER_CONTROL_MANUAL: Used in set_power() and power_cycle() methods.
180 POWER_CONTROL_RPM = 'RPM'
181 POWER_CONTROL_SERVO = 'servoj10'
182 POWER_CONTROL_MANUAL = 'manual'
183
184 POWER_CONTROL_VALID_ARGS = (POWER_CONTROL_RPM,
185 POWER_CONTROL_SERVO,
186 POWER_CONTROL_MANUAL)
Richard Barnette0c73ffc2012-11-19 15:21:18 -0800187
Simran Basi5e6339a2013-03-21 11:34:32 -0700188 _RPM_OUTLET_CHANGED = 'outlet_changed'
189
Dan Shi9cb0eec2014-06-03 09:04:50 -0700190 # URL pattern to download firmware image.
Dan Shib8540a52015-07-16 14:18:23 -0700191 _FW_IMAGE_URL_PATTERN = CONFIG.get_config_value(
Dan Shi9cb0eec2014-06-03 09:04:50 -0700192 'CROS', 'firmware_url_pattern', type=str)
beeps687243d2013-07-18 15:29:27 -0700193
MK Ryu35d661e2014-09-25 17:44:10 -0700194 # File that has a list of directories to be collected
195 _LOGS_TO_COLLECT_FILE = os.path.join(
196 common.client_dir, 'common_lib', 'logs_to_collect')
197
198 # Prefix of logging message w.r.t. crash collection
199 _CRASHLOGS_PREFIX = 'collect_crashlogs'
200
201 # Time duration waiting for host up/down check
202 _CHECK_HOST_UP_TIMEOUT_SECS = 15
203
204 # A command that interacts with kernel and hardware (e.g., rm, mkdir, etc)
205 # might not be completely done deep through the hardware when the machine
206 # is powered down right after the command returns.
207 # We should wait for a few seconds to make them done. Finger crossed.
208 _SAFE_WAIT_SECS = 10
209
210
J. Richard Barnette964fba02012-10-24 17:34:29 -0700211 @staticmethod
beeps46dadc92013-11-07 14:07:10 -0800212 def check_host(host, timeout=10):
213 """
214 Check if the given host is a chrome-os host.
215
216 @param host: An ssh host representing a device.
217 @param timeout: The timeout for the run command.
218
219 @return: True if the host device is chromeos.
220
beeps46dadc92013-11-07 14:07:10 -0800221 """
222 try:
Simran Basi933c8af2015-04-29 14:05:07 -0700223 result = host.run(
224 'grep -q CHROMEOS /etc/lsb-release && '
225 '! test -f /mnt/stateful_partition/.android_tester && '
226 '! grep -q moblab /etc/lsb-release',
227 ignore_status=True, timeout=timeout)
beeps46dadc92013-11-07 14:07:10 -0800228 except (error.AutoservRunError, error.AutoservSSHTimeout):
229 return False
230 return result.exit_status == 0
231
232
233 @staticmethod
Tom Wai-Hong Tamefe1c7f2014-01-02 14:00:11 +0800234 def _extract_arguments(args_dict, key_subset):
235 """Extract options from `args_dict` and return a subset result.
J. Richard Barnette7214e0b2013-02-06 15:20:49 -0800236
237 Take the provided dictionary of argument options and return
Tom Wai-Hong Tamefe1c7f2014-01-02 14:00:11 +0800238 a subset that represent standard arguments needed to construct
239 a test-assistant object (chameleon or servo) for a host. The
240 intent is to provide standard argument processing from
Christopher Wiley644ef3e2015-05-15 13:14:14 -0700241 CrosHost for tests that require a test-assistant board
Tom Wai-Hong Tamefe1c7f2014-01-02 14:00:11 +0800242 to operate.
243
244 @param args_dict Dictionary from which to extract the arguments.
245 @param key_subset Tuple of keys to extract from the args_dict, e.g.
246 ('servo_host', 'servo_port').
247 """
248 result = {}
249 for arg in key_subset:
250 if arg in args_dict:
251 result[arg] = args_dict[arg]
252 return result
253
254
255 @staticmethod
256 def get_chameleon_arguments(args_dict):
257 """Extract chameleon options from `args_dict` and return the result.
258
259 Recommended usage:
260 ~~~~~~~~
261 args_dict = utils.args_to_dict(args)
262 chameleon_args = hosts.CrosHost.get_chameleon_arguments(args_dict)
263 host = hosts.create_host(machine, chameleon_args=chameleon_args)
264 ~~~~~~~~
265
266 @param args_dict Dictionary from which to extract the chameleon
267 arguments.
268 """
269 return CrosHost._extract_arguments(
270 args_dict, ('chameleon_host', 'chameleon_port'))
271
272
273 @staticmethod
274 def get_servo_arguments(args_dict):
275 """Extract servo options from `args_dict` and return the result.
J. Richard Barnette7214e0b2013-02-06 15:20:49 -0800276
277 Recommended usage:
278 ~~~~~~~~
279 args_dict = utils.args_to_dict(args)
Fang Deng0ca40e22013-08-27 17:47:44 -0700280 servo_args = hosts.CrosHost.get_servo_arguments(args_dict)
J. Richard Barnette7214e0b2013-02-06 15:20:49 -0800281 host = hosts.create_host(machine, servo_args=servo_args)
282 ~~~~~~~~
283
284 @param args_dict Dictionary from which to extract the servo
285 arguments.
286 """
Tom Wai-Hong Tamefe1c7f2014-01-02 14:00:11 +0800287 return CrosHost._extract_arguments(
288 args_dict, ('servo_host', 'servo_port'))
J. Richard Barnette134ec2c2012-04-25 12:59:37 -0700289
J. Richard Barnette964fba02012-10-24 17:34:29 -0700290
Tom Wai-Hong Tamefe1c7f2014-01-02 14:00:11 +0800291 def _initialize(self, hostname, chameleon_args=None, servo_args=None,
Fang Denge545abb2014-12-30 18:43:47 -0800292 try_lab_servo=False, ssh_verbosity_flag='', ssh_options='',
Fang Dengd1c2b732013-08-20 12:59:46 -0700293 *args, **dargs):
Tom Wai-Hong Tamefe1c7f2014-01-02 14:00:11 +0800294 """Initialize superclasses, |self.chameleon|, and |self.servo|.
J. Richard Barnette67ccb872012-04-19 16:34:56 -0700295
Fang Denge545abb2014-12-30 18:43:47 -0800296 This method will attempt to create the test-assistant object
297 (chameleon/servo) when it is needed by the test. Check
298 the docstring of chameleon_host.create_chameleon_host and
299 servo_host.create_servo_host for how this is determined.
Fang Deng5d518f42013-08-02 14:04:32 -0700300
Fang Denge545abb2014-12-30 18:43:47 -0800301 @param hostname: Hostname of the dut.
302 @param chameleon_args: A dictionary that contains args for creating
303 a ChameleonHost. See chameleon_host for details.
304 @param servo_args: A dictionary that contains args for creating
305 a ServoHost object. See servo_host for details.
306 @param try_lab_servo: Boolean, False indicates that ServoHost should
307 not be created for a device in Cros test lab.
308 See servo_host for details.
309 @param ssh_verbosity_flag: String, to pass to the ssh command to control
310 verbosity.
311 @param ssh_options: String, other ssh options to pass to the ssh
312 command.
J. Richard Barnette67ccb872012-04-19 16:34:56 -0700313 """
Fang Deng0ca40e22013-08-27 17:47:44 -0700314 super(CrosHost, self)._initialize(hostname=hostname,
J. Richard Barnette45e93de2012-04-11 17:24:15 -0700315 *args, **dargs)
J. Richard Barnettef0859852012-08-20 14:55:50 -0700316 # self.env is a dictionary of environment variable settings
317 # to be exported for commands run on the host.
318 # LIBC_FATAL_STDERR_ can be useful for diagnosing certain
319 # errors that might happen.
320 self.env['LIBC_FATAL_STDERR_'] = '1'
beeps32a63082013-08-22 14:02:29 -0700321 self._rpc_proxy_map = {}
Fang Dengd1c2b732013-08-20 12:59:46 -0700322 self._ssh_verbosity_flag = ssh_verbosity_flag
Aviv Keshetc5947fa2013-09-04 14:06:29 -0700323 self._ssh_options = ssh_options
Fang Deng5d518f42013-08-02 14:04:32 -0700324 # TODO(fdeng): We need to simplify the
325 # process of servo and servo_host initialization.
326 # crbug.com/298432
Fang Denge545abb2014-12-30 18:43:47 -0800327 self._servo_host = servo_host.create_servo_host(
328 dut=self.hostname, servo_args=servo_args,
329 try_lab_servo=try_lab_servo)
Tom Wai-Hong Tamefe1c7f2014-01-02 14:00:11 +0800330 # TODO(waihong): Do the simplication on Chameleon too.
Tom Wai-Hong Tam3d6790d2014-04-14 16:15:47 +0800331 self._chameleon_host = chameleon_host.create_chameleon_host(
332 dut=self.hostname, chameleon_args=chameleon_args)
333
Dan Shi4d478522014-02-14 13:46:32 -0800334 if self._servo_host is not None:
335 self.servo = self._servo_host.get_servo()
336 else:
337 self.servo = None
338
Tom Wai-Hong Tam3d6790d2014-04-14 16:15:47 +0800339 if self._chameleon_host:
Tom Wai-Hong Tameaee3402014-01-22 08:52:10 +0800340 self.chameleon = self._chameleon_host.create_chameleon_board()
Tom Wai-Hong Tamefe1c7f2014-01-02 14:00:11 +0800341 else:
Tom Wai-Hong Tam3d6790d2014-04-14 16:15:47 +0800342 self.chameleon = None
Fang Deng5d518f42013-08-02 14:04:32 -0700343
344
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500345 def get_repair_image_name(self):
346 """Generate a image_name from variables in the global config.
347
348 @returns a str of $board-version/$BUILD.
349
350 """
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500351 board = self._get_board_from_afe()
352 if board is None:
353 raise error.AutoservError('DUT has no board attribute, '
354 'cannot be repaired.')
Dan Shi6964fa52014-12-18 11:04:27 -0800355 stable_version = self._AFE.run('get_stable_version', board=board)
Dan Shib8540a52015-07-16 14:18:23 -0700356 build_pattern = CONFIG.get_config_value(
Dan Shi6964fa52014-12-18 11:04:27 -0800357 'CROS', 'stable_build_pattern')
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500358 return build_pattern % (board, stable_version)
359
360
Scott Zawalski62bacae2013-03-05 10:40:32 -0500361 def _host_in_AFE(self):
362 """Check if the host is an object the AFE knows.
363
364 @returns the host object.
365 """
366 return self._AFE.get_hosts(hostname=self.hostname)
367
368
Chris Sosab76e0ee2013-05-22 16:55:41 -0700369 def lookup_job_repo_url(self):
370 """Looks up the job_repo_url for the host.
371
372 @returns job_repo_url from AFE or None if not found.
373
374 @raises KeyError if the host does not have a job_repo_url
375 """
Chris Sosab76e0ee2013-05-22 16:55:41 -0700376 hosts = self._AFE.get_hosts(hostname=self.hostname)
beepsb5efc532013-06-04 11:29:34 -0700377 if hosts and ds_constants.JOB_REPO_URL in hosts[0].attributes:
378 return hosts[0].attributes[ds_constants.JOB_REPO_URL]
J. Richard Barnette85d0aac2015-08-20 10:34:39 -0700379 else:
380 return None
Chris Sosab76e0ee2013-05-22 16:55:41 -0700381
382
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500383 def clear_cros_version_labels_and_job_repo_url(self):
384 """Clear cros_version labels and host attribute job_repo_url."""
Scott Zawalski62bacae2013-03-05 10:40:32 -0500385 if not self._host_in_AFE():
Scott Zawalskieadbf702013-03-14 09:23:06 -0400386 return
387
Scott Zawalski62bacae2013-03-05 10:40:32 -0500388 host_list = [self.hostname]
389 labels = self._AFE.get_labels(
390 name__startswith=ds_constants.VERSION_PREFIX,
391 host__hostname=self.hostname)
Dan Shi0f466e82013-02-22 15:44:58 -0800392
Scott Zawalski62bacae2013-03-05 10:40:32 -0500393 for label in labels:
394 label.remove_hosts(hosts=host_list)
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500395
beepscb6f1e22013-06-28 19:14:10 -0700396 self.update_job_repo_url(None, None)
397
398
399 def update_job_repo_url(self, devserver_url, image_name):
400 """
401 Updates the job_repo_url host attribute and asserts it's value.
402
403 @param devserver_url: The devserver to use in the job_repo_url.
404 @param image_name: The name of the image to use in the job_repo_url.
405
406 @raises AutoservError: If we failed to update the job_repo_url.
407 """
408 repo_url = None
409 if devserver_url and image_name:
410 repo_url = tools.get_package_url(devserver_url, image_name)
411 self._AFE.set_host_attribute(ds_constants.JOB_REPO_URL, repo_url,
Scott Zawalski62bacae2013-03-05 10:40:32 -0500412 hostname=self.hostname)
beepscb6f1e22013-06-28 19:14:10 -0700413 if self.lookup_job_repo_url() != repo_url:
414 raise error.AutoservError('Failed to update job_repo_url with %s, '
415 'host %s' % (repo_url, self.hostname))
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500416
417
Dan Shie9309262013-06-19 22:50:21 -0700418 def add_cros_version_labels_and_job_repo_url(self, image_name):
Scott Zawalskieadbf702013-03-14 09:23:06 -0400419 """Add cros_version labels and host attribute job_repo_url.
420
421 @param image_name: The name of the image e.g.
422 lumpy-release/R27-3837.0.0
Dan Shi7458bf62013-06-10 12:50:16 -0700423
Scott Zawalskieadbf702013-03-14 09:23:06 -0400424 """
Scott Zawalski62bacae2013-03-05 10:40:32 -0500425 if not self._host_in_AFE():
Scott Zawalskieadbf702013-03-14 09:23:06 -0400426 return
Scott Zawalski62bacae2013-03-05 10:40:32 -0500427
Scott Zawalskieadbf702013-03-14 09:23:06 -0400428 cros_label = '%s%s' % (ds_constants.VERSION_PREFIX, image_name)
Dan Shie9309262013-06-19 22:50:21 -0700429 devserver_url = dev_server.ImageServer.resolve(image_name).url()
Scott Zawalski62bacae2013-03-05 10:40:32 -0500430
MK Ryufb5e3a82015-07-01 12:21:20 -0700431 self._AFE.run('label_add_hosts', id=cros_label, hosts=[self.hostname])
beepscb6f1e22013-06-28 19:14:10 -0700432 self.update_job_repo_url(devserver_url, image_name)
433
434
beepsdae65fd2013-07-26 16:24:41 -0700435 def verify_job_repo_url(self, tag=''):
beepscb6f1e22013-06-28 19:14:10 -0700436 """
437 Make sure job_repo_url of this host is valid.
438
joychen03eaad92013-06-26 09:55:21 -0700439 Eg: The job_repo_url "http://lmn.cd.ab.xyx:8080/static/\
beepscb6f1e22013-06-28 19:14:10 -0700440 lumpy-release/R29-4279.0.0/autotest/packages" claims to have the
441 autotest package for lumpy-release/R29-4279.0.0. If this isn't the case,
442 download and extract it. If the devserver embedded in the url is
443 unresponsive, update the job_repo_url of the host after staging it on
444 another devserver.
445
446 @param job_repo_url: A url pointing to the devserver where the autotest
447 package for this build should be staged.
beepsdae65fd2013-07-26 16:24:41 -0700448 @param tag: The tag from the server job, in the format
449 <job_id>-<user>/<hostname>, or <hostless> for a server job.
beepscb6f1e22013-06-28 19:14:10 -0700450
451 @raises DevServerException: If we could not resolve a devserver.
452 @raises AutoservError: If we're unable to save the new job_repo_url as
453 a result of choosing a new devserver because the old one failed to
454 respond to a health check.
beeps0c865032013-07-30 11:37:06 -0700455 @raises urllib2.URLError: If the devserver embedded in job_repo_url
456 doesn't respond within the timeout.
beepscb6f1e22013-06-28 19:14:10 -0700457 """
458 job_repo_url = self.lookup_job_repo_url()
459 if not job_repo_url:
460 logging.warning('No job repo url set on host %s', self.hostname)
461 return
462
463 logging.info('Verifying job repo url %s', job_repo_url)
464 devserver_url, image_name = tools.get_devserver_build_from_package_url(
465 job_repo_url)
466
beeps0c865032013-07-30 11:37:06 -0700467 ds = dev_server.ImageServer(devserver_url)
beepscb6f1e22013-06-28 19:14:10 -0700468
469 logging.info('Staging autotest artifacts for %s on devserver %s',
470 image_name, ds.url())
beeps687243d2013-07-18 15:29:27 -0700471
472 start_time = time.time()
Simran Basi25e7a922014-10-31 11:56:10 -0700473 ds.stage_artifacts(image_name, ['autotest_packages'])
beeps687243d2013-07-18 15:29:27 -0700474 stage_time = time.time() - start_time
475
476 # Record how much of the verification time comes from a devserver
477 # restage. If we're doing things right we should not see multiple
478 # devservers for a given board/build/branch path.
479 try:
J. Richard Barnette3cbd76b2013-11-27 12:11:25 -0800480 board, build_type, branch = server_utils.ParseBuildName(
beeps687243d2013-07-18 15:29:27 -0700481 image_name)[:3]
J. Richard Barnette3cbd76b2013-11-27 12:11:25 -0800482 except server_utils.ParseBuildNameException:
beeps687243d2013-07-18 15:29:27 -0700483 pass
484 else:
beeps0c865032013-07-30 11:37:06 -0700485 devserver = devserver_url[
Chris Sosa65425082013-10-16 13:26:22 -0700486 devserver_url.find('/') + 2:devserver_url.rfind(':')]
beeps687243d2013-07-18 15:29:27 -0700487 stats_key = {
488 'board': board,
489 'build_type': build_type,
490 'branch': branch,
beeps0c865032013-07-30 11:37:06 -0700491 'devserver': devserver.replace('.', '_'),
beeps687243d2013-07-18 15:29:27 -0700492 }
Gabe Black1e1c41b2015-02-04 23:55:15 -0800493 autotest_stats.Gauge('verify_job_repo_url').send(
beeps687243d2013-07-18 15:29:27 -0700494 '%(board)s.%(build_type)s.%(branch)s.%(devserver)s' % stats_key,
495 stage_time)
beepscb6f1e22013-06-28 19:14:10 -0700496
Scott Zawalskieadbf702013-03-14 09:23:06 -0400497
Dan Shicf4d2032015-03-12 15:04:21 -0700498 def stage_server_side_package(self, image=None):
499 """Stage autotest server-side package on devserver.
