blob: 943752f74869424e99f37bac6f2beb1888601a91 [file] [log] [blame]
J. Richard Barnette24adbf42012-04-11 15:04:53 -07001# Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
Dale Curtisaa5eedb2011-08-23 16:18:52 -07002# Use of this source code is governed by a BSD-style license that can be
3# found in the LICENSE file.
4
mussa584b4462014-06-20 15:13:28 -07005import ConfigParser
Aviv Keshet74c89a92013-02-04 15:18:30 -08006import functools
Christopher Wiley0ed712b2013-04-09 15:25:12 -07007import httplib
Darren Krahn495b0982015-09-21 19:12:51 -07008import json
J. Richard Barnette1d78b012012-05-15 13:56:30 -07009import logging
Dan Shi0f466e82013-02-22 15:44:58 -080010import os
Simran Basid5e5e272012-09-24 15:23:59 -070011import re
Christopher Wileyd78249a2013-03-01 13:05:31 -080012import socket
J. Richard Barnette134ec2c2012-04-25 12:59:37 -070013import time
J. Richard Barnette1d78b012012-05-15 13:56:30 -070014import xmlrpclib
J. Richard Barnette134ec2c2012-04-25 12:59:37 -070015
mussa584b4462014-06-20 15:13:28 -070016import common
J. Richard Barnette45e93de2012-04-11 17:24:15 -070017from autotest_lib.client.bin import utils
Dan Shi9cb0eec2014-06-03 09:04:50 -070018from autotest_lib.client.common_lib import autotemp
Richard Barnette0c73ffc2012-11-19 15:21:18 -080019from autotest_lib.client.common_lib import error
20from autotest_lib.client.common_lib import global_config
Dan Shi549fb822015-03-24 18:01:11 -070021from autotest_lib.client.common_lib import lsbrelease_utils
J. Richard Barnette45e93de2012-04-11 17:24:15 -070022from autotest_lib.client.common_lib.cros import autoupdater
Richard Barnette03a0c132012-11-05 12:40:35 -080023from autotest_lib.client.common_lib.cros import dev_server
Christopher Wileyd78249a2013-03-01 13:05:31 -080024from autotest_lib.client.common_lib.cros import retry
Gabe Blackb72f4fb2015-01-20 16:47:13 -080025from autotest_lib.client.common_lib.cros.graphite import autotest_es
Gabe Black1e1c41b2015-02-04 23:55:15 -080026from autotest_lib.client.common_lib.cros.graphite import autotest_stats
Hsinyu Chaoe0b08e62015-08-11 10:50:37 +000027from autotest_lib.client.cros import constants as client_constants
J. Richard Barnette84890bd2014-02-21 11:05:47 -080028from autotest_lib.client.cros import cros_ui
Cheng-Yi Chiangf4104ff2014-12-23 19:39:01 +080029from autotest_lib.client.cros.audio import cras_utils
Katherine Threlkeldab83d392015-06-18 16:45:57 -070030from autotest_lib.client.cros.input_playback import input_playback
MK Ryu35d661e2014-09-25 17:44:10 -070031from autotest_lib.server import autoserv_parser
32from autotest_lib.server import autotest
33from autotest_lib.server import constants
34from autotest_lib.server import crashcollect
Dan Shia1ecd5c2013-06-06 11:21:31 -070035from autotest_lib.server import utils as server_utils
Dan Shi9cb0eec2014-06-03 09:04:50 -070036from autotest_lib.server.cros import provision
Scott Zawalski89c44dd2013-02-26 09:28:02 -050037from autotest_lib.server.cros.dynamic_suite import constants as ds_constants
Simran Basi5e6339a2013-03-21 11:34:32 -070038from autotest_lib.server.cros.dynamic_suite import tools, frontend_wrappers
Dan Shi9cb0eec2014-06-03 09:04:50 -070039from autotest_lib.server.cros.faft.config.config import Config as FAFTConfig
Fang Deng96667ca2013-08-01 17:46:18 -070040from autotest_lib.server.hosts import abstract_ssh
Tom Wai-Hong Tamefe1c7f2014-01-02 14:00:11 +080041from autotest_lib.server.hosts import chameleon_host
Fang Deng5d518f42013-08-02 14:04:32 -070042from autotest_lib.server.hosts import servo_host
Simran Basidcff4252012-11-20 16:13:20 -080043from autotest_lib.site_utils.rpm_control_system import rpm_client
Simran Basid5e5e272012-09-24 15:23:59 -070044
45
beeps32a63082013-08-22 14:02:29 -070046try:
47 import jsonrpclib
48except ImportError:
49 jsonrpclib = None
Fang Deng96667ca2013-08-01 17:46:18 -070050
Fang Dengd1c2b732013-08-20 12:59:46 -070051
Dan Shib8540a52015-07-16 14:18:23 -070052CONFIG = global_config.global_config
53
Eric Carusoee673ac2015-08-05 17:03:04 -070054LUCID_SLEEP_BOARDS = ['samus', 'lulu']
55
beepsc87ff602013-07-31 21:53:00 -070056class FactoryImageCheckerException(error.AutoservError):
57 """Exception raised when an image is a factory image."""