500
501 @param image: Full path of an OS image to install or a build name.
502
503 @return: A url to the autotest server-side package.
504 """
505 if image:
506 image_name = tools.get_build_from_image(image)
507 if not image_name:
508 raise error.AutoservError(
509 'Failed to parse build name from %s' % image)
510 ds = dev_server.ImageServer.resolve(image_name)
511 else:
512 job_repo_url = self.lookup_job_repo_url()
513 if job_repo_url:
514 devserver_url, image_name = (
515 tools.get_devserver_build_from_package_url(job_repo_url))
516 ds = dev_server.ImageServer(devserver_url)
517 else:
518 labels = self._AFE.get_labels(
519 name__startswith=ds_constants.VERSION_PREFIX,
520 host__hostname=self.hostname)
521 if not labels:
522 raise error.AutoservError(
523 'Failed to stage server-side package. The host has '
524 'no job_report_url attribute or version label.')
525 image_name = labels[0].name[len(ds_constants.VERSION_PREFIX):]
526 ds = dev_server.ImageServer.resolve(image_name)
Dan Shica503482015-03-30 17:23:25 -0700527
528 # Get the OS version of the build, for any build older than
529 # MIN_VERSION_SUPPORT_SSP, server side packaging is not supported.
530 match = re.match('.*/R\d+-(\d+)\.', image_name)
531 if match and int(match.group(1)) < self.MIN_VERSION_SUPPORT_SSP:
532 logging.warn('Build %s is older than %s. Server side packaging is '
533 'disabled.', image_name, self.MIN_VERSION_SUPPORT_SSP)
534 return None
535
Dan Shicf4d2032015-03-12 15:04:21 -0700536 ds.stage_artifacts(image_name, ['autotest_server_package'])
537 return '%s/static/%s/%s' % (ds.url(), image_name,
538 'autotest_server_package.tar.bz2')
539
540
Dan Shi0f466e82013-02-22 15:44:58 -0800541 def _try_stateful_update(self, update_url, force_update, updater):
542 """Try to use stateful update to initialize DUT.
543
544 When DUT is already running the same version that machine_install
545 tries to install, stateful update is a much faster way to clean up
546 the DUT for testing, compared to a full reimage. It is implemeted
547 by calling autoupdater.run_update, but skipping updating root, as
548 updating the kernel is time consuming and not necessary.
549
550 @param update_url: url of the image.
551 @param force_update: Set to True to update the image even if the DUT
552 is running the same version.
553 @param updater: ChromiumOSUpdater instance used to update the DUT.
554 @returns: True if the DUT was updated with stateful update.
555
556 """
J. Richard Barnette3f731032014-04-07 17:42:59 -0700557 # TODO(jrbarnette): Yes, I hate this re.match() test case.
558 # It's better than the alternative: see crbug.com/360944.
559 image_name = autoupdater.url_to_image_name(update_url)
560 release_pattern = r'^.*-release/R[0-9]+-[0-9]+\.[0-9]+\.0$'
561 if not re.match(release_pattern, image_name):
562 return False
Dan Shi0f466e82013-02-22 15:44:58 -0800563 if not updater.check_version():
564 return False
565 if not force_update:
566 logging.info('Canceling stateful update because the new and '
567 'old versions are the same.')
568 return False
569 # Following folders should be rebuilt after stateful update.
570 # A test file is used to confirm each folder gets rebuilt after
571 # the stateful update.
572 folders_to_check = ['/var', '/home', '/mnt/stateful_partition']
573 test_file = '.test_file_to_be_deleted'
574 for folder in folders_to_check:
575 touch_path = os.path.join(folder, test_file)
576 self.run('touch %s' % touch_path)
577
Chris Sosae92399e2015-04-24 11:32:59 -0700578 updater.run_update(update_root=False)
Dan Shi0f466e82013-02-22 15:44:58 -0800579
580 # Reboot to complete stateful update.
Chris Sosab76e0ee2013-05-22 16:55:41 -0700581 self.reboot(timeout=self.REBOOT_TIMEOUT, wait=True)
Dan Shi0f466e82013-02-22 15:44:58 -0800582 check_file_cmd = 'test -f %s; echo $?'
583 for folder in folders_to_check:
584 test_file_path = os.path.join(folder, test_file)
585 result = self.run(check_file_cmd % test_file_path,
586 ignore_status=True)
587 if result.exit_status == 1:
588 return False
589 return True
590
591
J. Richard Barnette7275b612013-06-04 18:13:11 -0700592 def _post_update_processing(self, updater, expected_kernel=None):
Dan Shi0f466e82013-02-22 15:44:58 -0800593 """After the DUT is updated, confirm machine_install succeeded.
594
595 @param updater: ChromiumOSUpdater instance used to update the DUT.
J. Richard Barnette7275b612013-06-04 18:13:11 -0700596 @param expected_kernel: kernel expected to be active after reboot,
597 or `None` to skip rollback checking.
Dan Shi0f466e82013-02-22 15:44:58 -0800598
599 """
J. Richard Barnette7275b612013-06-04 18:13:11 -0700600 # Touch the lab machine file to leave a marker that
601 # distinguishes this image from other test images.
602 # Afterwards, we must re-run the autoreboot script because
603 # it depends on the _LAB_MACHINE_FILE.
Dan Shi0f466e82013-02-22 15:44:58 -0800604 self.run('touch %s' % self._LAB_MACHINE_FILE)
Dan Shi0f466e82013-02-22 15:44:58 -0800605 self.run('start autoreboot')
Chris Sosa65425082013-10-16 13:26:22 -0700606 updater.verify_boot_expectations(
607 expected_kernel, rollback_message=
608 'Build %s failed to boot on %s; system rolled back to previous'
609 'build' % (updater.update_version, self.hostname))
J. Richard Barnette7275b612013-06-04 18:13:11 -0700610 # Check that we've got the build we meant to install.
611 if not updater.check_version_to_confirm_install():
612 raise autoupdater.ChromiumOSError(
613 'Failed to update %s to build %s; found build '
614 '%s instead' % (self.hostname,
Chris Sosa65425082013-10-16 13:26:22 -0700615 updater.update_version,
Dan Shi0942b1d2015-03-31 11:07:00 -0700616 self.get_release_version()))
Dan Shi0f466e82013-02-22 15:44:58 -0800617
Chris Sosae92399e2015-04-24 11:32:59 -0700618 logging.debug('Cleaning up old autotest directories.')
619 try:
620 installed_autodir = autotest.Autotest.get_installed_autodir(self)
621 self.run('rm -rf ' + installed_autodir)
622 except autotest.AutodirNotFoundError:
623 logging.debug('No autotest installed directory found.')
624
Dan Shi0f466e82013-02-22 15:44:58 -0800625
J. Richard Barnettee4af8b92013-05-01 13:16:12 -0700626 def _stage_image_for_update(self, image_name=None):
Chris Sosae92399e2015-04-24 11:32:59 -0700627 """Stage a build on a devserver and return the update_url and devserver.
Scott Zawalskieadbf702013-03-14 09:23:06 -0400628
629 @param image_name: a name like lumpy-release/R27-3837.0.0
Chris Sosae92399e2015-04-24 11:32:59 -0700630 @returns a tuple with an update URL like:
Scott Zawalskieadbf702013-03-14 09:23:06 -0400631 http://172.22.50.205:8082/update/lumpy-release/R27-3837.0.0
Chris Sosae92399e2015-04-24 11:32:59 -0700632 and the devserver instance.
Scott Zawalskieadbf702013-03-14 09:23:06 -0400633 """
J. Richard Barnettee4af8b92013-05-01 13:16:12 -0700634 if not image_name:
635 image_name = self.get_repair_image_name()
Chris Sosae92399e2015-04-24 11:32:59 -0700636
J. Richard Barnettee4af8b92013-05-01 13:16:12 -0700637 logging.info('Staging build for AU: %s', image_name)
Scott Zawalskieadbf702013-03-14 09:23:06 -0400638 devserver = dev_server.ImageServer.resolve(image_name)
639 devserver.trigger_download(image_name, synchronous=False)
Chris Sosae92399e2015-04-24 11:32:59 -0700640 return (tools.image_url_pattern() % (devserver.url(), image_name),
641 devserver)
Scott Zawalskieadbf702013-03-14 09:23:06 -0400642
643
J. Richard Barnettee4af8b92013-05-01 13:16:12 -0700644 def stage_image_for_servo(self, image_name=None):
645 """Stage a build on a devserver and return the update_url.
646
647 @param image_name: a name like lumpy-release/R27-3837.0.0
648 @returns an update URL like:
649 http://172.22.50.205:8082/update/lumpy-release/R27-3837.0.0
650 """
651 if not image_name:
652 image_name = self.get_repair_image_name()
653 logging.info('Staging build for servo install: %s', image_name)
654 devserver = dev_server.ImageServer.resolve(image_name)
655 devserver.stage_artifacts(image_name, ['test_image'])
656 return devserver.get_test_image_url(image_name)
657
658
beepse539be02013-07-31 21:57:39 -0700659 def stage_factory_image_for_servo(self, image_name):
660 """Stage a build on a devserver and return the update_url.
661
662 @param image_name: a name like <baord>/4262.204.0
beeps12c0a3c2013-09-03 11:58:27 -0700663
beepse539be02013-07-31 21:57:39 -0700664 @return: An update URL, eg:
665 http://<devserver>/static/canary-channel/\
666 <board>/4262.204.0/factory_test/chromiumos_factory_image.bin
beeps12c0a3c2013-09-03 11:58:27 -0700667
668 @raises: ValueError if the factory artifact name is missing from
669 the config.
670
beepse539be02013-07-31 21:57:39 -0700671 """
672 if not image_name:
673 logging.error('Need an image_name to stage a factory image.')
674 return
675
Dan Shib8540a52015-07-16 14:18:23 -0700676 factory_artifact = CONFIG.get_config_value(
beeps12c0a3c2013-09-03 11:58:27 -0700677 'CROS', 'factory_artifact', type=str, default='')
678 if not factory_artifact:
679 raise ValueError('Cannot retrieve the factory artifact name from '
680 'autotest config, and hence cannot stage factory '
681 'artifacts.')
682
beepse539be02013-07-31 21:57:39 -0700683 logging.info('Staging build for servo install: %s', image_name)
684 devserver = dev_server.ImageServer.resolve(image_name)
685 devserver.stage_artifacts(
686 image_name,
beeps12c0a3c2013-09-03 11:58:27 -0700687 [factory_artifact],
688 archive_url=None)
beepse539be02013-07-31 21:57:39 -0700689
690 return tools.factory_image_url_pattern() % (devserver.url(), image_name)
691
692
Chris Sosaa3ac2152012-05-23 22:23:13 -0700693 def machine_install(self, update_url=None, force_update=False,
Richard Barnette0b023a72015-04-24 16:07:30 +0000694 local_devserver=False, repair=False,
695 force_full_update=False):
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500696 """Install the DUT.
697
Dan Shi0f466e82013-02-22 15:44:58 -0800698 Use stateful update if the DUT is already running the same build.
699 Stateful update does not update kernel and tends to run much faster
700 than a full reimage. If the DUT is running a different build, or it
701 failed to do a stateful update, full update, including kernel update,
702 will be applied to the DUT.
703
Scott Zawalskieadbf702013-03-14 09:23:06 -0400704 Once a host enters machine_install its cros_version label will be
705 removed as well as its host attribute job_repo_url (used for
706 package install).
707
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500708 @param update_url: The url to use for the update
709 pattern: http://$devserver:###/update/$build
710 If update_url is None and repair is True we will install the
Dan Shi6964fa52014-12-18 11:04:27 -0800711 stable image listed in afe_stable_versions table. If the table
712 is not setup, global_config value under CROS.stable_cros_version
713 will be used instead.
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500714 @param force_update: Force an update even if the version installed
715 is the same. Default:False
Christopher Wiley6a4ff932015-05-15 14:00:47 -0700716 @param local_devserver: Used by test_that to allow people to
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500717 use their local devserver. Default: False
Chris Sosae92399e2015-04-24 11:32:59 -0700718 @param repair: Forces update to repair image. Implies force_update.
Fang Deng3d3b9272014-12-22 12:20:28 -0800719 @param force_full_update: If True, do not attempt to run stateful
720 update, force a full reimage. If False, try stateful update
721 first when the dut is already installed with the same version.
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500722 @raises autoupdater.ChromiumOSError
723
724 """
Chris Sosae92399e2015-04-24 11:32:59 -0700725 devserver = None
Richard Barnette0b023a72015-04-24 16:07:30 +0000726 if repair:
Chris Sosae92399e2015-04-24 11:32:59 -0700727 update_url, devserver = self._stage_image_for_update()
Richard Barnette0b023a72015-04-24 16:07:30 +0000728 force_update = True
Dan Shi0f466e82013-02-22 15:44:58 -0800729
Chris Sosae92399e2015-04-24 11:32:59 -0700730 if not update_url and not self._parser.options.image:
731 raise error.AutoservError(
Dan Shi6731a6c2015-09-24 14:49:25 -0700732 'There is no update URL, nor a method to get one.')
Chris Sosae92399e2015-04-24 11:32:59 -0700733
734 if not update_url and self._parser.options.image:
735 # This is the base case where we have no given update URL i.e.
736 # dynamic suites logic etc. This is the most flexible case where we
737 # can serve an update from any of our fleet of devservers.
738 requested_build = self._parser.options.image
739 if not requested_build.startswith('http://'):
740 logging.debug('Update will be staged for this installation')
741 update_url, devserver = self._stage_image_for_update(
Dan Shi6731a6c2015-09-24 14:49:25 -0700742 requested_build)
Chris Sosae92399e2015-04-24 11:32:59 -0700743 else:
744 update_url = requested_build
745
746 logging.debug('Update URL is %s', update_url)
747
Scott Zawalskieadbf702013-03-14 09:23:06 -0400748 # Remove cros-version and job_repo_url host attribute from host.
749 self.clear_cros_version_labels_and_job_repo_url()
Chris Sosae92399e2015-04-24 11:32:59 -0700750
Dan Shi6731a6c2015-09-24 14:49:25 -0700751 # Create a file to indicate if provision fails. The file will be removed
752 # by stateful update or full install.
753 self.run('touch %s' % PROVISION_FAILED)
754
Chris Sosae92399e2015-04-24 11:32:59 -0700755 update_complete = False
756 updater = autoupdater.ChromiumOSUpdater(
757 update_url, host=self, local_devserver=local_devserver)
Fang Deng3d3b9272014-12-22 12:20:28 -0800758 if not force_full_update:
759 try:
Chris Sosae92399e2015-04-24 11:32:59 -0700760 # If the DUT is already running the same build, try stateful
761 # update first as it's much quicker than a full re-image.
762 update_complete = self._try_stateful_update(
Dan Shi6731a6c2015-09-24 14:49:25 -0700763 update_url, force_update, updater)
Fang Deng3d3b9272014-12-22 12:20:28 -0800764 except Exception as e:
765 logging.exception(e)
J. Richard Barnette45e93de2012-04-11 17:24:15 -0700766
Dan Shi0f466e82013-02-22 15:44:58 -0800767 inactive_kernel = None
Chris Sosae92399e2015-04-24 11:32:59 -0700768 if update_complete or (not force_update and updater.check_version()):
769 logging.info('Install complete without full update')
770 else:
771 logging.info('DUT requires full update.')
772 self.reboot(timeout=self.REBOOT_TIMEOUT, wait=True)
773 num_of_attempts = provision.FLAKY_DEVSERVER_ATTEMPTS
Chris Sosab7612bc2013-03-21 10:32:37 -0700774
Chris Sosae92399e2015-04-24 11:32:59 -0700775 while num_of_attempts > 0:
776 num_of_attempts -= 1
777 try:
778 updater.run_update()
779 except Exception:
780 logging.warn('Autoupdate did not complete.')
781 # Do additional check for the devserver health. Ideally,
782 # the autoupdater.py could raise an exception when it
783 # detected network flake but that would require
784 # instrumenting the update engine and parsing it log.
785 if (num_of_attempts <= 0 or
786 devserver is None or
787 dev_server.DevServer.devserver_healthy(
788 devserver.url())):
Dan Shi6731a6c2015-09-24 14:49:25 -0700789 raise
J. Richard Barnette45e93de2012-04-11 17:24:15 -0700790
Chris Sosae92399e2015-04-24 11:32:59 -0700791 logging.warn('Devserver looks unhealthy. Trying another')
792 update_url, devserver = self._stage_image_for_update(
793 requested_build)
794 logging.debug('New Update URL is %s', update_url)
795 updater = autoupdater.ChromiumOSUpdater(
796 update_url, host=self,
797 local_devserver=local_devserver)
798 else:
799 break
J. Richard Barnette45e93de2012-04-11 17:24:15 -0700800
Chris Sosae92399e2015-04-24 11:32:59 -0700801 # Give it some time in case of IO issues.
802 time.sleep(10)
Dan Shi5699ac22014-12-19 10:55:49 -0800803
Chris Sosae92399e2015-04-24 11:32:59 -0700804 # Figure out active and inactive kernel.
805 active_kernel, inactive_kernel = updater.get_kernel_state()
Simran Basi13fa1ba2013-03-04 10:56:47 -0800806
Chris Sosae92399e2015-04-24 11:32:59 -0700807 # Ensure inactive kernel has higher priority than active.
808 if (updater.get_kernel_priority(inactive_kernel)
809 < updater.get_kernel_priority(active_kernel)):
810 raise autoupdater.ChromiumOSError(
811 'Update failed. The priority of the inactive kernel'
812 ' partition is less than that of the active kernel'
813 ' partition.')
814
815 # Updater has returned successfully; reboot the host.
816 self.reboot(timeout=self.REBOOT_TIMEOUT, wait=True)
817
818 self._post_update_processing(updater, inactive_kernel)
819 self.add_cros_version_labels_and_job_repo_url(
820 autoupdater.url_to_image_name(update_url))
J. Richard Barnette45e93de2012-04-11 17:24:15 -0700821
822
Dan Shi9cb0eec2014-06-03 09:04:50 -0700823 def _clear_fw_version_labels(self):
824 """Clear firmware version labels from the machine."""