58 pass
59
60
Aviv Keshet74c89a92013-02-04 15:18:30 -080061def add_label_detector(label_function_list, label_list=None, label=None):
62 """Decorator used to group functions together into the provided list.
63 @param label_function_list: List of label detecting functions to add
64 decorated function to.
65 @param label_list: List of detectable labels to add detectable labels to.
66 (Default: None)
67 @param label: Label string that is detectable by this detection function
68 (Default: None)
J. Richard Barnette7214e0b2013-02-06 15:20:49 -080069 """
Simran Basic6f1f7a2012-10-16 10:47:46 -070070 def add_func(func):
Aviv Keshet74c89a92013-02-04 15:18:30 -080071 """
72 @param func: The function to be added as a detector.
73 """
74 label_function_list.append(func)
75 if label and label_list is not None:
76 label_list.append(label)
Simran Basic6f1f7a2012-10-16 10:47:46 -070077 return func
78 return add_func
79
80
Fang Deng0ca40e22013-08-27 17:47:44 -070081class CrosHost(abstract_ssh.AbstractSSHHost):
J. Richard Barnette45e93de2012-04-11 17:24:15 -070082 """Chromium OS specific subclass of Host."""
83
84 _parser = autoserv_parser.autoserv_parser
Scott Zawalski62bacae2013-03-05 10:40:32 -050085 _AFE = frontend_wrappers.RetryingAFE(timeout_min=5, delay_sec=10)
J. Richard Barnette45e93de2012-04-11 17:24:15 -070086
Richard Barnette03a0c132012-11-05 12:40:35 -080087 # Timeout values (in seconds) associated with various Chrome OS
88 # state changes.
J. Richard Barnette134ec2c2012-04-25 12:59:37 -070089 #
Richard Barnette0c73ffc2012-11-19 15:21:18 -080090 # In general, a good rule of thumb is that the timeout can be up
91 # to twice the typical measured value on the slowest platform.
92 # The times here have not necessarily been empirically tested to
93 # meet this criterion.
J. Richard Barnetteeb69d722012-06-18 17:29:44 -070094 #
95 # SLEEP_TIMEOUT: Time to allow for suspend to memory.
Richard Barnette0c73ffc2012-11-19 15:21:18 -080096 # RESUME_TIMEOUT: Time to allow for resume after suspend, plus
97 # time to restart the netwowrk.
J. Richard Barnette84890bd2014-02-21 11:05:47 -080098 # SHUTDOWN_TIMEOUT: Time to allow for shut down.
J. Richard Barnetteeb69d722012-06-18 17:29:44 -070099 # BOOT_TIMEOUT: Time to allow for boot from power off. Among
Richard Barnette0c73ffc2012-11-19 15:21:18 -0800100 # other things, this must account for the 30 second dev-mode
J. Richard Barnetted4649c62013-03-06 17:42:27 -0800101 # screen delay and time to start the network.
J. Richard Barnetteeb69d722012-06-18 17:29:44 -0700102 # USB_BOOT_TIMEOUT: Time to allow for boot from a USB device,
Richard Barnette0c73ffc2012-11-19 15:21:18 -0800103 # including the 30 second dev-mode delay and time to start the
J. Richard Barnetted4649c62013-03-06 17:42:27 -0800104 # network.
beepsf079cfb2013-09-18 17:49:51 -0700105 # INSTALL_TIMEOUT: Time to allow for chromeos-install.
J. Richard Barnette84890bd2014-02-21 11:05:47 -0800106 # POWERWASH_BOOT_TIMEOUT: Time to allow for a reboot that
107 # includes powerwash.
J. Richard Barnetteeb69d722012-06-18 17:29:44 -0700108
109 SLEEP_TIMEOUT = 2
J. Richard Barnetted4649c62013-03-06 17:42:27 -0800110 RESUME_TIMEOUT = 10
Tom Wai-Hong Tamfe005c22014-12-03 09:25:44 +0800111 SHUTDOWN_TIMEOUT = 10
J. Richard Barnettefbcc7122013-07-24 18:24:59 -0700112 BOOT_TIMEOUT = 60
J. Richard Barnette5bab5f52015-08-03 13:14:38 -0700113 USB_BOOT_TIMEOUT = 300
J. Richard Barnette7817b052014-08-28 09:47:29 -0700114 INSTALL_TIMEOUT = 480
Dan Shi2c88eed2013-11-12 10:18:38 -0800115 POWERWASH_BOOT_TIMEOUT = 60
Chris Sosab76e0ee2013-05-22 16:55:41 -0700116
Dan Shica503482015-03-30 17:23:25 -0700117 # Minimum OS version that supports server side packaging. Older builds may
118 # not have server side package built or with Autotest code change to support
119 # server-side packaging.