825 labels = self._AFE.get_labels(
Dan Shi0723bf52015-06-24 10:52:38 -0700826 name__startswith=provision.FW_RW_VERSION_PREFIX,
Dan Shi9cb0eec2014-06-03 09:04:50 -0700827 host__hostname=self.hostname)
828 for label in labels:
829 label.remove_hosts(hosts=[self.hostname])
830
831
832 def _add_fw_version_label(self, build):
833 """Add firmware version label to the machine.
834
835 @param build: Build of firmware.
836
837 """
838 fw_label = provision.fw_version_to_label(build)
MK Ryu73be9862015-07-06 12:25:00 -0700839 self._AFE.run('label_add_hosts', id=fw_label, hosts=[self.hostname])
Dan Shi9cb0eec2014-06-03 09:04:50 -0700840
841
842 def firmware_install(self, build=None):
843 """Install firmware to the DUT.
844
845 Use stateful update if the DUT is already running the same build.
846 Stateful update does not update kernel and tends to run much faster
847 than a full reimage. If the DUT is running a different build, or it
848 failed to do a stateful update, full update, including kernel update,
849 will be applied to the DUT.
850
851 Once a host enters firmware_install its fw_version label will be
852 removed. After the firmware is updated successfully, a new fw_version
853 label will be added to the host.
854
855 @param build: The build version to which we want to provision the
856 firmware of the machine,
857 e.g. 'link-firmware/R22-2695.1.144'.
858
859 TODO(dshi): After bug 381718 is fixed, update here with corresponding
860 exceptions that could be raised.
861
862 """
863 if not self.servo:
864 raise error.TestError('Host %s does not have servo.' %
865 self.hostname)
866
867 # TODO(fdeng): use host.get_board() after
868 # crbug.com/271834 is fixed.
869 board = self._get_board_from_afe()
870
Chris Sosae92399e2015-04-24 11:32:59 -0700871 # If build is not set, try to install firmware from stable CrOS.
Dan Shi9cb0eec2014-06-03 09:04:50 -0700872 if not build:
873 build = self.get_repair_image_name()
874
875 config = FAFTConfig(board)
876 if config.use_u_boot:
877 ap_image = 'image-%s.bin' % board
878 else: # Depthcharge platform
879 ap_image = 'image.bin'
880 ec_image = 'ec.bin'
881 ds = dev_server.ImageServer.resolve(build)
882 ds.stage_artifacts(build, ['firmware'])
883
884 tmpd = autotemp.tempdir(unique_id='fwimage')
885 try:
886 fwurl = self._FW_IMAGE_URL_PATTERN % (ds.url(), build)
887 local_tarball = os.path.join(tmpd.name, os.path.basename(fwurl))
888 server_utils.system('wget -O %s %s' % (local_tarball, fwurl),
889 timeout=60)
890 server_utils.system('tar xf %s -C %s %s %s' %
891 (local_tarball, tmpd.name, ap_image, ec_image),
892 timeout=60)
893 server_utils.system('tar xf %s --wildcards -C %s "dts/*"' %
894 (local_tarball, tmpd.name),
895 timeout=60, ignore_status=True)
896
897 self._clear_fw_version_labels()
898 logging.info('Will re-program EC now')
899 self.servo.program_ec(os.path.join(tmpd.name, ec_image))
900 logging.info('Will re-program BIOS now')
901 self.servo.program_bios(os.path.join(tmpd.name, ap_image))
902 self.servo.get_power_state_controller().reset()
903 time.sleep(self.servo.BOOT_DELAY)
Dan Shia5fef052015-05-18 23:28:47 -0700904 self._add_fw_version_label(build)
Dan Shi9cb0eec2014-06-03 09:04:50 -0700905 finally:
906 tmpd.clean()
907
908
Dan Shi10e992b2013-08-30 11:02:59 -0700909 def show_update_engine_log(self):
910 """Output update engine log."""
MK Ryu35d661e2014-09-25 17:44:10 -0700911 logging.debug('Dumping %s', client_constants.UPDATE_ENGINE_LOG)
912 self.run('cat %s' % client_constants.UPDATE_ENGINE_LOG)
Dan Shi10e992b2013-08-30 11:02:59 -0700913
914
Richard Barnette82c35912012-11-20 10:09:10 -0800915 def _get_board_from_afe(self):
916 """Retrieve this host's board from its labels in the AFE.
917
918 Looks for a host label of the form "board:<board>", and
919 returns the "<board>" part of the label. `None` is returned
920 if there is not a single, unique label matching the pattern.
921
922 @returns board from label, or `None`.
923 """
Dan Shia1ecd5c2013-06-06 11:21:31 -0700924 return server_utils.get_board_from_afe(self.hostname, self._AFE)
Simran Basi833814b2013-01-29 13:13:43 -0800925
926
927 def get_build(self):
928 """Retrieve the current build for this Host from the AFE.
929
930 Looks through this host's labels in the AFE to determine its build.
931
932 @returns The current build or None if it could not find it or if there
933 were multiple build labels assigned to this host.
934 """
Dan Shia1ecd5c2013-06-06 11:21:31 -0700935 return server_utils.get_build_from_afe(self.hostname, self._AFE)
Richard Barnette82c35912012-11-20 10:09:10 -0800936
937
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500938 def _install_repair(self):
Chris Sosae92399e2015-04-24 11:32:59 -0700939 """Attempt to repair this host using the update-engine.
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500940
941 If the host is up, try installing the DUT with a stable
Dan Shi6964fa52014-12-18 11:04:27 -0800942 "repair" version of Chrome OS as defined in afe_stable_versions table.
943 If the table is not setup, global_config value under
944 CROS.stable_cros_version will be used instead.
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500945
Scott Zawalski62bacae2013-03-05 10:40:32 -0500946 @raises AutoservRepairMethodNA if the DUT is not reachable.
947 @raises ChromiumOSError if the install failed for some reason.
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500948
949 """
950 if not self.is_up():
Scott Zawalski62bacae2013-03-05 10:40:32 -0500951 raise error.AutoservRepairMethodNA('DUT unreachable for install.')
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500952 logging.info('Attempting to reimage machine to repair image.')
953 try:
Richard Barnette0b023a72015-04-24 16:07:30 +0000954 self.machine_install(repair=True)
Fang Dengd0672f32013-03-18 17:18:09 -0700955 except autoupdater.ChromiumOSError as e:
956 logging.exception(e)
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500957 logging.info('Repair via install failed.')
Scott Zawalski62bacae2013-03-05 10:40:32 -0500958 raise
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500959
960
Dan Shi2c88eed2013-11-12 10:18:38 -0800961 def _install_repair_with_powerwash(self):
Dan Shi9cc48452013-11-12 12:39:26 -0800962 """Attempt to powerwash first then repair this host using update-engine.
Dan Shi2c88eed2013-11-12 10:18:38 -0800963
Dan Shi9cc48452013-11-12 12:39:26 -0800964 update-engine may fail due to a bad image. In such case, powerwash
965 may help to cleanup the DUT for update-engine to work again.
Dan Shi2c88eed2013-11-12 10:18:38 -0800966
967 @raises AutoservRepairMethodNA if the DUT is not reachable.
968 @raises ChromiumOSError if the install failed for some reason.
969
970 """
971 if not self.is_up():
972 raise error.AutoservRepairMethodNA('DUT unreachable for install.')
973
974 logging.info('Attempting to powerwash the DUT.')
975 self.run('echo "fast safe" > '
976 '/mnt/stateful_partition/factory_install_reset')
977 self.reboot(timeout=self.POWERWASH_BOOT_TIMEOUT, wait=True)
978 if not self.is_up():
Dan Shi9cc48452013-11-12 12:39:26 -0800979 logging.error('Powerwash failed. DUT did not come back after '
Dan Shi2c88eed2013-11-12 10:18:38 -0800980 'reboot.')
981 raise error.AutoservRepairFailure(
982 'DUT failed to boot from powerwash after %d seconds' %
983 self.POWERWASH_BOOT_TIMEOUT)
984
985 logging.info('Powerwash succeeded.')
986 self._install_repair()
987
988
beepsf079cfb2013-09-18 17:49:51 -0700989 def servo_install(self, image_url=None, usb_boot_timeout=USB_BOOT_TIMEOUT,
990 install_timeout=INSTALL_TIMEOUT):
Scott Zawalski62bacae2013-03-05 10:40:32 -0500991 """
992 Re-install the OS on the DUT by:
993 1) installing a test image on a USB storage device attached to the Servo
994 board,
Richard Barnette03a0c132012-11-05 12:40:35 -0800995 2) booting that image in recovery mode, and then
J. Richard Barnette31b2e312013-04-04 16:05:22 -0700996 3) installing the image with chromeos-install.
997
Scott Zawalski62bacae2013-03-05 10:40:32 -0500998 @param image_url: If specified use as the url to install on the DUT.
999 otherwise boot the currently staged image on the USB stick.
beepsf079cfb2013-09-18 17:49:51 -07001000 @param usb_boot_timeout: The usb_boot_timeout to use during reimage.
1001 Factory images need a longer usb_boot_timeout than regular
1002 cros images.
1003 @param install_timeout: The timeout to use when installing the chromeos
1004 image. Factory images need a longer install_timeout.
Richard Barnette03a0c132012-11-05 12:40:35 -08001005
Scott Zawalski62bacae2013-03-05 10:40:32 -05001006 @raises AutoservError if the image fails to boot.
beepsf079cfb2013-09-18 17:49:51 -07001007
J. Richard Barnette0199cc82014-12-05 17:08:40 -08001008 """
beepsf079cfb2013-09-18 17:49:51 -07001009 usb_boot_timer_key = ('servo_install.usb_boot_timeout_%s'
1010 % usb_boot_timeout)
1011 logging.info('Downloading image to USB, then booting from it. Usb boot '
1012 'timeout = %s', usb_boot_timeout)
Gabe Black1e1c41b2015-02-04 23:55:15 -08001013 timer = autotest_stats.Timer(usb_boot_timer_key)
beepsf079cfb2013-09-18 17:49:51 -07001014 timer.start()
J. Richard Barnette31b2e312013-04-04 16:05:22 -07001015 self.servo.install_recovery_image(image_url)
beepsf079cfb2013-09-18 17:49:51 -07001016 if not self.wait_up(timeout=usb_boot_timeout):
Scott Zawalski62bacae2013-03-05 10:40:32 -05001017 raise error.AutoservRepairFailure(
1018 'DUT failed to boot from USB after %d seconds' %
beepsf079cfb2013-09-18 17:49:51 -07001019 usb_boot_timeout)
1020 timer.stop()
Scott Zawalski62bacae2013-03-05 10:40:32 -05001021
Tom Wai-Hong Tamf6b4f812015-08-08 04:14:59 +08001022 # The new chromeos-tpm-recovery has been merged since R44-7073.0.0.
1023 # In old CrOS images, this command fails. Skip the error.
Tom Wai-Hong Tam27af7332015-07-25 06:09:39 +08001024 logging.info('Resetting the TPM status')
Tom Wai-Hong Tamf6b4f812015-08-08 04:14:59 +08001025 try:
1026 self.run('chromeos-tpm-recovery')
1027 except error.AutoservRunError:
1028 logging.warn('chromeos-tpm-recovery is too old.')
1029
Tom Wai-Hong Tam27af7332015-07-25 06:09:39 +08001030
beepsf079cfb2013-09-18 17:49:51 -07001031 install_timer_key = ('servo_install.install_timeout_%s'
1032 % install_timeout)
Gabe Black1e1c41b2015-02-04 23:55:15 -08001033 timer = autotest_stats.Timer(install_timer_key)
beepsf079cfb2013-09-18 17:49:51 -07001034 timer.start()
1035 logging.info('Installing image through chromeos-install.')
J. Richard Barnette9af19632015-09-25 12:18:03 -07001036 self.run('chromeos-install --yes', timeout=install_timeout)
1037 self.halt()
beepsf079cfb2013-09-18 17:49:51 -07001038 timer.stop()
1039
1040 logging.info('Power cycling DUT through servo.')
J. Richard Barnette0199cc82014-12-05 17:08:40 -08001041 self.servo.get_power_state_controller().power_off()
Fang Dengafb88142013-05-30 17:44:31 -07001042 self.servo.switch_usbkey('off')
J. Richard Barnette0199cc82014-12-05 17:08:40 -08001043 # N.B. The Servo API requires that we use power_on() here
1044 # for two reasons:
1045 # 1) After turning on a DUT in recovery mode, you must turn
1046 # it off and then on with power_on() once more to
1047 # disable recovery mode (this is a Parrot specific
1048 # requirement).
1049 # 2) After power_off(), the only way to turn on is with
1050 # power_on() (this is a Storm specific requirement).
J. Richard Barnettefbcc7122013-07-24 18:24:59 -07001051 self.servo.get_power_state_controller().power_on()
beepsf079cfb2013-09-18 17:49:51 -07001052
1053 logging.info('Waiting for DUT to come back up.')
Richard Barnette03a0c132012-11-05 12:40:35 -08001054 if not self.wait_up(timeout=self.BOOT_TIMEOUT):
1055 raise error.AutoservError('DUT failed to reboot installed '
1056 'test image after %d seconds' %
Scott Zawalski62bacae2013-03-05 10:40:32 -05001057 self.BOOT_TIMEOUT)
1058
1059
Dan Shic1b8bdd2015-09-14 23:11:24 -07001060 def _setup_servo(self):
1061 """Try to force to create servo object if it's not set up yet.
1062 """
1063 if self.servo:
1064 return
1065
1066 try:
1067 # Setting servo_args to {} will force it to create the servo_host
1068 # object if possible.
1069 self._servo_host = servo_host.create_servo_host(
1070 dut=self.hostname, servo_args={})
1071 if self._servo_host:
1072 self.servo = self._servo_host.get_servo()
1073 else:
1074 logging.error('Failed to create servo_host object.')
1075 except Exception as e:
1076 logging.error('Failed to create servo object: %s', e)
1077
1078
J. Richard Barnettee4af8b92013-05-01 13:16:12 -07001079 def _servo_repair_reinstall(self):
Scott Zawalski62bacae2013-03-05 10:40:32 -05001080 """Reinstall the DUT utilizing servo and a test image.
1081
1082 Re-install the OS on the DUT by:
1083 1) installing a test image on a USB storage device attached to the Servo
1084 board,
Tom Wai-Hong Tam27af7332015-07-25 06:09:39 +08001085 2) booting that image in recovery mode,
1086 3) resetting the TPM status, and then
1087 4) installing the image with chromeos-install.
Scott Zawalski62bacae2013-03-05 10:40:32 -05001088
Scott Zawalski62bacae2013-03-05 10:40:32 -05001089 @raises AutoservRepairMethodNA if the device does not have servo
1090 support.
1091
1092 """
Dan Shic1b8bdd2015-09-14 23:11:24 -07001093 # To repair a DUT connected to a moblab, try to create a servo object if
1094 # it was failed to be created earlier as there may be a servo_host host
1095 # attribute for this host.
1096 if utils.is_moblab():
1097 self._setup_servo()
1098
Scott Zawalski62bacae2013-03-05 10:40:32 -05001099 if not self.servo:
1100 raise error.AutoservRepairMethodNA('Repair Reinstall NA: '
1101 'DUT has no servo support.')
1102
1103 logging.info('Attempting to recovery servo enabled device with '
1104 'servo_repair_reinstall')
1105
J. Richard Barnettee4af8b92013-05-01 13:16:12 -07001106 image_url = self.stage_image_for_servo()
Scott Zawalski62bacae2013-03-05 10:40:32 -05001107 self.servo_install(image_url)
1108
1109
1110 def _servo_repair_power(self):
1111 """Attempt to repair DUT using an attached Servo.
1112
1113 Attempt to power on the DUT via power_long_press.
1114
1115 @raises AutoservRepairMethodNA if the device does not have servo
1116 support.
1117 @raises AutoservRepairFailure if the repair fails for any reason.
1118 """
1119 if not self.servo:
1120 raise error.AutoservRepairMethodNA('Repair Power NA: '
1121 'DUT has no servo support.')
1122
1123 logging.info('Attempting to recover servo enabled device by '
1124 'powering it off and on.')
1125 self.servo.get_power_state_controller().power_off()
1126 self.servo.get_power_state_controller().power_on()
1127 if self.wait_up(self.BOOT_TIMEOUT):
1128 return
1129
1130 raise error.AutoservRepairFailure('DUT did not boot after long_press.')
Richard Barnette03a0c132012-11-05 12:40:35 -08001131
1132
Richard Barnette82c35912012-11-20 10:09:10 -08001133 def _powercycle_to_repair(self):
1134 """Utilize the RPM Infrastructure to bring the host back up.
1135
1136 If the host is not up/repaired after the first powercycle we utilize
1137 auto fallback to the last good install by powercycling and rebooting the
1138 host 6 times.
Scott Zawalski62bacae2013-03-05 10:40:32 -05001139
1140 @raises AutoservRepairMethodNA if the device does not support remote
1141 power.
1142 @raises AutoservRepairFailure if the repair fails for any reason.
1143
Richard Barnette82c35912012-11-20 10:09:10 -08001144 """
Scott Zawalski62bacae2013-03-05 10:40:32 -05001145 if not self.has_power():
1146 raise error.AutoservRepairMethodNA('Device does not support power.')
1147
Richard Barnette82c35912012-11-20 10:09:10 -08001148 logging.info('Attempting repair via RPM powercycle.')
1149 failed_cycles = 0
1150 self.power_cycle()
1151 while not self.wait_up(timeout=self.BOOT_TIMEOUT):
1152 failed_cycles += 1
1153 if failed_cycles >= self._MAX_POWER_CYCLE_ATTEMPTS:
Scott Zawalski62bacae2013-03-05 10:40:32 -05001154 raise error.AutoservRepairFailure(
1155 'Powercycled host %s %d times; device did not come back'
1156 ' online.' % (self.hostname, failed_cycles))
Richard Barnette82c35912012-11-20 10:09:10 -08001157 self.power_cycle()
1158 if failed_cycles == 0:
1159 logging.info('Powercycling was successful first time.')