Dan Shib8540a52015-07-16 14:18:23 -0700120 MIN_VERSION_SUPPORT_SSP = CONFIG.get_config_value(
Dan Shiced09e42015-04-17 16:09:34 -0700121 'AUTOSERV', 'min_version_support_ssp', type=int)
Dan Shica503482015-03-30 17:23:25 -0700122
J. Richard Barnette84890bd2014-02-21 11:05:47 -0800123 # REBOOT_TIMEOUT: How long to wait for a reboot.
124 #
Chris Sosab76e0ee2013-05-22 16:55:41 -0700125 # We have a long timeout to ensure we don't flakily fail due to other
126 # issues. Shorter timeouts are vetted in platform_RebootAfterUpdate.
Simran Basi1160e2c2013-10-04 16:00:24 -0700127 # TODO(sbasi - crbug.com/276094) Restore to 5 mins once the 'host did not
128 # return from reboot' bug is solved.
129 REBOOT_TIMEOUT = 480
Chris Sosab76e0ee2013-05-22 16:55:41 -0700130
Ismail Noorbasha07fdb612013-02-14 14:13:31 -0800131 # _USB_POWER_TIMEOUT: Time to allow for USB to power toggle ON and OFF.
132 # _POWER_CYCLE_TIMEOUT: Time to allow for manual power cycle.
133 _USB_POWER_TIMEOUT = 5
134 _POWER_CYCLE_TIMEOUT = 10
135
beeps32a63082013-08-22 14:02:29 -0700136 _RPC_PROXY_URL = 'http://localhost:%d'
Christopher Wileydd181852013-10-10 19:56:58 -0700137 _RPC_SHUTDOWN_POLLING_PERIOD_SECONDS = 2
Peter Qiu4410db72014-06-05 10:32:41 -0700138 # Set shutdown timeout to account for the time for restarting the UI.
139 _RPC_SHUTDOWN_TIMEOUT_SECONDS = cros_ui.RESTART_UI_TIMEOUT
Richard Barnette0c73ffc2012-11-19 15:21:18 -0800140
Dan Shib8540a52015-07-16 14:18:23 -0700141 _RPM_RECOVERY_BOARDS = CONFIG.get_config_value('CROS',
Richard Barnette82c35912012-11-20 10:09:10 -0800142 'rpm_recovery_boards', type=str).split(',')
143
144 _MAX_POWER_CYCLE_ATTEMPTS = 6
145 _LAB_MACHINE_FILE = '/mnt/stateful_partition/.labmachine'
Fang Dengdeba14f2014-11-14 11:54:09 -0800146 _RPM_HOSTNAME_REGEX = ('chromeos(\d+)(-row(\d+))?-rack(\d+[a-z]*)'
147 '-host(\d+)')
Katherine Threlkeldab83d392015-06-18 16:45:57 -0700148 _LIGHTSENSOR_FILES = [ "in_illuminance0_input",
149 "in_illuminance_input",
150 "in_illuminance0_raw",
151 "in_illuminance_raw",
152 "illuminance0_input"]
Richard Barnette82c35912012-11-20 10:09:10 -0800153 _LIGHTSENSOR_SEARCH_DIR = '/sys/bus/iio/devices'
154 _LABEL_FUNCTIONS = []
Aviv Keshet74c89a92013-02-04 15:18:30 -0800155 _DETECTABLE_LABELS = []
156 label_decorator = functools.partial(add_label_detector, _LABEL_FUNCTIONS,
157 _DETECTABLE_LABELS)
J. Richard Barnette134ec2c2012-04-25 12:59:37 -0700158
J. Richard Barnetteb6de7e32013-02-14 13:28:04 -0800159 # Constants used in ping_wait_up() and ping_wait_down().
160 #
161 # _PING_WAIT_COUNT is the approximate number of polling
162 # cycles to use when waiting for a host state change.
163 #
164 # _PING_STATUS_DOWN and _PING_STATUS_UP are names used
165 # for arguments to the internal _ping_wait_for_status()
166 # method.
167 _PING_WAIT_COUNT = 40
168 _PING_STATUS_DOWN = False
169 _PING_STATUS_UP = True
170
Ismail Noorbasha07fdb612013-02-14 14:13:31 -0800171 # Allowed values for the power_method argument.
172
173 # POWER_CONTROL_RPM: Passed as default arg for power_off/on/cycle() methods.
174 # POWER_CONTROL_SERVO: Used in set_power() and power_cycle() methods.
175 # POWER_CONTROL_MANUAL: Used in set_power() and power_cycle() methods.
176 POWER_CONTROL_RPM = 'RPM'
177 POWER_CONTROL_SERVO = 'servoj10'
178 POWER_CONTROL_MANUAL = 'manual'
179
180 POWER_CONTROL_VALID_ARGS = (POWER_CONTROL_RPM,
181 POWER_CONTROL_SERVO,
182 POWER_CONTROL_MANUAL)
Richard Barnette0c73ffc2012-11-19 15:21:18 -0800183
Simran Basi5e6339a2013-03-21 11:34:32 -0700184 _RPM_OUTLET_CHANGED = 'outlet_changed'
185
Dan Shi9cb0eec2014-06-03 09:04:50 -0700186 # URL pattern to download firmware image.
Dan Shib8540a52015-07-16 14:18:23 -0700187 _FW_IMAGE_URL_PATTERN = CONFIG.get_config_value(
Dan Shi9cb0eec2014-06-03 09:04:50 -0700188 'CROS', 'firmware_url_pattern', type=str)
beeps687243d2013-07-18 15:29:27 -0700189
MK Ryu35d661e2014-09-25 17:44:10 -0700190 # File that has a list of directories to be collected
191 _LOGS_TO_COLLECT_FILE = os.path.join(
192 common.client_dir, 'common_lib', 'logs_to_collect')
193
194 # Prefix of logging message w.r.t. crash collection
195 _CRASHLOGS_PREFIX = 'collect_crashlogs'
196
197 # Time duration waiting for host up/down check
198 _CHECK_HOST_UP_TIMEOUT_SECS = 15
199
200 # A command that interacts with kernel and hardware (e.g., rm, mkdir, etc)
201 # might not be completely done deep through the hardware when the machine
202 # is powered down right after the command returns.
203 # We should wait for a few seconds to make them done. Finger crossed.
204 _SAFE_WAIT_SECS = 10
205
206
J. Richard Barnette964fba02012-10-24 17:34:29 -0700207 @staticmethod
beeps46dadc92013-11-07 14:07:10 -0800208 def check_host(host, timeout=10):
209 """
210 Check if the given host is a chrome-os host.
211
212 @param host: An ssh host representing a device.
213 @param timeout: The timeout for the run command.
214
215 @return: True if the host device is chromeos.
216
beeps46dadc92013-11-07 14:07:10 -0800217 """
218 try:
Simran Basi933c8af2015-04-29 14:05:07 -0700219 result = host.run(
220 'grep -q CHROMEOS /etc/lsb-release && '
221 '! test -f /mnt/stateful_partition/.android_tester && '
222 '! grep -q moblab /etc/lsb-release',
223 ignore_status=True, timeout=timeout)
beeps46dadc92013-11-07 14:07:10 -0800224 except (error.AutoservRunError, error.AutoservSSHTimeout):
225 return False
226 return result.exit_status == 0
227
228
229 @staticmethod
Tom Wai-Hong Tamefe1c7f2014-01-02 14:00:11 +0800230 def _extract_arguments(args_dict, key_subset):
231 """Extract options from `args_dict` and return a subset result.
J. Richard Barnette7214e0b2013-02-06 15:20:49 -0800232
233 Take the provided dictionary of argument options and return
Tom Wai-Hong Tamefe1c7f2014-01-02 14:00:11 +0800234 a subset that represent standard arguments needed to construct
235 a test-assistant object (chameleon or servo) for a host. The
236 intent is to provide standard argument processing from
Christopher Wiley644ef3e2015-05-15 13:14:14 -0700237 CrosHost for tests that require a test-assistant board
Tom Wai-Hong Tamefe1c7f2014-01-02 14:00:11 +0800238 to operate.
239
240 @param args_dict Dictionary from which to extract the arguments.
241 @param key_subset Tuple of keys to extract from the args_dict, e.g.
242 ('servo_host', 'servo_port').
243 """
244 result = {}
245 for arg in key_subset:
246 if arg in args_dict:
247 result[arg] = args_dict[arg]
248 return result
249
250
251 @staticmethod
252 def get_chameleon_arguments(args_dict):
253 """Extract chameleon options from `args_dict` and return the result.
254
255 Recommended usage:
256 ~~~~~~~~
257 args_dict = utils.args_to_dict(args)
258 chameleon_args = hosts.CrosHost.get_chameleon_arguments(args_dict)
259 host = hosts.create_host(machine, chameleon_args=chameleon_args)
260 ~~~~~~~~
261
262 @param args_dict Dictionary from which to extract the chameleon
263 arguments.