1160 else:
1161 logging.info('Powercycling was successful after %d failures.',
1162 failed_cycles)
1163
1164
MK Ryu35d661e2014-09-25 17:44:10 -07001165 def _reboot_repair(self):
1166 """SSH to this host and reboot."""
1167 if not self.is_up(self._CHECK_HOST_UP_TIMEOUT_SECS):
1168 raise error.AutoservRepairMethodNA('DUT unreachable for reboot.')
1169 logging.info('Attempting repair via SSH reboot.')
1170 self.reboot(timeout=self.BOOT_TIMEOUT, wait=True)
1171
1172
Prashanth B4d8184f2014-05-05 12:22:02 -07001173 def check_device(self):
1174 """Check if a device is ssh-able, and if so, clean and verify it.
1175
1176 @raise AutoservSSHTimeout: If the ssh ping times out.
1177 @raise AutoservSshPermissionDeniedError: If ssh ping fails due to
1178 permissions.
1179 @raise AutoservSshPingHostError: For other AutoservRunErrors during
1180 ssh_ping.
1181 @raises AutoservError: As appropriate, during cleanup and verify.
1182 """
1183 self.ssh_ping()
1184 self.cleanup()
1185 self.verify()
1186
1187
Dan Shi90466352015-09-22 15:01:05 -07001188 def confirm_servo(self):
1189 """Confirm servo is initialized and verified.
1190
1191 @raise AutoservError: If servo is not initialized and verified.
1192 """
1193 if self._servo_host.required_by_test and self.servo:
1194 return
1195
1196 # Force to re-create the servo object to make sure servo is verified.
1197 logging.debug('Rebuilding the servo object.')
1198 self.servo = None
1199 self._servo_host = None
1200 self._setup_servo()
1201 if not self.servo:
1202 raise error.AutoservError('Failed to create servo object.')
1203
1204
Dan Shi6731a6c2015-09-24 14:49:25 -07001205 def _is_last_provision_failed(self):
1206 """Checks if the last provision job failed.
1207
1208 @return: True if there exists file /var/tmp/provision_failed, which
1209 indicates the last provision job failed.
1210 False otherwise.
1211 """
1212 result = self.run('[ -f %s ]' % PROVISION_FAILED, ignore_status=True)
1213 return result.exit_status == 0
1214
1215
Richard Barnette82c35912012-11-20 10:09:10 -08001216 def repair_full(self):
1217 """Repair a host for repair level NO_PROTECTION.
1218
1219 This overrides the base class function for repair; it does
1220 not call back to the parent class, but instead offers a
1221 simplified implementation based on the capabilities in the
1222 Chrome OS test lab.
1223
Fang Deng5d518f42013-08-02 14:04:32 -07001224 It first verifies and repairs servo if it is a DUT in CrOS
Fang Deng03590af2013-10-07 17:34:20 -07001225 lab and a servo is attached.
Fang Deng5d518f42013-08-02 14:04:32 -07001226
Jakob Juelich82b7d1c2014-09-15 16:10:57 -07001227 This escalates in order through the following procedures and verifies
1228 the status using `self.check_device()` after each of them. This is done
1229 until both the repair and the veryfing step succeed.
1230
MK Ryu35d661e2014-09-25 17:44:10 -07001231 Escalation order of repair procedures from less intrusive to
1232 more intrusive repairs:
1233 1. SSH to the DUT and reboot.
Scott Zawalski62bacae2013-03-05 10:40:32 -05001234 2. If there's a servo for the DUT, try to power the DUT off and
1235 on.
MK Ryu35d661e2014-09-25 17:44:10 -07001236 3. If the DUT can be power-cycled via RPM, try to repair
Richard Barnette82c35912012-11-20 10:09:10 -08001237 by power-cycling.
MK Ryu35d661e2014-09-25 17:44:10 -07001238 4. Try to re-install to a known stable image using
1239 auto-update.
1240 5. If there's a servo for the DUT, try to re-install via
1241 the servo.
Richard Barnette82c35912012-11-20 10:09:10 -08001242
1243 As with the parent method, the last operation performed on
Prashanth B4d8184f2014-05-05 12:22:02 -07001244 the DUT must be to call `self.check_device()`; If that call fails the
1245 exception it raises is passed back to the caller.
J. Richard Barnettefde55fc2013-03-15 17:47:01 -07001246
Scott Zawalski62bacae2013-03-05 10:40:32 -05001247 @raises AutoservRepairTotalFailure if the repair process fails to
1248 fix the DUT.
Fang Deng5d518f42013-08-02 14:04:32 -07001249 @raises ServoHostRepairTotalFailure if the repair process fails to
1250 fix the servo host if one is attached to the DUT.
1251 @raises AutoservSshPermissionDeniedError if it is unable
1252 to ssh to the servo host due to permission error.
1253
Richard Barnette82c35912012-11-20 10:09:10 -08001254 """
Jakob Juelich82b7d1c2014-09-15 16:10:57 -07001255 # Caution: Deleting shards relies on repair to always reboot the DUT.
1256
Dan Shi4d478522014-02-14 13:46:32 -08001257 if self._servo_host and not self.servo:
Fang Deng03590af2013-10-07 17:34:20 -07001258 try:
Dan Shi4d478522014-02-14 13:46:32 -08001259 self._servo_host.repair_full()
Fang Deng03590af2013-10-07 17:34:20 -07001260 except Exception as e:
Fang Deng03590af2013-10-07 17:34:20 -07001261 logging.error('Could not create a healthy servo: %s', e)
Dan Shi4d478522014-02-14 13:46:32 -08001262 self.servo = self._servo_host.get_servo()
Fang Deng5d518f42013-08-02 14:04:32 -07001263
MK Ryu35d661e2014-09-25 17:44:10 -07001264 self.try_collect_crashlogs()
1265
Scott Zawalski62bacae2013-03-05 10:40:32 -05001266 # TODO(scottz): This should use something similar to label_decorator,
1267 # but needs to be populated in order so DUTs are repaired with the
1268 # least amount of effort.
Dan Shi6731a6c2015-09-24 14:49:25 -07001269 if self._is_last_provision_failed():
1270 logging.info('Last provision failed, try powerwash first.')
1271 repair_funcs = [self._install_repair_with_powerwash,
1272 self._servo_repair_reinstall]
1273 else:
1274 repair_funcs = [self._reboot_repair,
1275 self._servo_repair_power,
1276 self._powercycle_to_repair,
1277 self._install_repair,
1278 self._install_repair_with_powerwash,
1279 self._servo_repair_reinstall]
Scott Zawalski62bacae2013-03-05 10:40:32 -05001280 errors = []
Simran Basie6130932013-10-01 14:07:52 -07001281 board = self._get_board_from_afe()
Scott Zawalski62bacae2013-03-05 10:40:32 -05001282 for repair_func in repair_funcs:
1283 try:
1284 repair_func()
MK Ryu35d661e2014-09-25 17:44:10 -07001285 self.try_collect_crashlogs()
Prashanth B4d8184f2014-05-05 12:22:02 -07001286 self.check_device()
Gabe Black1e1c41b2015-02-04 23:55:15 -08001287 autotest_stats.Counter(
Simran Basie6130932013-10-01 14:07:52 -07001288 '%s.SUCCEEDED' % repair_func.__name__).increment()
1289 if board:
Gabe Black1e1c41b2015-02-04 23:55:15 -08001290 autotest_stats.Counter(
Dan Shib87c3aa2014-02-12 15:40:31 -08001291 '%s.%s.SUCCEEDED' % (repair_func.__name__,
Simran Basie6130932013-10-01 14:07:52 -07001292 board)).increment()
Scott Zawalski62bacae2013-03-05 10:40:32 -05001293 return
Simran Basie6130932013-10-01 14:07:52 -07001294 except error.AutoservRepairMethodNA as e:
Gabe Black1e1c41b2015-02-04 23:55:15 -08001295 autotest_stats.Counter(
Simran Basie6130932013-10-01 14:07:52 -07001296 '%s.RepairNA' % repair_func.__name__).increment()
1297 if board:
Gabe Black1e1c41b2015-02-04 23:55:15 -08001298 autotest_stats.Counter(
Dan Shib87c3aa2014-02-12 15:40:31 -08001299 '%s.%s.RepairNA' % (repair_func.__name__,
Simran Basie6130932013-10-01 14:07:52 -07001300 board)).increment()
Ilja H. Friedel04be2bd2014-05-07 21:29:59 -07001301 logging.warning('Repair function NA: %s', e)
Simran Basie6130932013-10-01 14:07:52 -07001302 errors.append(str(e))
Scott Zawalski62bacae2013-03-05 10:40:32 -05001303 except Exception as e:
Gabe Black1e1c41b2015-02-04 23:55:15 -08001304 autotest_stats.Counter(
Simran Basie6130932013-10-01 14:07:52 -07001305 '%s.FAILED' % repair_func.__name__).increment()
1306 if board:
Gabe Black1e1c41b2015-02-04 23:55:15 -08001307 autotest_stats.Counter(
Dan Shib87c3aa2014-02-12 15:40:31 -08001308 '%s.%s.FAILED' % (repair_func.__name__,
Simran Basie6130932013-10-01 14:07:52 -07001309 board)).increment()
Ilja H. Friedel04be2bd2014-05-07 21:29:59 -07001310 logging.warning('Failed to repair device: %s', e)
Scott Zawalski62bacae2013-03-05 10:40:32 -05001311 errors.append(str(e))
Scott Zawalski89c44dd2013-02-26 09:28:02 -05001312
Gabe Black1e1c41b2015-02-04 23:55:15 -08001313 autotest_stats.Counter('Full_Repair_Failed').increment()
Simran Basie6130932013-10-01 14:07:52 -07001314 if board:
Gabe Black1e1c41b2015-02-04 23:55:15 -08001315 autotest_stats.Counter(
Simran Basie6130932013-10-01 14:07:52 -07001316 'Full_Repair_Failed.%s' % board).increment()
Scott Zawalski62bacae2013-03-05 10:40:32 -05001317 raise error.AutoservRepairTotalFailure(
1318 'All attempts at repairing the device failed:\n%s' %
1319 '\n'.join(errors))
Richard Barnette82c35912012-11-20 10:09:10 -08001320
1321
MK Ryu35d661e2014-09-25 17:44:10 -07001322 def try_collect_crashlogs(self, check_host_up=True):
1323 """
1324 Check if a host is up and logs need to be collected from the host,
1325 if yes, collect them.
1326
1327 @param check_host_up: Flag for checking host is up. Default is True.
1328 """
1329 try:
1330 crash_job = self._need_crash_logs()
1331 if crash_job:
1332 logging.debug('%s: Job %s was crashed', self._CRASHLOGS_PREFIX,
1333 crash_job)
1334 if not check_host_up or self.is_up(
1335 self._CHECK_HOST_UP_TIMEOUT_SECS):
1336 self._collect_crashlogs(crash_job)
1337 logging.debug('%s: Completed collecting logs for the '
1338 'crashed job %s', self._CRASHLOGS_PREFIX,
1339 crash_job)
1340 except Exception as e:
1341 # Exception should not result in repair failure.
1342 # Therefore, suppress all exceptions here.
1343 logging.error('%s: Failed while trying to collect crash-logs: %s',
1344 self._CRASHLOGS_PREFIX, e)
1345
1346
1347 def _need_crash_logs(self):
1348 """Get the value of need_crash_logs attribute of this host.
1349
1350 @return: Value string of need_crash_logs attribute
1351 None if there is no need_crash_logs attribute
1352 """
1353 attrs = self._AFE.get_host_attribute(constants.CRASHLOGS_HOST_ATTRIBUTE,
1354 hostname=self.hostname)
1355 assert len(attrs) < 2
1356 return attrs[0].value if attrs else None
1357
1358
1359 def _collect_crashlogs(self, job_id):
1360 """Grab logs from the host where a job was crashed.
1361
1362 First, check if PRIOR_LOGS_DIR exists in the host.
1363 If yes, collect them.
1364 Otherwise, check if a lab-machine marker (_LAB_MACHINE_FILE) exists
1365 in the host.
1366 If yes, the host was repaired automatically, and we collect normal
1367 system logs.
1368
1369 @param job_id: Id of the job that was crashed.
1370 """
1371 crashlogs_dir = crashcollect.get_crashinfo_dir(self,
1372 constants.CRASHLOGS_DEST_DIR_PREFIX)
1373 flag_prior_logs = False
1374
1375 if self.path_exists(client_constants.PRIOR_LOGS_DIR):
1376 flag_prior_logs = True
1377 self._collect_prior_logs(crashlogs_dir)
1378 elif self.path_exists(self._LAB_MACHINE_FILE):
1379 self._collect_system_logs(crashlogs_dir)
1380 else:
1381 logging.warning('%s: Host was manually re-installed without '
1382 '--lab_preserve_log option. Skip collecting '
1383 'crash-logs.', self._CRASHLOGS_PREFIX)
1384
1385 # We make crash collection be one-time effort.
1386 # _collect_prior_logs() and _collect_system_logs() will not throw
1387 # any exception, and following codes will be executed even when
1388 # those methods fail.
1389 # _collect_crashlogs() is called only when the host is up (refer
1390 # to try_collect_crashlogs()). We assume _collect_prior_logs() and
1391 # _collect_system_logs() fail rarely when the host is up.
1392 # In addition, it is not clear how many times we should try crash
1393 # collection again while not triggering next repair unnecessarily.
1394 # Threfore, we try crash collection one time.
1395
1396 # Create a marker file as soon as log collection is done.
1397 # Leave the job id to this marker for gs_offloader to consume.
1398 marker_file = os.path.join(crashlogs_dir, constants.CRASHLOGS_MARKER)
1399 with open(marker_file, 'a') as f:
1400 f.write('%s\n' % job_id)
1401
1402 # Remove need_crash_logs attribute
1403 logging.debug('%s: Remove attribute need_crash_logs from host %s',
1404 self._CRASHLOGS_PREFIX, self.hostname)
1405 self._AFE.set_host_attribute(constants.CRASHLOGS_HOST_ATTRIBUTE,
1406 None, hostname=self.hostname)
1407
1408 if flag_prior_logs:
1409 logging.debug('%s: Remove %s from host %s', self._CRASHLOGS_PREFIX,
1410 client_constants.PRIOR_LOGS_DIR, self.hostname)
1411 self.run('rm -rf %s; sync' % client_constants.PRIOR_LOGS_DIR)
1412 # Wait for a few seconds to make sure the prior command is
1413 # done deep through storage.
1414 time.sleep(self._SAFE_WAIT_SECS)
1415
1416
1417 def _collect_prior_logs(self, crashlogs_dir):
1418 """Grab prior logs that were stashed before re-installing a host.
1419
1420 @param crashlogs_dir: Directory path where crash-logs are stored.
1421 """
1422 logging.debug('%s: Found %s, collecting them...',
1423 self._CRASHLOGS_PREFIX, client_constants.PRIOR_LOGS_DIR)
1424 try:
1425 self.collect_logs(client_constants.PRIOR_LOGS_DIR,
1426 crashlogs_dir, False)
1427 logging.debug('%s: %s is collected',
1428 self._CRASHLOGS_PREFIX, client_constants.PRIOR_LOGS_DIR)
1429 except Exception as e:
1430 logging.error('%s: Failed to collect %s: %s',
1431 self._CRASHLOGS_PREFIX, client_constants.PRIOR_LOGS_DIR,
1432 e)
1433
1434
1435 def _collect_system_logs(self, crashlogs_dir):
1436 """Grab normal system logs from a host.
1437
1438 @param crashlogs_dir: Directory path where crash-logs are stored.
1439 """
1440 logging.debug('%s: Found %s, collecting system logs...',
1441 self._CRASHLOGS_PREFIX, self._LAB_MACHINE_FILE)
1442 sources = server_utils.parse_simple_config(self._LOGS_TO_COLLECT_FILE)
1443 for src in sources:
1444 try:
1445 if self.path_exists(src):
1446 logging.debug('%s: Collecting %s...',
1447 self._CRASHLOGS_PREFIX, src)
1448 dest = server_utils.concat_path_except_last(
1449 crashlogs_dir, src)
1450 self.collect_logs(src, dest, False)
1451 logging.debug('%s: %s is collected',
1452 self._CRASHLOGS_PREFIX, src)
1453 except Exception as e:
1454 logging.error('%s: Failed to collect %s: %s',
1455 self._CRASHLOGS_PREFIX, src, e)
1456
1457
J. Richard Barnette1d78b012012-05-15 13:56:30 -07001458 def close(self):
beeps32a63082013-08-22 14:02:29 -07001459 self.rpc_disconnect_all()
Fang Deng0ca40e22013-08-27 17:47:44 -07001460 super(CrosHost, self).close()
J. Richard Barnette1d78b012012-05-15 13:56:30 -07001461
1462
Dan Shi49ca0932014-11-14 11:22:27 -08001463 def get_power_supply_info(self):
1464 """Get the output of power_supply_info.
1465
1466 power_supply_info outputs the info of each power supply, e.g.,
1467 Device: Line Power
1468 online: no
1469 type: Mains
1470 voltage (V): 0
1471 current (A): 0
1472 Device: Battery
1473 state: Discharging
1474 percentage: 95.9276
1475 technology: Li-ion
1476
1477 Above output shows two devices, Line Power and Battery, with details of
1478 each device listed. This function parses the output into a dictionary,
1479 with key being the device name, and value being a dictionary of details
1480 of the device info.
1481
1482 @return: The dictionary of power_supply_info, e.g.,
1483 {'Line Power': {'online': 'yes', 'type': 'main'},
1484 'Battery': {'vendor': 'xyz', 'percentage': '100'}}
Dan Shie9b765d2014-12-29 16:59:49 -08001485 @raise error.AutoservRunError if power_supply_info tool is not found in
1486 the DUT. Caller should handle this error to avoid false failure
1487 on verification.
Dan Shi49ca0932014-11-14 11:22:27 -08001488 """
1489 result = self.run('power_supply_info').stdout.strip()
1490 info = {}
1491 device_name = None
1492 device_info = {}
1493 for line in result.split('\n'):
1494 pair = [v.strip() for v in line.split(':')]
1495 if len(pair) != 2:
1496 continue
1497 if pair[0] == 'Device':
1498 if device_name:
1499 info[device_name] = device_info
1500 device_name = pair[1]
1501 device_info = {}
1502 else:
1503 device_info[pair[0]] = pair[1]
1504 if device_name and not device_name in info:
1505 info[device_name] = device_info
1506 return info
1507
1508
1509 def get_battery_percentage(self):
1510 """Get the battery percentage.