264 """
265 return CrosHost._extract_arguments(
266 args_dict, ('chameleon_host', 'chameleon_port'))
267
268
269 @staticmethod
270 def get_servo_arguments(args_dict):
271 """Extract servo options from `args_dict` and return the result.
J. Richard Barnette7214e0b2013-02-06 15:20:49 -0800272
273 Recommended usage:
274 ~~~~~~~~
275 args_dict = utils.args_to_dict(args)
Fang Deng0ca40e22013-08-27 17:47:44 -0700276 servo_args = hosts.CrosHost.get_servo_arguments(args_dict)
J. Richard Barnette7214e0b2013-02-06 15:20:49 -0800277 host = hosts.create_host(machine, servo_args=servo_args)
278 ~~~~~~~~
279
280 @param args_dict Dictionary from which to extract the servo
281 arguments.
282 """
Tom Wai-Hong Tamefe1c7f2014-01-02 14:00:11 +0800283 return CrosHost._extract_arguments(
284 args_dict, ('servo_host', 'servo_port'))
J. Richard Barnette134ec2c2012-04-25 12:59:37 -0700285
J. Richard Barnette964fba02012-10-24 17:34:29 -0700286
Tom Wai-Hong Tamefe1c7f2014-01-02 14:00:11 +0800287 def _initialize(self, hostname, chameleon_args=None, servo_args=None,
Fang Denge545abb2014-12-30 18:43:47 -0800288 try_lab_servo=False, ssh_verbosity_flag='', ssh_options='',
Fang Dengd1c2b732013-08-20 12:59:46 -0700289 *args, **dargs):
Tom Wai-Hong Tamefe1c7f2014-01-02 14:00:11 +0800290 """Initialize superclasses, |self.chameleon|, and |self.servo|.
J. Richard Barnette67ccb872012-04-19 16:34:56 -0700291
Fang Denge545abb2014-12-30 18:43:47 -0800292 This method will attempt to create the test-assistant object
293 (chameleon/servo) when it is needed by the test. Check
294 the docstring of chameleon_host.create_chameleon_host and
295 servo_host.create_servo_host for how this is determined.
Fang Deng5d518f42013-08-02 14:04:32 -0700296
Fang Denge545abb2014-12-30 18:43:47 -0800297 @param hostname: Hostname of the dut.
298 @param chameleon_args: A dictionary that contains args for creating
299 a ChameleonHost. See chameleon_host for details.
300 @param servo_args: A dictionary that contains args for creating
301 a ServoHost object. See servo_host for details.
302 @param try_lab_servo: Boolean, False indicates that ServoHost should
303 not be created for a device in Cros test lab.
304 See servo_host for details.
305 @param ssh_verbosity_flag: String, to pass to the ssh command to control
306 verbosity.
307 @param ssh_options: String, other ssh options to pass to the ssh
308 command.
J. Richard Barnette67ccb872012-04-19 16:34:56 -0700309 """
Fang Deng0ca40e22013-08-27 17:47:44 -0700310 super(CrosHost, self)._initialize(hostname=hostname,
J. Richard Barnette45e93de2012-04-11 17:24:15 -0700311 *args, **dargs)
J. Richard Barnettef0859852012-08-20 14:55:50 -0700312 # self.env is a dictionary of environment variable settings
313 # to be exported for commands run on the host.
314 # LIBC_FATAL_STDERR_ can be useful for diagnosing certain
315 # errors that might happen.
316 self.env['LIBC_FATAL_STDERR_'] = '1'
beeps32a63082013-08-22 14:02:29 -0700317 self._rpc_proxy_map = {}
Fang Dengd1c2b732013-08-20 12:59:46 -0700318 self._ssh_verbosity_flag = ssh_verbosity_flag
Aviv Keshetc5947fa2013-09-04 14:06:29 -0700319 self._ssh_options = ssh_options
Fang Deng5d518f42013-08-02 14:04:32 -0700320 # TODO(fdeng): We need to simplify the
321 # process of servo and servo_host initialization.
322 # crbug.com/298432
Fang Denge545abb2014-12-30 18:43:47 -0800323 self._servo_host = servo_host.create_servo_host(
324 dut=self.hostname, servo_args=servo_args,
325 try_lab_servo=try_lab_servo)
Tom Wai-Hong Tamefe1c7f2014-01-02 14:00:11 +0800326 # TODO(waihong): Do the simplication on Chameleon too.
Tom Wai-Hong Tam3d6790d2014-04-14 16:15:47 +0800327 self._chameleon_host = chameleon_host.create_chameleon_host(
328 dut=self.hostname, chameleon_args=chameleon_args)
329
Dan Shi4d478522014-02-14 13:46:32 -0800330 if self._servo_host is not None:
331 self.servo = self._servo_host.get_servo()
332 else:
333 self.servo = None
334
Tom Wai-Hong Tam3d6790d2014-04-14 16:15:47 +0800335 if self._chameleon_host:
Tom Wai-Hong Tameaee3402014-01-22 08:52:10 +0800336 self.chameleon = self._chameleon_host.create_chameleon_board()
Tom Wai-Hong Tamefe1c7f2014-01-02 14:00:11 +0800337 else:
Tom Wai-Hong Tam3d6790d2014-04-14 16:15:47 +0800338 self.chameleon = None
Fang Deng5d518f42013-08-02 14:04:32 -0700339
340
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500341 def get_repair_image_name(self):
342 """Generate a image_name from variables in the global config.
343
344 @returns a str of $board-version/$BUILD.
345
346 """
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500347 board = self._get_board_from_afe()
348 if board is None:
349 raise error.AutoservError('DUT has no board attribute, '
350 'cannot be repaired.')
Dan Shi6964fa52014-12-18 11:04:27 -0800351 stable_version = self._AFE.run('get_stable_version', board=board)
Dan Shib8540a52015-07-16 14:18:23 -0700352 build_pattern = CONFIG.get_config_value(
Dan Shi6964fa52014-12-18 11:04:27 -0800353 'CROS', 'stable_build_pattern')
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500354 return build_pattern % (board, stable_version)
355
356
Scott Zawalski62bacae2013-03-05 10:40:32 -0500357 def _host_in_AFE(self):
358 """Check if the host is an object the AFE knows.
359
360 @returns the host object.
361 """
362 return self._AFE.get_hosts(hostname=self.hostname)
363
364
Chris Sosab76e0ee2013-05-22 16:55:41 -0700365 def lookup_job_repo_url(self):
366 """Looks up the job_repo_url for the host.
367
368 @returns job_repo_url from AFE or None if not found.
369
370 @raises KeyError if the host does not have a job_repo_url
371 """
Chris Sosab76e0ee2013-05-22 16:55:41 -0700372 hosts = self._AFE.get_hosts(hostname=self.hostname)
beepsb5efc532013-06-04 11:29:34 -0700373 if hosts and ds_constants.JOB_REPO_URL in hosts[0].attributes:
374 return hosts[0].attributes[ds_constants.JOB_REPO_URL]
J. Richard Barnette85d0aac2015-08-20 10:34:39 -0700375 else:
376 return None
Chris Sosab76e0ee2013-05-22 16:55:41 -0700377
378
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500379 def clear_cros_version_labels_and_job_repo_url(self):
380 """Clear cros_version labels and host attribute job_repo_url."""
Scott Zawalski62bacae2013-03-05 10:40:32 -0500381 if not self._host_in_AFE():
Scott Zawalskieadbf702013-03-14 09:23:06 -0400382 return
383
Scott Zawalski62bacae2013-03-05 10:40:32 -0500384 host_list = [self.hostname]
385 labels = self._AFE.get_labels(
386 name__startswith=ds_constants.VERSION_PREFIX,
387 host__hostname=self.hostname)
Dan Shi0f466e82013-02-22 15:44:58 -0800388
Scott Zawalski62bacae2013-03-05 10:40:32 -0500389 for label in labels:
390 label.remove_hosts(hosts=host_list)
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500391
beepscb6f1e22013-06-28 19:14:10 -0700392 self.update_job_repo_url(None, None)
393
394
395 def update_job_repo_url(self, devserver_url, image_name):
396 """
397 Updates the job_repo_url host attribute and asserts it's value.
398
399 @param devserver_url: The devserver to use in the job_repo_url.
400 @param image_name: The name of the image to use in the job_repo_url.
401
402 @raises AutoservError: If we failed to update the job_repo_url.
403 """
404 repo_url = None
405 if devserver_url and image_name:
406 repo_url = tools.get_package_url(devserver_url, image_name)
407 self._AFE.set_host_attribute(ds_constants.JOB_REPO_URL, repo_url,
Scott Zawalski62bacae2013-03-05 10:40:32 -0500408 hostname=self.hostname)
beepscb6f1e22013-06-28 19:14:10 -0700409 if self.lookup_job_repo_url() != repo_url:
410 raise error.AutoservError('Failed to update job_repo_url with %s, '
411 'host %s' % (repo_url, self.hostname))
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500412
413
Dan Shie9309262013-06-19 22:50:21 -0700414 def add_cros_version_labels_and_job_repo_url(self, image_name):
Scott Zawalskieadbf702013-03-14 09:23:06 -0400415 """Add cros_version labels and host attribute job_repo_url.
416
417 @param image_name: The name of the image e.g.