1511
1512 @return: The percentage of battery level, value range from 0-100. Return
1513 None if the battery info cannot be retrieved.
1514 """
1515 try:
1516 info = self.get_power_supply_info()
1517 logging.info(info)
1518 return float(info['Battery']['percentage'])
Dan Shie9b765d2014-12-29 16:59:49 -08001519 except (KeyError, ValueError, error.AutoservRunError):
Dan Shi49ca0932014-11-14 11:22:27 -08001520 return None
1521
1522
1523 def is_ac_connected(self):
1524 """Check if the dut has power adapter connected and charging.
1525
1526 @return: True if power adapter is connected and charging.
1527 """
1528 try:
1529 info = self.get_power_supply_info()
1530 return info['Line Power']['online'] == 'yes'
Dan Shie9b765d2014-12-29 16:59:49 -08001531 except (KeyError, error.AutoservRunError):
1532 return None
Dan Shi49ca0932014-11-14 11:22:27 -08001533
1534
Simran Basi5e6339a2013-03-21 11:34:32 -07001535 def _cleanup_poweron(self):
1536 """Special cleanup method to make sure hosts always get power back."""
1537 afe = frontend_wrappers.RetryingAFE(timeout_min=5, delay_sec=10)
1538 hosts = afe.get_hosts(hostname=self.hostname)
1539 if not hosts or not (self._RPM_OUTLET_CHANGED in
1540 hosts[0].attributes):
1541 return
1542 logging.debug('This host has recently interacted with the RPM'
1543 ' Infrastructure. Ensuring power is on.')
1544 try:
1545 self.power_on()
Dan Shi7dca56e2014-11-11 17:07:56 -08001546 afe.set_host_attribute(self._RPM_OUTLET_CHANGED, None,
1547 hostname=self.hostname)
Simran Basi5e6339a2013-03-21 11:34:32 -07001548 except rpm_client.RemotePowerException:
Simran Basi5e6339a2013-03-21 11:34:32 -07001549 logging.error('Failed to turn Power On for this host after '
1550 'cleanup through the RPM Infrastructure.')
Gabe Blackb72f4fb2015-01-20 16:47:13 -08001551 autotest_es.post(
Dan Shi7dca56e2014-11-11 17:07:56 -08001552 type_str='RPM_poweron_failure',
1553 metadata={'hostname': self.hostname})
Dan Shi49ca0932014-11-14 11:22:27 -08001554
1555 battery_percentage = self.get_battery_percentage()
Dan Shif01ebe22014-12-05 13:10:57 -08001556 if battery_percentage and battery_percentage < 50:
Dan Shi49ca0932014-11-14 11:22:27 -08001557 raise
1558 elif self.is_ac_connected():
1559 logging.info('The device has power adapter connected and '
1560 'charging. No need to try to turn RPM on '
1561 'again.')
1562 afe.set_host_attribute(self._RPM_OUTLET_CHANGED, None,
1563 hostname=self.hostname)
1564 logging.info('Battery level is now at %s%%. The device may '
1565 'still have enough power to run test, so no '
1566 'exception will be raised.', battery_percentage)
1567
Simran Basi5e6339a2013-03-21 11:34:32 -07001568
beepsc87ff602013-07-31 21:53:00 -07001569 def _is_factory_image(self):
1570 """Checks if the image on the DUT is a factory image.
1571
1572 @return: True if the image on the DUT is a factory image.
1573 False otherwise.
1574 """
1575 result = self.run('[ -f /root/.factory_test ]', ignore_status=True)
1576 return result.exit_status == 0
1577
1578
1579 def _restart_ui(self):
J. Richard Barnette84890bd2014-02-21 11:05:47 -08001580 """Restart the Chrome UI.
beepsc87ff602013-07-31 21:53:00 -07001581
1582 @raises: FactoryImageCheckerException for factory images, since
1583 we cannot attempt to restart ui on them.
1584 error.AutoservRunError for any other type of error that
1585 occurs while restarting ui.
1586 """
1587 if self._is_factory_image():
Dan Shi549fb822015-03-24 18:01:11 -07001588 raise FactoryImageCheckerException('Cannot restart ui on factory '
1589 'images')
beepsc87ff602013-07-31 21:53:00 -07001590
J. Richard Barnette84890bd2014-02-21 11:05:47 -08001591 # TODO(jrbarnette): The command to stop/start the ui job
1592 # should live inside cros_ui, too. However that would seem
1593 # to imply interface changes to the existing start()/restart()
1594 # functions, which is a bridge too far (for now).
J. Richard Barnette6069aa12015-06-08 09:10:24 -07001595 prompt = cros_ui.get_chrome_session_ident(self)
J. Richard Barnette84890bd2014-02-21 11:05:47 -08001596 self.run('stop ui; start ui')
1597 cros_ui.wait_for_chrome_ready(prompt, self)
beepsc87ff602013-07-31 21:53:00 -07001598
1599
Dan Shi549fb822015-03-24 18:01:11 -07001600 def get_release_version(self):
1601 """Get the value of attribute CHROMEOS_RELEASE_VERSION from lsb-release.
1602
1603 @returns The version string in lsb-release, under attribute
1604 CHROMEOS_RELEASE_VERSION.
1605 """
1606 lsb_release_content = self.run(
1607 'cat "%s"' % client_constants.LSB_RELEASE).stdout.strip()
1608 return lsbrelease_utils.get_chromeos_release_version(
1609 lsb_release_content=lsb_release_content)
1610
1611
1612 def verify_cros_version_label(self):
1613 """ Make sure host's cros-version label match the actual image in dut.
1614
1615 Remove any cros-version: label that doesn't match that installed in
1616 the dut.
1617
1618 @param raise_error: Set to True to raise exception if any mismatch found
1619
1620 @raise error.AutoservError: If any mismatch between cros-version label
1621 and the build installed in dut is found.
1622 """
1623 labels = self._AFE.get_labels(
1624 name__startswith=ds_constants.VERSION_PREFIX,
1625 host__hostname=self.hostname)
1626 mismatch_found = False
1627 if labels:
1628 # Get CHROMEOS_RELEASE_VERSION from lsb-release, e.g., 6908.0.0.
1629 # Note that it's different from cros-version label, which has
1630 # builder and branch info, e.g.,
1631 # cros-version:peppy-release/R43-6908.0.0
1632 release_version = self.get_release_version()
1633 host_list = [self.hostname]
1634 for label in labels:
1635 # Remove any cros-version label that does not match
1636 # release_version.
1637 build_version = label.name[len(ds_constants.VERSION_PREFIX):]
1638 if not utils.version_match(build_version, release_version):
1639 logging.warn('cros-version label "%s" does not match '
1640 'release version %s. Removing the label.',
1641 label.name, release_version)
1642 label.remove_hosts(hosts=host_list)
1643 mismatch_found = True
1644 if mismatch_found:
Dan Shi1057bae2015-03-30 11:35:09 -07001645 autotest_es.post(use_http=True,
1646 type_str='cros_version_label_mismatch',
1647 metadata={'hostname': self.hostname})
Dan Shi549fb822015-03-24 18:01:11 -07001648 raise error.AutoservError('The host has wrong cros-version label.')
1649
1650
Darren Krahn495b0982015-09-21 19:12:51 -07001651 def verify_tpm_status(self):
1652 """ Verify the host's TPM is in a good state.
1653
1654 @raise error.AutoservError: If state is not good.
1655 """
1656 # This cryptohome command emits status information in JSON format. It
1657 # looks something like this:
1658 # {
1659 # "installattrs": {
1660 # "first_install": false,
1661 # "initialized": true,
1662 # "invalid": false,
1663 # "lockbox_index": 536870916,
1664 # "lockbox_nvram_version": 2,
1665 # "secure": true,
1666 # "size": 0,
1667 # "version": 1
1668 # },
1669 # "mounts": [ {
1670 # "enterprise": false,
1671 # "keysets": [ {
1672 # "current": true,
1673 # "index": 0,
1674 # "last_activity": 1330111359,
1675 # "ok": true,
1676 # "scrypt": true,
1677 # "tpm": false
1678 # } ],
1679 # "mounted": true,
1680 # "owner": "dbb3dd34edb181245130e136be51fa08478d3909"
1681 # } ],
1682 # "tpm": {
1683 # "being_owned": false,
1684 # "can_connect": true,
1685 # "can_decrypt": false,
1686 # "can_encrypt": false,
1687 # "can_load_srk": true,
1688 # "can_load_srk_pubkey": true,
1689 # "enabled": true,
1690 # "has_context": true,
1691 # "has_cryptohome_key": false,
1692 # "has_key_handle": false,
1693 # "last_error": 0,
1694 # "owned": true
1695 # }
1696 # }
1697 output = self.run('cryptohome --action=status').stdout.strip()
1698 try:
1699 status = json.loads(output)
1700 except ValueError:
1701 logging.error('TPM_VERIFY: Cryptohome did not return valid status.')
1702 return
1703 try:
1704 tpm = status['tpm']
1705 if (not tpm['enabled'] or not tpm['can_connect'] or
1706 (tpm['owned'] and not tpm['can_load_srk']) or
1707 (tpm['can_load_srk'] and not tpm['can_load_srk_pubkey'])):
1708 logging.error('TPM_VERIFY: The host TPM is in a bad state.')
1709 raise error.AutoservError('The host TPM is in a bad state.')
1710 else:
1711 logging.debug('TPM_VERIFY: The host TPM is in a good state.')
1712 except KeyError:
1713 logging.error('TPM_VERIFY: Cryptohome did not return valid status.')
1714
1715
beepsc87ff602013-07-31 21:53:00 -07001716 def cleanup(self):
MK Ryu35d661e2014-09-25 17:44:10 -07001717 self.run('rm -f %s' % client_constants.CLEANUP_LOGS_PAUSED_FILE)
Scott Zawalskiddbc31e2012-11-15 11:29:01 -05001718 try:
beepsc87ff602013-07-31 21:53:00 -07001719 self._restart_ui()
1720 except (error.AutotestRunError, error.AutoservRunError,
1721 FactoryImageCheckerException):
Ilja H. Friedel04be2bd2014-05-07 21:29:59 -07001722 logging.warning('Unable to restart ui, rebooting device.')
Scott Zawalskiddbc31e2012-11-15 11:29:01 -05001723 # Since restarting the UI fails fall back to normal Autotest
1724 # cleanup routines, i.e. reboot the machine.
Fang Deng0ca40e22013-08-27 17:47:44 -07001725 super(CrosHost, self).cleanup()
Simran Basi5e6339a2013-03-21 11:34:32 -07001726 # Check if the rpm outlet was manipulated.
Simran Basid5e5e272012-09-24 15:23:59 -07001727 if self.has_power():
Simran Basi5e6339a2013-03-21 11:34:32 -07001728 self._cleanup_poweron()
Dan Shi549fb822015-03-24 18:01:11 -07001729 self.verify_cros_version_label()
J. Richard Barnette45e93de2012-04-11 17:24:15 -07001730
1731
Yu-Ju Honga2be94a2012-07-31 09:48:52 -07001732 def reboot(self, **dargs):
1733 """
1734 This function reboots the site host. The more generic
1735 RemoteHost.reboot() performs sync and sleeps for 5
1736 seconds. This is not necessary for Chrome OS devices as the
1737 sync should be finished in a short time during the reboot
1738 command.
1739 """
Tom Wai-Hong Tamf5cd1d42012-08-13 12:04:08 +08001740 if 'reboot_cmd' not in dargs:
Doug Anderson7d5aeb22014-02-27 15:12:17 -08001741 reboot_timeout = dargs.get('reboot_timeout', 10)
J. Richard Barnette9af19632015-09-25 12:18:03 -07001742 dargs['reboot_cmd'] = ('sleep 1; '
1743 'reboot & sleep %d; '
1744 'reboot -f' % reboot_timeout)
Yu-Ju Honga2be94a2012-07-31 09:48:52 -07001745 # Enable fastsync to avoid running extra sync commands before reboot.
Tom Wai-Hong Tamf5cd1d42012-08-13 12:04:08 +08001746 if 'fastsync' not in dargs:
1747 dargs['fastsync'] = True
Michael Liangda8c60a2014-06-03 13:24:51 -07001748
Charlie Mooneya8e6dab2014-05-29 14:37:55 -07001749 # For purposes of logging reboot times:
1750 # Get the board name i.e. 'daisy_spring'
Michael Liangca4f5a62014-07-10 15:45:13 -07001751 board_fullname = self.get_board()
1752
1753 # Strip the prefix and add it to dargs.
1754 dargs['board'] = board_fullname[board_fullname.find(':')+1:]
Fang Deng0ca40e22013-08-27 17:47:44 -07001755 super(CrosHost, self).reboot(**dargs)
Yu-Ju Honga2be94a2012-07-31 09:48:52 -07001756
1757
Gwendal Grignou7a61d2f2014-05-23 11:05:51 -07001758 def suspend(self, **dargs):
1759 """
1760 This function suspends the site host.
1761 """
1762 suspend_time = dargs.get('suspend_time', 60)
1763 dargs['timeout'] = suspend_time
1764 if 'suspend_cmd' not in dargs:
J. Richard Barnette9af19632015-09-25 12:18:03 -07001765 dargs['suspend_cmd'] = ' && '.join([
1766 'echo 0 > /sys/class/rtc/rtc0/wakealarm',
Gwendal Grignou7a61d2f2014-05-23 11:05:51 -07001767 'echo +%d > /sys/class/rtc/rtc0/wakealarm' % suspend_time,
J. Richard Barnette9af19632015-09-25 12:18:03 -07001768 'powerd_dbus_suspend --delay=0'])
Gwendal Grignou7a61d2f2014-05-23 11:05:51 -07001769 super(CrosHost, self).suspend(**dargs)
1770
1771
Simran Basiec564392014-08-25 16:48:09 -07001772 def upstart_status(self, service_name):
1773 """Check the status of an upstart init script.
1774
1775 @param service_name: Service to look up.
1776
1777 @returns True if the service is running, False otherwise.
1778 """
1779 return self.run('status %s | grep start/running' %
1780 service_name).stdout.strip() != ''
1781
1782
J. Richard Barnette45e93de2012-04-11 17:24:15 -07001783 def verify_software(self):
Richard Barnetteb2bc13c2013-01-08 17:32:51 -08001784 """Verify working software on a Chrome OS system.
J. Richard Barnette45e93de2012-04-11 17:24:15 -07001785
Richard Barnetteb2bc13c2013-01-08 17:32:51 -08001786 Tests for the following conditions:
1787 1. All conditions tested by the parent version of this
1788 function.
1789 2. Sufficient space in /mnt/stateful_partition.
Fang Deng6b05f5b2013-03-20 13:42:11 -07001790 3. Sufficient space in /mnt/stateful_partition/encrypted.
1791 4. update_engine answers a simple status request over DBus.
J. Richard Barnette45e93de2012-04-11 17:24:15 -07001792
J. Richard Barnette45e93de2012-04-11 17:24:15 -07001793 """
MK Ryu35d661e2014-09-25 17:44:10 -07001794 # Check if a job was crashed on this host.
1795 # If yes, avoid verification until crash-logs are collected.
1796 if self._need_crash_logs():
1797 raise error.AutoservCrashLogCollectRequired(
1798 'Need to collect crash-logs before verification')
1799
Fang Deng0ca40e22013-08-27 17:47:44 -07001800 super(CrosHost, self).verify_software()
Dan Shib8540a52015-07-16 14:18:23 -07001801 default_kilo_inodes_required = CONFIG.get_config_value(
1802 'SERVER', 'kilo_inodes_required', type=int, default=100)
1803 board = self.get_board().replace(ds_constants.BOARD_PREFIX, '')
1804 kilo_inodes_required = CONFIG.get_config_value(
1805 'SERVER', 'kilo_inodes_required_%s' % board,
1806 type=int, default=default_kilo_inodes_required)
1807 self.check_inodes('/mnt/stateful_partition', kilo_inodes_required)
J. Richard Barnette45e93de2012-04-11 17:24:15 -07001808 self.check_diskspace(
1809 '/mnt/stateful_partition',
Dan Shib8540a52015-07-16 14:18:23 -07001810 CONFIG.get_config_value(
Fang Deng6b05f5b2013-03-20 13:42:11 -07001811 'SERVER', 'gb_diskspace_required', type=float,
1812 default=20.0))
Gaurav Shahe448af82014-06-19 15:18:59 -07001813 encrypted_stateful_path = '/mnt/stateful_partition/encrypted'
1814 # Not all targets build with encrypted stateful support.
1815 if self.path_exists(encrypted_stateful_path):
1816 self.check_diskspace(
1817 encrypted_stateful_path,
Dan Shib8540a52015-07-16 14:18:23 -07001818 CONFIG.get_config_value(
Gaurav Shahe448af82014-06-19 15:18:59 -07001819 'SERVER', 'gb_encrypted_diskspace_required', type=float,
1820 default=0.1))
beepsc87ff602013-07-31 21:53:00 -07001821
Simran Basiec564392014-08-25 16:48:09 -07001822 if not self.upstart_status('system-services'):
Prashanth B5d0a0512014-04-25 12:26:08 -07001823 raise error.AutoservError('Chrome failed to reach login. '
1824 'System services not running.')
1825
beepsc87ff602013-07-31 21:53:00 -07001826 # Factory images don't run update engine,
1827 # goofy controls dbus on these DUTs.
1828 if not self._is_factory_image():
1829 self.run('update_engine_client --status')
Scott Zawalskifbca4a92013-03-04 15:56:42 -05001830 # Makes sure python is present, loads and can use built in functions.
1831 # We have seen cases where importing cPickle fails with undefined
1832 # symbols in cPickle.so.
1833 self.run('python -c "import cPickle"')
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07001834
Dan Shi549fb822015-03-24 18:01:11 -07001835 self.verify_cros_version_label()
1836
Darren Krahn495b0982015-09-21 19:12:51 -07001837 self.verify_tpm_status()
1838
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07001839
Dan Shi49ca0932014-11-14 11:22:27 -08001840 def verify_hardware(self):
1841 """Verify hardware system of a Chrome OS system.
1842
1843 Check following hardware conditions:
1844 1. Battery level.
1845 2. Is power adapter connected.