418 lumpy-release/R27-3837.0.0
Dan Shi7458bf62013-06-10 12:50:16 -0700419
Scott Zawalskieadbf702013-03-14 09:23:06 -0400420 """
Scott Zawalski62bacae2013-03-05 10:40:32 -0500421 if not self._host_in_AFE():
Scott Zawalskieadbf702013-03-14 09:23:06 -0400422 return
Scott Zawalski62bacae2013-03-05 10:40:32 -0500423
Scott Zawalskieadbf702013-03-14 09:23:06 -0400424 cros_label = '%s%s' % (ds_constants.VERSION_PREFIX, image_name)
Dan Shie9309262013-06-19 22:50:21 -0700425 devserver_url = dev_server.ImageServer.resolve(image_name).url()
Scott Zawalski62bacae2013-03-05 10:40:32 -0500426
MK Ryufb5e3a82015-07-01 12:21:20 -0700427 self._AFE.run('label_add_hosts', id=cros_label, hosts=[self.hostname])
beepscb6f1e22013-06-28 19:14:10 -0700428 self.update_job_repo_url(devserver_url, image_name)
429
430
beepsdae65fd2013-07-26 16:24:41 -0700431 def verify_job_repo_url(self, tag=''):
beepscb6f1e22013-06-28 19:14:10 -0700432 """
433 Make sure job_repo_url of this host is valid.
434
joychen03eaad92013-06-26 09:55:21 -0700435 Eg: The job_repo_url "http://lmn.cd.ab.xyx:8080/static/\
beepscb6f1e22013-06-28 19:14:10 -0700436 lumpy-release/R29-4279.0.0/autotest/packages" claims to have the
437 autotest package for lumpy-release/R29-4279.0.0. If this isn't the case,
438 download and extract it. If the devserver embedded in the url is
439 unresponsive, update the job_repo_url of the host after staging it on
440 another devserver.
441
442 @param job_repo_url: A url pointing to the devserver where the autotest
443 package for this build should be staged.
beepsdae65fd2013-07-26 16:24:41 -0700444 @param tag: The tag from the server job, in the format
445 <job_id>-<user>/<hostname>, or <hostless> for a server job.
beepscb6f1e22013-06-28 19:14:10 -0700446
447 @raises DevServerException: If we could not resolve a devserver.
448 @raises AutoservError: If we're unable to save the new job_repo_url as
449 a result of choosing a new devserver because the old one failed to
450 respond to a health check.
beeps0c865032013-07-30 11:37:06 -0700451 @raises urllib2.URLError: If the devserver embedded in job_repo_url
452 doesn't respond within the timeout.
beepscb6f1e22013-06-28 19:14:10 -0700453 """
454 job_repo_url = self.lookup_job_repo_url()
455 if not job_repo_url:
456 logging.warning('No job repo url set on host %s', self.hostname)
457 return
458
459 logging.info('Verifying job repo url %s', job_repo_url)
460 devserver_url, image_name = tools.get_devserver_build_from_package_url(
461 job_repo_url)
462
beeps0c865032013-07-30 11:37:06 -0700463 ds = dev_server.ImageServer(devserver_url)
beepscb6f1e22013-06-28 19:14:10 -0700464
465 logging.info('Staging autotest artifacts for %s on devserver %s',
466 image_name, ds.url())
beeps687243d2013-07-18 15:29:27 -0700467
468 start_time = time.time()
Simran Basi25e7a922014-10-31 11:56:10 -0700469 ds.stage_artifacts(image_name, ['autotest_packages'])
beeps687243d2013-07-18 15:29:27 -0700470 stage_time = time.time() - start_time
471
472 # Record how much of the verification time comes from a devserver
473 # restage. If we're doing things right we should not see multiple
474 # devservers for a given board/build/branch path.
475 try:
J. Richard Barnette3cbd76b2013-11-27 12:11:25 -0800476 board, build_type, branch = server_utils.ParseBuildName(
beeps687243d2013-07-18 15:29:27 -0700477 image_name)[:3]
J. Richard Barnette3cbd76b2013-11-27 12:11:25 -0800478 except server_utils.ParseBuildNameException:
beeps687243d2013-07-18 15:29:27 -0700479 pass
480 else:
beeps0c865032013-07-30 11:37:06 -0700481 devserver = devserver_url[
Chris Sosa65425082013-10-16 13:26:22 -0700482 devserver_url.find('/') + 2:devserver_url.rfind(':')]
beeps687243d2013-07-18 15:29:27 -0700483 stats_key = {
484 'board': board,
485 'build_type': build_type,
486 'branch': branch,
beeps0c865032013-07-30 11:37:06 -0700487 'devserver': devserver.replace('.', '_'),
beeps687243d2013-07-18 15:29:27 -0700488 }
Gabe Black1e1c41b2015-02-04 23:55:15 -0800489 autotest_stats.Gauge('verify_job_repo_url').send(
beeps687243d2013-07-18 15:29:27 -0700490 '%(board)s.%(build_type)s.%(branch)s.%(devserver)s' % stats_key,
491 stage_time)
beepscb6f1e22013-06-28 19:14:10 -0700492
Scott Zawalskieadbf702013-03-14 09:23:06 -0400493
Dan Shicf4d2032015-03-12 15:04:21 -0700494 def stage_server_side_package(self, image=None):
495 """Stage autotest server-side package on devserver.