1846 """
1847 logging.info('Battery percentage: %s', self.get_battery_percentage())
Dan Shie9b765d2014-12-29 16:59:49 -08001848 if self.is_ac_connected() is None:
1849 logging.info('Can not determine if the device has power adapter '
1850 'connected.')
1851 else:
1852 logging.info('Device %s power adapter connected and charging.',
1853 'has' if self.is_ac_connected() else 'does not have')
Dan Shi49ca0932014-11-14 11:22:27 -08001854
1855
Fang Deng96667ca2013-08-01 17:46:18 -07001856 def make_ssh_command(self, user='root', port=22, opts='', hosts_file=None,
1857 connect_timeout=None, alive_interval=None):
1858 """Override default make_ssh_command to use options tuned for Chrome OS.
1859
1860 Tuning changes:
1861 - ConnectTimeout=30; maximum of 30 seconds allowed for an SSH
1862 connection failure. Consistency with remote_access.sh.
1863
Samuel Tan2ce155b2015-06-23 18:24:38 -07001864 - ServerAliveInterval=900; which causes SSH to ping connection every
1865 900 seconds. In conjunction with ServerAliveCountMax ensures
1866 that if the connection dies, Autotest will bail out.
Fang Deng96667ca2013-08-01 17:46:18 -07001867 Originally tried 60 secs, but saw frequent job ABORTS where
Samuel Tan2ce155b2015-06-23 18:24:38 -07001868 the test completed successfully. Later increased from 180 seconds to
1869 900 seconds to account for tests where the DUT is suspended for
1870 longer periods of time.
Fang Deng96667ca2013-08-01 17:46:18 -07001871
1872 - ServerAliveCountMax=3; consistency with remote_access.sh.
1873
1874 - ConnectAttempts=4; reduce flakiness in connection errors;
1875 consistency with remote_access.sh.
1876
1877 - UserKnownHostsFile=/dev/null; we don't care about the keys.
1878 Host keys change with every new installation, don't waste
1879 memory/space saving them.
1880
1881 - SSH protocol forced to 2; needed for ServerAliveInterval.
1882
1883 @param user User name to use for the ssh connection.
1884 @param port Port on the target host to use for ssh connection.
1885 @param opts Additional options to the ssh command.
1886 @param hosts_file Ignored.
1887 @param connect_timeout Ignored.
1888 @param alive_interval Ignored.
1889 """
Aviv Keshetc5947fa2013-09-04 14:06:29 -07001890 base_command = ('/usr/bin/ssh -a -x %s %s %s'
1891 ' -o StrictHostKeyChecking=no'
Fang Deng96667ca2013-08-01 17:46:18 -07001892 ' -o UserKnownHostsFile=/dev/null -o BatchMode=yes'
Samuel Tan2ce155b2015-06-23 18:24:38 -07001893 ' -o ConnectTimeout=30 -o ServerAliveInterval=900'
Fang Deng96667ca2013-08-01 17:46:18 -07001894 ' -o ServerAliveCountMax=3 -o ConnectionAttempts=4'
1895 ' -o Protocol=2 -l %s -p %d')
Aviv Keshetc5947fa2013-09-04 14:06:29 -07001896 return base_command % (self._ssh_verbosity_flag, self._ssh_options,
1897 opts, user, port)
Fang Deng96667ca2013-08-01 17:46:18 -07001898
1899
Christopher Wileydd181852013-10-10 19:56:58 -07001900 def _setup_rpc(self, port, command_name, remote_pid=None):
beeps32a63082013-08-22 14:02:29 -07001901 """Sets up a tunnel process and performs rpc connection book keeping.
1902
Cheng-Yi Chianga155e7e2015-08-20 20:42:04 +08001903 Chrome OS on the target closes down most external ports for security.
1904 We could open the port, but doing that would conflict with security
1905 tests that check that only expected ports are open. So, to get to
1906 the port on the target we use an ssh tunnel.
1907
beeps32a63082013-08-22 14:02:29 -07001908 This method assumes that xmlrpc and jsonrpc never conflict, since
1909 we can only either have an xmlrpc or a jsonrpc server listening on
1910 a remote port. As such, it enforces a single proxy->remote port
1911 policy, i.e if one starts a jsonrpc proxy/server from port A->B,
1912 and then tries to start an xmlrpc proxy forwarded to the same port,
1913 the xmlrpc proxy will override the jsonrpc tunnel process, however:
1914
1915 1. None of the methods on the xmlrpc proxy will work because
1916 the server listening on B is jsonrpc.
1917
1918 2. The xmlrpc client cannot initiate a termination of the JsonRPC
1919 server, as the only use case currently is goofy, which is tied to
1920 the factory image. It is much easier to handle a failed xmlrpc
1921 call on the client than it is to terminate goofy in this scenario,
1922 as doing the latter might leave the DUT in a hard to recover state.
1923
1924 With the current implementation newer rpc proxy connections will
1925 terminate the tunnel processes of older rpc connections tunneling
1926 to the same remote port. If methods are invoked on the client
1927 after this has happened they will fail with connection closed errors.
1928
1929 @param port: The remote forwarding port.
1930 @param command_name: The name of the remote process, to terminate
1931 using pkill.
1932
1933 @return A url that we can use to initiate the rpc connection.
1934 """
1935 self.rpc_disconnect(port)
1936 local_port = utils.get_unused_port()
1937 tunnel_proc = self._create_ssh_tunnel(port, local_port)
Christopher Wileydd181852013-10-10 19:56:58 -07001938 self._rpc_proxy_map[port] = (command_name, tunnel_proc, remote_pid)
beeps32a63082013-08-22 14:02:29 -07001939 return self._RPC_PROXY_URL % local_port
1940
1941
Christopher Wileyd78249a2013-03-01 13:05:31 -08001942 def xmlrpc_connect(self, command, port, command_name=None,
Yusuf Mohsinallyfff89d62013-11-18 16:34:07 -08001943 ready_test_name=None, timeout_seconds=10,
1944 logfile='/dev/null'):
J. Richard Barnette1d78b012012-05-15 13:56:30 -07001945 """Connect to an XMLRPC server on the host.
1946
1947 The `command` argument should be a simple shell command that
1948 starts an XMLRPC server on the given `port`. The command
1949 must not daemonize, and must terminate cleanly on SIGTERM.
1950 The command is started in the background on the host, and a
1951 local XMLRPC client for the server is created and returned
1952 to the caller.
1953
1954 Note that the process of creating an XMLRPC client makes no
1955 attempt to connect to the remote server; the caller is
1956 responsible for determining whether the server is running
1957 correctly, and is ready to serve requests.
1958
Christopher Wileyd78249a2013-03-01 13:05:31 -08001959 Optionally, the caller can pass ready_test_name, a string
1960 containing the name of a method to call on the proxy. This
1961 method should take no parameters and return successfully only
1962 when the server is ready to process client requests. When
1963 ready_test_name is set, xmlrpc_connect will block until the
1964 proxy is ready, and throw a TestError if the server isn't
1965 ready by timeout_seconds.
1966
beeps32a63082013-08-22 14:02:29 -07001967 If a server is already running on the remote port, this
1968 method will kill it and disconnect the tunnel process
1969 associated with the connection before establishing a new one,
1970 by consulting the rpc_proxy_map in rpc_disconnect.
1971
J. Richard Barnette1d78b012012-05-15 13:56:30 -07001972 @param command Shell command to start the server.
1973 @param port Port number on which the server is expected to
1974 be serving.
J. Richard Barnette7214e0b2013-02-06 15:20:49 -08001975 @param command_name String to use as input to `pkill` to
1976 terminate the XMLRPC server on the host.
Christopher Wileyd78249a2013-03-01 13:05:31 -08001977 @param ready_test_name String containing the name of a
1978 method defined on the XMLRPC server.
1979 @param timeout_seconds Number of seconds to wait
1980 for the server to become 'ready.' Will throw a
1981 TestFail error if server is not ready in time.
Yusuf Mohsinallyfff89d62013-11-18 16:34:07 -08001982 @param logfile Logfile to send output when running
1983 'command' argument.
Yusuf Mohsinally8d19e3c2013-11-21 14:25:45 -08001984
J. Richard Barnette1d78b012012-05-15 13:56:30 -07001985 """
Christopher Wileyc14f06a2013-10-16 13:55:39 -07001986 # Clean up any existing state. If the caller is willing
1987 # to believe their server is down, we ought to clean up
1988 # any tunnels we might have sitting around.
1989 self.rpc_disconnect(port)
J. Richard Barnette1d78b012012-05-15 13:56:30 -07001990 # Start the server on the host. Redirection in the command
1991 # below is necessary, because 'ssh' won't terminate until
1992 # background child processes close stdin, stdout, and
1993 # stderr.
J. Richard Barnette9af19632015-09-25 12:18:03 -07001994 remote_cmd = '%s >%s 2>&1' % (command, logfile)
1995 remote_pid = self.run_background(remote_cmd)
J. Richard Barnette1d78b012012-05-15 13:56:30 -07001996 logging.debug('Started XMLRPC server on host %s, pid = %s',
1997 self.hostname, remote_pid)
1998
Christopher Wileydd181852013-10-10 19:56:58 -07001999 # Tunnel through SSH to be able to reach that remote port.
2000 rpc_url = self._setup_rpc(port, command_name, remote_pid=remote_pid)
Christopher Wileyd78249a2013-03-01 13:05:31 -08002001 proxy = xmlrpclib.ServerProxy(rpc_url, allow_none=True)
Christopher Wileydd181852013-10-10 19:56:58 -07002002
Christopher Wileyd78249a2013-03-01 13:05:31 -08002003 if ready_test_name is not None:
J. Richard Barnette13eb7c02013-03-07 12:06:29 -08002004 # retry.retry logs each attempt; calculate delay_sec to
2005 # keep log spam to a dull roar.
Christopher Wiley0ed712b2013-04-09 15:25:12 -07002006 @retry.retry((socket.error,
2007 xmlrpclib.ProtocolError,
2008 httplib.BadStatusLine),
Chris Sosa65425082013-10-16 13:26:22 -07002009 timeout_min=timeout_seconds / 60.0,
2010 delay_sec=min(max(timeout_seconds / 20.0, 0.1), 1))
Christopher Wileyd78249a2013-03-01 13:05:31 -08002011 def ready_test():
2012 """ Call proxy.ready_test_name(). """
2013 getattr(proxy, ready_test_name)()
2014 successful = False
2015 try:
2016 logging.info('Waiting %d seconds for XMLRPC server '
2017 'to start.', timeout_seconds)
2018 ready_test()
2019 successful = True
Christopher Wileyd78249a2013-03-01 13:05:31 -08002020 finally:
2021 if not successful:
2022 logging.error('Failed to start XMLRPC server.')
beeps32a63082013-08-22 14:02:29 -07002023 self.rpc_disconnect(port)
Christopher Wileyd78249a2013-03-01 13:05:31 -08002024 logging.info('XMLRPC server started successfully.')
2025 return proxy
J. Richard Barnette1d78b012012-05-15 13:56:30 -07002026
J. Richard Barnette1d78b012012-05-15 13:56:30 -07002027
Jason Abeleb6f924f2013-11-13 16:01:54 -08002028 def syslog(self, message, tag='autotest'):
2029 """Logs a message to syslog on host.
2030
2031 @param message String message to log into syslog
2032 @param tag String tag prefix for syslog
2033
2034 """
2035 self.run('logger -t "%s" "%s"' % (tag, message))
2036
2037
beeps32a63082013-08-22 14:02:29 -07002038 def jsonrpc_connect(self, port):
2039 """Creates a jsonrpc proxy connection through an ssh tunnel.
2040
2041 This method exists to facilitate communication with goofy (which is
2042 the default system manager on all factory images) and as such, leaves
2043 most of the rpc server sanity checking to the caller. Unlike
2044 xmlrpc_connect, this method does not facilitate the creation of a remote
2045 jsonrpc server, as the only clients of this code are factory tests,
2046 for which the goofy system manager is built in to the image and starts
2047 when the target boots.
2048
2049 One can theoretically create multiple jsonrpc proxies all forwarded
2050 to the same remote port, provided the remote port has an rpc server
2051 listening. However, in doing so we stand the risk of leaking an
2052 existing tunnel process, so we always disconnect any older tunnels
2053 we might have through rpc_disconnect.
2054
2055 @param port: port on the remote host that is serving this proxy.
2056
2057 @return: The client proxy.
2058 """
2059 if not jsonrpclib:
2060 logging.warning('Jsonrpclib could not be imported. Check that '
2061 'site-packages contains jsonrpclib.')
2062 return None
2063
2064 proxy = jsonrpclib.jsonrpc.ServerProxy(self._setup_rpc(port, None))
2065
2066 logging.info('Established a jsonrpc connection through port %s.', port)
2067 return proxy
2068
2069
2070 def rpc_disconnect(self, port):
2071 """Disconnect from an RPC server on the host.
2072
2073 Terminates the remote RPC server previously started for
J. Richard Barnette1d78b012012-05-15 13:56:30 -07002074 the given `port`. Also closes the local ssh tunnel created
2075 for the connection to the host. This function does not
beeps32a63082013-08-22 14:02:29 -07002076 directly alter the state of a previously returned RPC
J. Richard Barnette1d78b012012-05-15 13:56:30 -07002077 client object; however disconnection will cause all
2078 subsequent calls to methods on the object to fail.
2079
2080 This function does nothing if requested to disconnect a port
beeps32a63082013-08-22 14:02:29 -07002081 that was not previously connected via _setup_rpc.
J. Richard Barnette1d78b012012-05-15 13:56:30 -07002082
2083 @param port Port number passed to a previous call to
beeps32a63082013-08-22 14:02:29 -07002084 `_setup_rpc()`.
J. Richard Barnette1d78b012012-05-15 13:56:30 -07002085 """
beeps32a63082013-08-22 14:02:29 -07002086 if port not in self._rpc_proxy_map:
J. Richard Barnette1d78b012012-05-15 13:56:30 -07002087 return
Christopher Wileydd181852013-10-10 19:56:58 -07002088 remote_name, tunnel_proc, remote_pid = self._rpc_proxy_map[port]
J. Richard Barnette1d78b012012-05-15 13:56:30 -07002089 if remote_name:
2090 # We use 'pkill' to find our target process rather than
2091 # a PID, because the host may have rebooted since
2092 # connecting, and we don't want to kill an innocent
2093 # process with the same PID.
2094 #
2095 # 'pkill' helpfully exits with status 1 if no target
2096 # process is found, for which run() will throw an
Simran Basid5e5e272012-09-24 15:23:59 -07002097 # exception. We don't want that, so we the ignore
J. Richard Barnette1d78b012012-05-15 13:56:30 -07002098 # status.
2099 self.run("pkill -f '%s'" % remote_name, ignore_status=True)
Christopher Wileydd181852013-10-10 19:56:58 -07002100 if remote_pid:
2101 logging.info('Waiting for RPC server "%s" shutdown',
2102 remote_name)
2103 start_time = time.time()
2104 while (time.time() - start_time <
2105 self._RPC_SHUTDOWN_TIMEOUT_SECONDS):
2106 running_processes = self.run(
2107 "pgrep -f '%s'" % remote_name,
2108 ignore_status=True).stdout.split()
2109 if not remote_pid in running_processes:
2110 logging.info('Shut down RPC server.')
2111 break
2112 time.sleep(self._RPC_SHUTDOWN_POLLING_PERIOD_SECONDS)
2113 else:
2114 raise error.TestError('Failed to shutdown RPC server %s' %
2115 remote_name)
J. Richard Barnette1d78b012012-05-15 13:56:30 -07002116
2117 if tunnel_proc.poll() is None:
2118 tunnel_proc.terminate()
2119 logging.debug('Terminated tunnel, pid %d', tunnel_proc.pid)
2120 else:
2121 logging.debug('Tunnel pid %d terminated early, status %d',
2122 tunnel_proc.pid, tunnel_proc.returncode)
beeps32a63082013-08-22 14:02:29 -07002123 del self._rpc_proxy_map[port]
J. Richard Barnette1d78b012012-05-15 13:56:30 -07002124
2125
beeps32a63082013-08-22 14:02:29 -07002126 def rpc_disconnect_all(self):
2127 """Disconnect all known RPC proxy ports."""
2128 for port in self._rpc_proxy_map.keys():
2129 self.rpc_disconnect(port)
J. Richard Barnette1d78b012012-05-15 13:56:30 -07002130
2131
Ilja H. Friedel1232e8a2014-06-17 21:30:48 -07002132 def poor_mans_rpc(self, fun):
2133 """
2134 Calls a function from client utils on the host and returns a string.
2135
2136 @param fun function in client utils namespace.
2137 @return output string from calling fun.
2138 """
Simran Basi263a9d32014-08-19 11:16:51 -07002139 script = 'cd %s/bin; ' % autotest.Autotest.get_installed_autodir(self)
Ilja H. Friedel1232e8a2014-06-17 21:30:48 -07002140 script += 'python -c "import common; import utils;'
2141 script += 'print utils.%s"' % fun
2142 return script
2143
2144
J. Richard Barnetteb6de7e32013-02-14 13:28:04 -08002145 def _ping_check_status(self, status):
2146 """Ping the host once, and return whether it has a given status.
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002147
J. Richard Barnetteb6de7e32013-02-14 13:28:04 -08002148 @param status Check the ping status against this value.
2149 @return True iff `status` and the result of ping are the same
2150 (i.e. both True or both False).
2151
2152 """
2153 ping_val = utils.ping(self.hostname, tries=1, deadline=1)
2154 return not (status ^ (ping_val == 0))
2155
2156 def _ping_wait_for_status(self, status, timeout):
2157 """Wait for the host to have a given status (UP or DOWN).
2158
2159 Status is checked by polling. Polling will not last longer
2160 than the number of seconds in `timeout`. The polling
2161 interval will be long enough that only approximately
2162 _PING_WAIT_COUNT polling cycles will be executed, subject
2163 to a maximum interval of about one minute.
2164
2165 @param status Waiting will stop immediately if `ping` of the
2166 host returns this status.
2167 @param timeout Poll for at most this many seconds.
2168 @return True iff the host status from `ping` matched the
2169 requested status at the time of return.
2170
2171 """
2172 # _ping_check_status() takes about 1 second, hence the
2173 # "- 1" in the formula below.
2174 poll_interval = min(int(timeout / self._PING_WAIT_COUNT), 60) - 1
2175 end_time = time.time() + timeout
2176 while time.time() <= end_time:
2177 if self._ping_check_status(status):
2178 return True
2179 if poll_interval > 0:
2180 time.sleep(poll_interval)
2181
2182 # The last thing we did was sleep(poll_interval), so it may
2183 # have been too long since the last `ping`. Check one more
2184 # time, just to be sure.
2185 return self._ping_check_status(status)
2186
2187 def ping_wait_up(self, timeout):
2188 """Wait for the host to respond to `ping`.
2189
2190 N.B. This method is not a reliable substitute for
2191 `wait_up()`, because a host that responds to ping will not
2192 necessarily respond to ssh. This method should only be used
2193 if the target DUT can be considered functional even if it
2194 can't be reached via ssh.
2195
2196 @param timeout Minimum time to allow before declaring the
2197 host to be non-responsive.
2198 @return True iff the host answered to ping before the timeout.
2199
2200 """
2201 return self._ping_wait_for_status(self._PING_STATUS_UP, timeout)
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002202
Andrew Bresticker678c0c72013-01-22 10:44:09 -08002203 def ping_wait_down(self, timeout):
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002204 """Wait until the host no longer responds to `ping`.
2205
J. Richard Barnetteb6de7e32013-02-14 13:28:04 -08002206 This function can be used as a slightly faster version of
2207 `wait_down()`, by avoiding potentially long ssh timeouts.
2208
2209 @param timeout Minimum time to allow for the host to become
2210 non-responsive.
2211 @return True iff the host quit answering ping before the
2212 timeout.
2213
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002214 """
J. Richard Barnetteb6de7e32013-02-14 13:28:04 -08002215 return self._ping_wait_for_status(self._PING_STATUS_DOWN, timeout)
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002216
Tom Wai-Hong Tamfced4f62014-04-17 10:56:30 +08002217 def test_wait_for_sleep(self, sleep_timeout=None):
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002218 """Wait for the client to enter low-power sleep mode.
2219
2220 The test for "is asleep" can't distinguish a system that is
2221 powered off; to confirm that the unit was asleep, it is
2222 necessary to force resume, and then call
2223 `test_wait_for_resume()`.
2224
2225 This function is expected to be called from a test as part
2226 of a sequence like the following:
2227
2228 ~~~~~~~~
2229 boot_id = host.get_boot_id()
2230 # trigger sleep on the host
2231 host.test_wait_for_sleep()
2232 # trigger resume on the host
2233 host.test_wait_for_resume(boot_id)
2234 ~~~~~~~~
2235
Tom Wai-Hong Tamfced4f62014-04-17 10:56:30 +08002236 @param sleep_timeout time limit in seconds to allow the host sleep.
2237
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002238 @exception TestFail The host did not go to sleep within
2239 the allowed time.
2240 """
Tom Wai-Hong Tamfced4f62014-04-17 10:56:30 +08002241 if sleep_timeout is None:
2242 sleep_timeout = self.SLEEP_TIMEOUT
2243
2244 if not self.ping_wait_down(timeout=sleep_timeout):
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002245 raise error.TestFail(
Tom Wai-Hong Tamfced4f62014-04-17 10:56:30 +08002246 'client failed to sleep after %d seconds' % sleep_timeout)
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002247
2248
Tom Wai-Hong Tamfced4f62014-04-17 10:56:30 +08002249 def test_wait_for_resume(self, old_boot_id, resume_timeout=None):
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002250 """Wait for the client to resume from low-power sleep mode.
2251
2252 The `old_boot_id` parameter should be the value from
2253 `get_boot_id()` obtained prior to entering sleep mode. A
2254 `TestFail` exception is raised if the boot id changes.
2255
2256 See @ref test_wait_for_sleep for more on this function's
2257 usage.
2258
J. Richard Barnette7214e0b2013-02-06 15:20:49 -08002259 @param old_boot_id A boot id value obtained before the
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002260 target host went to sleep.
Tom Wai-Hong Tamfced4f62014-04-17 10:56:30 +08002261 @param resume_timeout time limit in seconds to allow the host up.
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002262
2263 @exception TestFail The host did not respond within the
2264 allowed time.
2265 @exception TestFail The host responded, but the boot id test
2266 indicated a reboot rather than a sleep
2267 cycle.
2268 """
Tom Wai-Hong Tamfced4f62014-04-17 10:56:30 +08002269 if resume_timeout is None:
2270 resume_timeout = self.RESUME_TIMEOUT
2271
2272 if not self.wait_up(timeout=resume_timeout):
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002273 raise error.TestFail(
2274 'client failed to resume from sleep after %d seconds' %
Tom Wai-Hong Tamfced4f62014-04-17 10:56:30 +08002275 resume_timeout)
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002276 else:
2277 new_boot_id = self.get_boot_id()
2278 if new_boot_id != old_boot_id:
Tom Wai-Hong Tam01792682015-01-06 08:00:46 +08002279 logging.error('client rebooted (old boot %s, new boot %s)',
2280 old_boot_id, new_boot_id)
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002281 raise error.TestFail(
Tom Wai-Hong Tam01792682015-01-06 08:00:46 +08002282 'client rebooted, but sleep was expected')
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002283
2284
Tom Wai-Hong Tamfe005c22014-12-03 09:25:44 +08002285 def test_wait_for_shutdown(self, shutdown_timeout=None):
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002286 """Wait for the client to shut down.
2287
2288 The test for "has shut down" can't distinguish a system that
2289 is merely asleep; to confirm that the unit was down, it is
2290 necessary to force boot, and then call test_wait_for_boot().
2291
2292 This function is expected to be called from a test as part
2293 of a sequence like the following:
2294
2295 ~~~~~~~~
2296 boot_id = host.get_boot_id()
2297 # trigger shutdown on the host
2298 host.test_wait_for_shutdown()
2299 # trigger boot on the host
2300 host.test_wait_for_boot(boot_id)
2301 ~~~~~~~~
2302
Tom Wai-Hong Tamfe005c22014-12-03 09:25:44 +08002303 @param shutdown_timeout time limit in seconds to allow the host down.
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002304 @exception TestFail The host did not shut down within the
2305 allowed time.
2306 """
Tom Wai-Hong Tamfe005c22014-12-03 09:25:44 +08002307 if shutdown_timeout is None:
2308 shutdown_timeout = self.SHUTDOWN_TIMEOUT
2309
2310 if not self.ping_wait_down(timeout=shutdown_timeout):
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002311 raise error.TestFail(
2312 'client failed to shut down after %d seconds' %
Tom Wai-Hong Tamfe005c22014-12-03 09:25:44 +08002313 shutdown_timeout)
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002314
2315
2316 def test_wait_for_boot(self, old_boot_id=None):
2317 """Wait for the client to boot from cold power.
2318
2319 The `old_boot_id` parameter should be the value from
2320 `get_boot_id()` obtained prior to shutting down. A
2321 `TestFail` exception is raised if the boot id does not
2322 change. The boot id test is omitted if `old_boot_id` is not
2323 specified.
2324
2325 See @ref test_wait_for_shutdown for more on this function's
2326 usage.
2327
J. Richard Barnette7214e0b2013-02-06 15:20:49 -08002328 @param old_boot_id A boot id value obtained before the
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002329 shut down.
2330
2331 @exception TestFail The host did not respond within the
2332 allowed time.
2333 @exception TestFail The host responded, but the boot id test
2334 indicated that there was no reboot.
2335 """
J. Richard Barnetteeb69d722012-06-18 17:29:44 -07002336 if not self.wait_up(timeout=self.REBOOT_TIMEOUT):
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002337 raise error.TestFail(
2338 'client failed to reboot after %d seconds' %
J. Richard Barnetteeb69d722012-06-18 17:29:44 -07002339 self.REBOOT_TIMEOUT)
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002340 elif old_boot_id:
2341 if self.get_boot_id() == old_boot_id:
Tom Wai-Hong Tam01792682015-01-06 08:00:46 +08002342 logging.error('client not rebooted (boot %s)',
2343 old_boot_id)
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002344 raise error.TestFail(
Tom Wai-Hong Tam01792682015-01-06 08:00:46 +08002345 'client is back up, but did not reboot')
Simran Basid5e5e272012-09-24 15:23:59 -07002346
2347
2348 @staticmethod
2349 def check_for_rpm_support(hostname):
2350 """For a given hostname, return whether or not it is powered by an RPM.
2351
Simran Basi1df55112013-09-06 11:25:09 -07002352 @param hostname: hostname to check for rpm support.
2353
Simran Basid5e5e272012-09-24 15:23:59 -07002354 @return None if this host does not follows the defined naming format
2355 for RPM powered DUT's in the lab. If it does follow the format,
2356 it returns a regular expression MatchObject instead.
2357 """
Fang Dengbaff9082015-01-06 13:46:15 -08002358 return re.match(CrosHost._RPM_HOSTNAME_REGEX, hostname)
Simran Basid5e5e272012-09-24 15:23:59 -07002359
2360
2361 def has_power(self):
2362 """For this host, return whether or not it is powered by an RPM.
2363
2364 @return True if this host is in the CROS lab and follows the defined
2365 naming format.
2366 """
Fang Deng0ca40e22013-08-27 17:47:44 -07002367 return CrosHost.check_for_rpm_support(self.hostname)
Simran Basid5e5e272012-09-24 15:23:59 -07002368
2369
Ismail Noorbasha07fdb612013-02-14 14:13:31 -08002370 def _set_power(self, state, power_method):
2371 """Sets the power to the host via RPM, Servo or manual.
2372
2373 @param state Specifies which power state to set to DUT
2374 @param power_method Specifies which method of power control to
2375 use. By default "RPM" will be used. Valid values
2376 are the strings "RPM", "manual", "servoj10".
2377
2378 """
2379 ACCEPTABLE_STATES = ['ON', 'OFF']
2380
2381 if state.upper() not in ACCEPTABLE_STATES:
2382 raise error.TestError('State must be one of: %s.'
2383 % (ACCEPTABLE_STATES,))
2384
2385 if power_method == self.POWER_CONTROL_SERVO:
2386 logging.info('Setting servo port J10 to %s', state)
2387 self.servo.set('prtctl3_pwren', state.lower())
2388 time.sleep(self._USB_POWER_TIMEOUT)
2389 elif power_method == self.POWER_CONTROL_MANUAL:
2390 logging.info('You have %d seconds to set the AC power to %s.',
2391 self._POWER_CYCLE_TIMEOUT, state)
2392 time.sleep(self._POWER_CYCLE_TIMEOUT)
2393 else:
2394 if not self.has_power():
2395 raise error.TestFail('DUT does not have RPM connected.')
Simran Basi5e6339a2013-03-21 11:34:32 -07002396 afe = frontend_wrappers.RetryingAFE(timeout_min=5, delay_sec=10)
2397 afe.set_host_attribute(self._RPM_OUTLET_CHANGED, True,
2398 hostname=self.hostname)
Simran Basi1df55112013-09-06 11:25:09 -07002399 rpm_client.set_power(self.hostname, state.upper(), timeout_mins=5)
Simran Basid5e5e272012-09-24 15:23:59 -07002400
2401
Ismail Noorbasha07fdb612013-02-14 14:13:31 -08002402 def power_off(self, power_method=POWER_CONTROL_RPM):
2403 """Turn off power to this host via RPM, Servo or manual.
2404
2405 @param power_method Specifies which method of power control to
2406 use. By default "RPM" will be used. Valid values
2407 are the strings "RPM", "manual", "servoj10".
2408
2409 """
2410 self._set_power('OFF', power_method)
Simran Basid5e5e272012-09-24 15:23:59 -07002411
2412
Ismail Noorbasha07fdb612013-02-14 14:13:31 -08002413 def power_on(self, power_method=POWER_CONTROL_RPM):
2414 """Turn on power to this host via RPM, Servo or manual.
2415
2416 @param power_method Specifies which method of power control to
2417 use. By default "RPM" will be used. Valid values
2418 are the strings "RPM", "manual", "servoj10".
2419
2420 """
2421 self._set_power('ON', power_method)
2422
2423
2424 def power_cycle(self, power_method=POWER_CONTROL_RPM):
2425 """Cycle power to this host by turning it OFF, then ON.
2426
2427 @param power_method Specifies which method of power control to
2428 use. By default "RPM" will be used. Valid values
2429 are the strings "RPM", "manual", "servoj10".
2430
2431 """
2432 if power_method in (self.POWER_CONTROL_SERVO,
2433 self.POWER_CONTROL_MANUAL):
2434 self.power_off(power_method=power_method)
2435 time.sleep(self._POWER_CYCLE_TIMEOUT)
2436 self.power_on(power_method=power_method)
2437 else:
2438 rpm_client.set_power(self.hostname, 'CYCLE')
Simran Basic6f1f7a2012-10-16 10:47:46 -07002439
2440
2441 def get_platform(self):
2442 """Determine the correct platform label for this host.
2443
2444 @returns a string representing this host's platform.
2445 """
2446 crossystem = utils.Crossystem(self)
2447 crossystem.init()
2448 # Extract fwid value and use the leading part as the platform id.
2449 # fwid generally follow the format of {platform}.{firmware version}
2450 # Example: Alex.X.YYY.Z or Google_Alex.X.YYY.Z
2451 platform = crossystem.fwid().split('.')[0].lower()
2452 # Newer platforms start with 'Google_' while the older ones do not.
2453 return platform.replace('google_', '')
2454
2455
Hung-ying Tyanb1328032014-04-01 14:18:54 +08002456 def get_architecture(self):
2457 """Determine the correct architecture label for this host.
2458
2459 @returns a string representing this host's architecture.
2460 """
2461 crossystem = utils.Crossystem(self)
2462 crossystem.init()
2463 return crossystem.arch()
2464
2465
Luis Lozano40b7d0d2014-01-17 15:12:06 -08002466 def get_chrome_version(self):
2467 """Gets the Chrome version number and milestone as strings.
2468
2469 Invokes "chrome --version" to get the version number and milestone.
2470
2471 @return A tuple (chrome_ver, milestone) where "chrome_ver" is the
2472 current Chrome version number as a string (in the form "W.X.Y.Z")
2473 and "milestone" is the first component of the version number
2474 (the "W" from "W.X.Y.Z"). If the version number cannot be parsed
2475 in the "W.X.Y.Z" format, the "chrome_ver" will be the full output
2476 of "chrome --version" and the milestone will be the empty string.
2477
2478 """
MK Ryu35d661e2014-09-25 17:44:10 -07002479 version_string = self.run(client_constants.CHROME_VERSION_COMMAND).stdout
Luis Lozano40b7d0d2014-01-17 15:12:06 -08002480 return utils.parse_chrome_version(version_string)
2481
Aviv Keshet74c89a92013-02-04 15:18:30 -08002482 @label_decorator()
Simran Basic6f1f7a2012-10-16 10:47:46 -07002483 def get_board(self):
2484 """Determine the correct board label for this host.
2485
2486 @returns a string representing this host's board.
2487 """
2488 release_info = utils.parse_cmd_output('cat /etc/lsb-release',
2489 run_method=self.run)
2490 board = release_info['CHROMEOS_RELEASE_BOARD']
2491 # Devices in the lab generally have the correct board name but our own
2492 # development devices have {board_name}-signed-{key_type}. The board
2493 # name may also begin with 'x86-' which we need to keep.
Simran Basi833814b2013-01-29 13:13:43 -08002494 board_format_string = ds_constants.BOARD_PREFIX + '%s'
Simran Basic6f1f7a2012-10-16 10:47:46 -07002495 if 'x86' not in board:
Simran Basi833814b2013-01-29 13:13:43 -08002496 return board_format_string % board.split('-')[0]
2497 return board_format_string % '-'.join(board.split('-')[0:2])
Simran Basic6f1f7a2012-10-16 10:47:46 -07002498
2499
Ilja H. Friedel1232e8a2014-06-17 21:30:48 -07002500 @label_decorator('board_freq_mem')
2501 def get_board_with_frequency_and_memory(self):
2502 """
2503 Determines the board name with frequency and memory.
2504
2505 @returns a more detailed string representing the board. Examples are
2506 butterfly_1.1GHz_2GB, link_1.8GHz_4GB, x86-zgb_1.7GHz_2GB
2507 """
2508 board = self.run(self.poor_mans_rpc(
2509 'get_board_with_frequency_and_memory()')).stdout
2510 return 'board_freq_mem:%s' % str.strip(board)
2511
2512
Aviv Keshet74c89a92013-02-04 15:18:30 -08002513 @label_decorator('lightsensor')
Simran Basic6f1f7a2012-10-16 10:47:46 -07002514 def has_lightsensor(self):
2515 """Determine the correct board label for this host.
2516
2517 @returns the string 'lightsensor' if this host has a lightsensor or
2518 None if it does not.
2519 """
2520 search_cmd = "find -L %s -maxdepth 4 | egrep '%s'" % (
Richard Barnette82c35912012-11-20 10:09:10 -08002521 self._LIGHTSENSOR_SEARCH_DIR, '|'.join(self._LIGHTSENSOR_FILES))
Simran Basic6f1f7a2012-10-16 10:47:46 -07002522 try:
2523 # Run the search cmd following the symlinks. Stderr_tee is set to
2524 # None as there can be a symlink loop, but the command will still
2525 # execute correctly with a few messages printed to stderr.
2526 self.run(search_cmd, stdout_tee=None, stderr_tee=None)
2527 return 'lightsensor'
2528 except error.AutoservRunError:
2529 # egrep exited with a return code of 1 meaning none of the possible
2530 # lightsensor files existed.
2531 return None
2532
2533
Aviv Keshet74c89a92013-02-04 15:18:30 -08002534 @label_decorator('bluetooth')
Simran Basic6f1f7a2012-10-16 10:47:46 -07002535 def has_bluetooth(self):
2536 """Determine the correct board label for this host.
2537
2538 @returns the string 'bluetooth' if this host has bluetooth or
2539 None if it does not.
2540 """
2541 try:
2542 self.run('test -d /sys/class/bluetooth/hci0')
2543 # test exited with a return code of 0.
2544 return 'bluetooth'
2545 except error.AutoservRunError:
2546 # test exited with a return code 1 meaning the directory did not
2547 # exist.
2548 return None
2549
2550
Ilja H. Friedel1232e8a2014-06-17 21:30:48 -07002551 @label_decorator('gpu_family')
2552 def get_gpu_family(self):
2553 """
2554 Determine GPU family.
2555
2556 @returns a string representing the gpu family. Examples are mali, tegra,
2557 pinetrail, sandybridge, ivybridge, haswell and baytrail.
2558 """
2559 gpu_family = self.run(self.poor_mans_rpc('get_gpu_family()')).stdout
2560 return 'gpu_family:%s' % str.strip(gpu_family)
2561
2562
Ilja Friedel0ce0b602013-08-15 18:45:27 -07002563 @label_decorator('graphics')
2564 def get_graphics(self):
2565 """
2566 Determine the correct board label for this host.
2567
2568 @returns a string representing this host's graphics. For now ARM boards
2569 return graphics:gles while all other boards return graphics:gl. This
2570 may change over time, but for robustness reasons this should avoid
2571 executing code in actual graphics libraries (which may not be ready and
2572 is tested by graphics_GLAPICheck).
2573 """
2574 uname = self.run('uname -a').stdout.lower()
2575 if 'arm' in uname:
2576 return 'graphics:gles'
2577 return 'graphics:gl'
2578
2579
Bill Richardson4f595f52014-02-13 16:20:26 -08002580 @label_decorator('ec')
2581 def get_ec(self):
2582 """
2583 Determine the type of EC on this host.
2584
2585 @returns a string representing this host's embedded controller type.
2586 At present, it only returns "ec:cros", for Chrome OS ECs. Other types
2587 of EC (or none) don't return any strings, since no tests depend on
2588 those.
2589 """
2590 cmd = 'mosys ec info'
2591 # The output should look like these, so that the last field should
2592 # match our EC version scheme:
2593 #
2594 # stm | stm32f100 | snow_v1.3.139-375eb9f
2595 # ti | Unknown-10de | peppy_v1.5.114-5d52788
2596 #
2597 # Non-Chrome OS ECs will look like these:
2598 #
2599 # ENE | KB932 | 00BE107A00
2600 # ite | it8518 | 3.08
2601 #
2602 # And some systems don't have ECs at all (Lumpy, for example).
2603 regexp = r'^.*\|\s*(\S+_v\d+\.\d+\.\d+-[0-9a-f]+)\s*$'
2604
2605 ecinfo = self.run(command=cmd, ignore_status=True)
2606 if ecinfo.exit_status == 0:
2607 res = re.search(regexp, ecinfo.stdout)
2608 if res:
2609 logging.info("EC version is %s", res.groups()[0])
2610 return 'ec:cros'
2611 logging.info("%s got: %s", cmd, ecinfo.stdout)
2612 # Has an EC, but it's not a Chrome OS EC
2613 return None
2614 logging.info("%s exited with status %d", cmd, ecinfo.exit_status)
2615 # No EC present
2616 return None
2617
2618
Alec Berg31b932b2014-04-04 16:09:11 -07002619 @label_decorator('accels')
2620 def get_accels(self):
2621 """
2622 Determine the type of accelerometers on this host.
2623
2624 @returns a string representing this host's accelerometer type.
2625 At present, it only returns "accel:cros-ec", for accelerometers
2626 attached to a Chrome OS EC, or none, if no accelerometers.
2627 """
2628 # Check to make sure we have ectool
2629 rv = self.run('which ectool', ignore_status=True)
2630 if rv.exit_status:
2631 logging.info("No ectool cmd found, assuming no EC accelerometers")
2632 return None
2633
2634 # Check that the EC supports the motionsense command
2635 rv = self.run('ectool motionsense', ignore_status=True)
2636 if rv.exit_status:
2637 logging.info("EC does not support motionsense command "
2638 "assuming no EC accelerometers")
2639 return None
2640
2641 # Check that EC motion sensors are active
2642 active = self.run('ectool motionsense active').stdout.split('\n')
2643 if active[0] == "0":
2644 logging.info("Motion sense inactive, assuming no EC accelerometers")
2645 return None
2646
2647 logging.info("EC accelerometers found")
2648 return 'accel:cros-ec'
2649
2650
Tom Wai-Hong Tam3d6790d2014-04-14 16:15:47 +08002651 @label_decorator('chameleon')
2652 def has_chameleon(self):
2653 """Determine if a Chameleon connected to this host.
2654
Tom Wai-Hong Tambadbb332014-10-10 02:59:41 +08002655 @returns a list containing two strings ('chameleon' and
2656 'chameleon:' + label, e.g. 'chameleon:hdmi') if this host
2657 has a Chameleon or None if it has not.
Tom Wai-Hong Tam3d6790d2014-04-14 16:15:47 +08002658 """
2659 if self._chameleon_host:
Tom Wai-Hong Tambadbb332014-10-10 02:59:41 +08002660 return ['chameleon', 'chameleon:' + self.chameleon.get_label()]
Tom Wai-Hong Tam3d6790d2014-04-14 16:15:47 +08002661 else:
2662 return None
2663
2664
Cheng-Yi Chiangf4104ff2014-12-23 19:39:01 +08002665 @label_decorator('audio_loopback_dongle')
2666 def has_loopback_dongle(self):
2667 """Determine if an audio loopback dongle is plugged to this host.
2668
2669 @returns 'audio_loopback_dongle' when there is an audio loopback dongle
2670 plugged to this host.
2671 None when there is no audio loopback dongle
2672 plugged to this host.
2673 """
Cheng-Yi Chiang8de78112015-05-27 14:47:08 +08002674 nodes_info = self.run(command=cras_utils.get_cras_nodes_cmd(),
2675 ignore_status=True).stdout
2676 if (cras_utils.node_type_is_plugged('HEADPHONE', nodes_info) and
2677 cras_utils.node_type_is_plugged('MIC', nodes_info)):
Cheng-Yi Chiangf4104ff2014-12-23 19:39:01 +08002678 return 'audio_loopback_dongle'
2679 else:
2680 return None
2681
2682
Derek Basehorec71ff622014-07-07 15:18:40 -07002683 @label_decorator('power_supply')
2684 def get_power_supply(self):
2685 """
2686 Determine what type of power supply the host has
2687
2688 @returns a string representing this host's power supply.
2689 'power:battery' when the device has a battery intended for
2690 extended use
2691 'power:AC_primary' when the device has a battery not intended
2692 for extended use (for moving the machine, etc)
2693 'power:AC_only' when the device has no battery at all.
2694 """
2695 psu = self.run(command='mosys psu type', ignore_status=True)
2696 if psu.exit_status:
2697 # The psu command for mosys is not included for all platforms. The
2698 # assumption is that the device will have a battery if the command
2699 # is not found.
2700 return 'power:battery'
2701
2702 psu_str = psu.stdout.strip()
2703 if psu_str == 'unknown':
2704 return None
2705
2706 return 'power:%s' % psu_str
2707
2708
Puthikorn Voravootivatfa011242014-03-14 18:45:11 -07002709 @label_decorator('storage')
2710 def get_storage(self):
2711 """
2712 Determine the type of boot device for this host.
2713
2714 Determine if the internal device is SCSI or dw_mmc device.
2715 Then check that it is SSD or HDD or eMMC or something else.
2716
2717 @returns a string representing this host's internal device type.
2718 'storage:ssd' when internal device is solid state drive
2719 'storage:hdd' when internal device is hard disk drive
2720 'storage:mmc' when internal device is mmc drive
2721 None When internal device is something else or
2722 when we are unable to determine the type
2723 """
2724 # The output should be /dev/mmcblk* for SD/eMMC or /dev/sd* for scsi
2725 rootdev_cmd = ' '.join(['. /usr/sbin/write_gpt.sh;',
2726 '. /usr/share/misc/chromeos-common.sh;',
2727 'load_base_vars;',
2728 'get_fixed_dst_drive'])
Puthikorn Voravootivat03c51682014-04-24 13:52:12 -07002729 rootdev = self.run(command=rootdev_cmd, ignore_status=True)
2730 if rootdev.exit_status:
2731 logging.info("Fail to run %s", rootdev_cmd)
2732 return None
Puthikorn Voravootivatfa011242014-03-14 18:45:11 -07002733 rootdev_str = rootdev.stdout.strip()
2734
2735 if not rootdev_str:
2736 return None
2737
2738 rootdev_base = os.path.basename(rootdev_str)
2739
2740 mmc_pattern = '/dev/mmcblk[0-9]'
2741 if re.match(mmc_pattern, rootdev_str):
2742 # Use type to determine if the internal device is eMMC or somthing
2743 # else. We can assume that MMC is always an internal device.
2744 type_cmd = 'cat /sys/block/%s/device/type' % rootdev_base
Puthikorn Voravootivat03c51682014-04-24 13:52:12 -07002745 type = self.run(command=type_cmd, ignore_status=True)
2746 if type.exit_status:
2747 logging.info("Fail to run %s", type_cmd)
2748 return None
Puthikorn Voravootivatfa011242014-03-14 18:45:11 -07002749 type_str = type.stdout.strip()
2750
2751 if type_str == 'MMC':
2752 return 'storage:mmc'
2753
2754 scsi_pattern = '/dev/sd[a-z]+'
2755 if re.match(scsi_pattern, rootdev.stdout):
2756 # Read symlink for /sys/block/sd* to determine if the internal
2757 # device is connected via ata or usb.
2758 link_cmd = 'readlink /sys/block/%s' % rootdev_base
Puthikorn Voravootivat03c51682014-04-24 13:52:12 -07002759 link = self.run(command=link_cmd, ignore_status=True)
2760 if link.exit_status:
2761 logging.info("Fail to run %s", link_cmd)
2762 return None
Puthikorn Voravootivatfa011242014-03-14 18:45:11 -07002763 link_str = link.stdout.strip()
2764 if 'usb' in link_str:
2765 return None
2766
2767 # Read rotation to determine if the internal device is ssd or hdd.
2768 rotate_cmd = str('cat /sys/block/%s/queue/rotational'
2769 % rootdev_base)
Puthikorn Voravootivat03c51682014-04-24 13:52:12 -07002770 rotate = self.run(command=rotate_cmd, ignore_status=True)
2771 if rotate.exit_status:
2772 logging.info("Fail to run %s", rotate_cmd)
2773 return None
Puthikorn Voravootivatfa011242014-03-14 18:45:11 -07002774 rotate_str = rotate.stdout.strip()
2775
2776 rotate_dict = {'0':'storage:ssd', '1':'storage:hdd'}
2777 return rotate_dict.get(rotate_str)
2778
2779 # All other internal device / error case will always fall here
2780 return None
2781
2782
Dan Shi4e9a2aa2014-03-24 14:28:42 -07002783 @label_decorator('servo')
2784 def get_servo(self):
2785 """Determine if the host has a servo attached.
2786
2787 If the host has a working servo attached, it should have a servo label.
2788
2789 @return: string 'servo' if the host has servo attached. Otherwise,
2790 returns None.
2791 """
2792 return 'servo' if self._servo_host else None
2793
2794
Dan Shi5beba472014-05-28 22:46:07 -07002795 @label_decorator('video_labels')
2796 def get_video_labels(self):
2797 """Run /usr/local/bin/avtest_label_detect to get a list of video labels.
2798
2799 Sample output of avtest_label_detect:
2800 Detected label: hw_video_acc_vp8
2801 Detected label: webcam
2802
2803 @return: A list of labels detected by tool avtest_label_detect.
2804 """
2805 try:
2806 result = self.run('/usr/local/bin/avtest_label_detect').stdout
2807 return re.findall('^Detected label: (\w+)$', result, re.M)
2808 except error.AutoservRunError:
2809 # The tool is not installed.
2810 return []
2811
2812
mussa584b4462014-06-20 15:13:28 -07002813 @label_decorator('video_glitch_detection')
2814 def is_video_glitch_detection_supported(self):
2815 """ Determine if a board under test is supported for video glitch
2816 detection tests.
2817
2818 @return: 'video_glitch_detection' if board is supported, None otherwise.
2819 """
2820 parser = ConfigParser.SafeConfigParser()
2821 filename = os.path.join(
2822 common.autotest_dir, 'client/cros/video/device_spec.conf')
2823
2824 dut = self.get_board().replace(ds_constants.BOARD_PREFIX, '')
2825
2826 try:
2827 parser.read(filename)
mussa584b4462014-06-20 15:13:28 -07002828 supported_boards = parser.sections()
2829
Mussa83c84d62014-10-02 12:11:28 -07002830 return 'video_glitch_detection' if dut in supported_boards else None
mussa584b4462014-06-20 15:13:28 -07002831
2832 except ConfigParser.error:
2833 # something went wrong while parsing the conf file
2834 return None
2835
Katherine Threlkeld7b97a9f2014-06-24 13:47:14 -07002836 @label_decorator('touch_labels')
2837 def get_touch(self):
2838 """
2839 Determine whether board under test has a touchpad or touchscreen.
2840
2841 @return: A list of some combination of 'touchscreen' and 'touchpad',
2842 depending on what is present on the device.
Katherine Threlkeldab83d392015-06-18 16:45:57 -07002843
Katherine Threlkeld7b97a9f2014-06-24 13:47:14 -07002844 """
2845 labels = []
Katherine Threlkeldab83d392015-06-18 16:45:57 -07002846 looking_for = ['touchpad', 'touchscreen']
2847 player = input_playback.InputPlayback()
2848 input_events = self.run('ls /dev/input/event*').stdout.strip().split()
2849 filename = '/tmp/touch_labels'
2850 for event in input_events:
2851 self.run('evtest %s > %s' % (event, filename), timeout=1,
2852 ignore_timeout=True)
2853 properties = self.run('cat %s' % filename).stdout
2854 input_type = player._determine_input_type(properties)
2855 if input_type in looking_for:
2856 labels.append(input_type)
2857 looking_for.remove(input_type)
2858 if len(looking_for) == 0:
2859 break
2860 self.run('rm %s' % filename)
2861
Katherine Threlkeld7b97a9f2014-06-24 13:47:14 -07002862 return labels
2863
Hung-ying Tyana39b0542015-06-30 10:36:42 +08002864
2865 @label_decorator('internal_display')
2866 def has_internal_display(self):
2867 """Determine if the device under test is equipped with an internal
2868 display.
2869
2870 @return: 'internal_display' if one is present; None otherwise.
2871 """
2872 from autotest_lib.client.cros.graphics import graphics_utils
2873 from autotest_lib.client.common_lib import utils as common_utils
2874
2875 def __system_output(cmd):
2876 return self.run(cmd).stdout
2877
2878 def __read_file(remote_path):
2879 return self.run('cat %s' % remote_path).stdout
2880
2881 # Hijack the necessary client functions so that we can take advantage
2882 # of the client lib here.
2883 # FIXME: find a less hacky way than this
2884 original_system_output = utils.system_output
2885 original_read_file = common_utils.read_file
2886 utils.system_output = __system_output
2887 common_utils.read_file = __read_file
2888 try:
2889 return ('internal_display' if graphics_utils.has_internal_display()
2890 else None)
2891 finally:
2892 utils.system_output = original_system_output
2893 common_utils.read_file = original_read_file
2894
2895
Eric Carusoee673ac2015-08-05 17:03:04 -07002896 @label_decorator('lucidsleep')
2897 def has_lucid_sleep_support(self):
2898 """Determine if the device under test has support for lucid sleep.
2899
2900 @return 'lucidsleep' if this board supports lucid sleep; None otherwise
2901 """
2902 board = self.get_board().replace(ds_constants.BOARD_PREFIX, '')
2903 return 'lucidsleep' if board in LUCID_SLEEP_BOARDS else None
2904
2905
Simran Basic6f1f7a2012-10-16 10:47:46 -07002906 def get_labels(self):
2907 """Return a list of labels for this given host.
2908
2909 This is the main way to retrieve all the automatic labels for a host
2910 as it will run through all the currently implemented label functions.
2911 """
2912 labels = []
Richard Barnette82c35912012-11-20 10:09:10 -08002913 for label_function in self._LABEL_FUNCTIONS:
J. Richard Barnetteb869b222014-09-03 17:55:44 -07002914 try:
2915 label = label_function(self)
2916 except Exception as e:
2917 logging.error('Label function %s failed; ignoring it.',
2918 label_function.__name__)
2919 logging.exception(e)
2920 label = None
Simran Basic6f1f7a2012-10-16 10:47:46 -07002921 if label:
Dan Shi5beba472014-05-28 22:46:07 -07002922 if type(label) is str:
2923 labels.append(label)
2924 elif type(label) is list:
2925 labels.extend(label)
Simran Basic6f1f7a2012-10-16 10:47:46 -07002926 return labels
Dan Shi85276d42014-04-08 22:11:45 -07002927
2928
2929 def is_boot_from_usb(self):
2930 """Check if DUT is boot from USB.
2931
2932 @return: True if DUT is boot from usb.
2933 """
2934 device = self.run('rootdev -s -d').stdout.strip()
2935 removable = int(self.run('cat /sys/block/%s/removable' %
2936 os.path.basename(device)).stdout.strip())
2937 return removable == 1
Helen Zhang17dae2b2014-11-11 09:25:52 -08002938
2939
2940 def read_from_meminfo(self, key):
Dan Shi49ca0932014-11-14 11:22:27 -08002941 """Return the memory info from /proc/meminfo
Helen Zhang17dae2b2014-11-11 09:25:52 -08002942
2943 @param key: meminfo requested
2944
2945 @return the memory value as a string
2946
2947 """
Helen Zhang17dae2b2014-11-11 09:25:52 -08002948 meminfo = self.run('grep %s /proc/meminfo' % key).stdout.strip()
2949 logging.debug('%s', meminfo)
2950 return int(re.search(r'\d+', meminfo).group(0))
Rohit Makasana8a4923c2015-08-13 17:04:26 -07002951
2952
2953 def get_board_type(self):
2954 """
2955 Get the DUT's device type from /etc/lsb-release.
Danny Chan471a8d12015-08-18 14:57:41 -07002956 DEVICETYPE can be one of CHROMEBOX, CHROMEBASE, CHROMEBOOK or more.
2957
2958 @return value of DEVICETYPE param from lsb-release.
Rohit Makasana8a4923c2015-08-13 17:04:26 -07002959 """
Danny Chan471a8d12015-08-18 14:57:41 -07002960 device_type = self.run('grep DEVICETYPE /etc/lsb-release',
2961 ignore_status=True).stdout
2962 if device_type:
Kalin Stoyanov524310b2015-08-21 16:24:04 -07002963 return device_type.split('=')[-1].strip()
Danny Chan471a8d12015-08-18 14:57:41 -07002964 return ''