496
497 @param image: Full path of an OS image to install or a build name.
498
499 @return: A url to the autotest server-side package.
500 """
501 if image:
502 image_name = tools.get_build_from_image(image)
503 if not image_name:
504 raise error.AutoservError(
505 'Failed to parse build name from %s' % image)
506 ds = dev_server.ImageServer.resolve(image_name)
507 else:
508 job_repo_url = self.lookup_job_repo_url()
509 if job_repo_url:
510 devserver_url, image_name = (
511 tools.get_devserver_build_from_package_url(job_repo_url))
512 ds = dev_server.ImageServer(devserver_url)
513 else:
514 labels = self._AFE.get_labels(
515 name__startswith=ds_constants.VERSION_PREFIX,
516 host__hostname=self.hostname)
517 if not labels:
518 raise error.AutoservError(
519 'Failed to stage server-side package. The host has '
520 'no job_report_url attribute or version label.')
521 image_name = labels[0].name[len(ds_constants.VERSION_PREFIX):]
522 ds = dev_server.ImageServer.resolve(image_name)
Dan Shica503482015-03-30 17:23:25 -0700523
524 # Get the OS version of the build, for any build older than
525 # MIN_VERSION_SUPPORT_SSP, server side packaging is not supported.
526 match = re.match('.*/R\d+-(\d+)\.', image_name)
527 if match and int(match.group(1)) < self.MIN_VERSION_SUPPORT_SSP:
528 logging.warn('Build %s is older than %s. Server side packaging is '
529 'disabled.', image_name, self.MIN_VERSION_SUPPORT_SSP)
530 return None
531
Dan Shicf4d2032015-03-12 15:04:21 -0700532 ds.stage_artifacts(image_name, ['autotest_server_package'])
533 return '%s/static/%s/%s' % (ds.url(), image_name,
534 'autotest_server_package.tar.bz2')
535
536
Dan Shi0f466e82013-02-22 15:44:58 -0800537 def _try_stateful_update(self, update_url, force_update, updater):
538 """Try to use stateful update to initialize DUT.
539
540 When DUT is already running the same version that machine_install
541 tries to install, stateful update is a much faster way to clean up
542 the DUT for testing, compared to a full reimage. It is implemeted
543 by calling autoupdater.run_update, but skipping updating root, as
544 updating the kernel is time consuming and not necessary.
545
546 @param update_url: url of the image.
547 @param force_update: Set to True to update the image even if the DUT
548 is running the same version.
549 @param updater: ChromiumOSUpdater instance used to update the DUT.
550 @returns: True if the DUT was updated with stateful update.
551
552 """
J. Richard Barnette3f731032014-04-07 17:42:59 -0700553 # TODO(jrbarnette): Yes, I hate this re.match() test case.
554 # It's better than the alternative: see crbug.com/360944.
555 image_name = autoupdater.url_to_image_name(update_url)
556 release_pattern = r'^.*-release/R[0-9]+-[0-9]+\.[0-9]+\.0$'
557 if not re.match(release_pattern, image_name):
558 return False
Dan Shi0f466e82013-02-22 15:44:58 -0800559 if not updater.check_version():
560 return False
561 if not force_update:
562 logging.info('Canceling stateful update because the new and '
563 'old versions are the same.')
564 return False
565 # Following folders should be rebuilt after stateful update.
566 # A test file is used to confirm each folder gets rebuilt after
567 # the stateful update.
568 folders_to_check = ['/var', '/home', '/mnt/stateful_partition']
569 test_file = '.test_file_to_be_deleted'
570 for folder in folders_to_check:
571 touch_path = os.path.join(folder, test_file)
572 self.run('touch %s' % touch_path)
573
Chris Sosae92399e2015-04-24 11:32:59 -0700574 updater.run_update(update_root=False)
Dan Shi0f466e82013-02-22 15:44:58 -0800575
576 # Reboot to complete stateful update.
Chris Sosab76e0ee2013-05-22 16:55:41 -0700577 self.reboot(timeout=self.REBOOT_TIMEOUT, wait=True)
Dan Shi0f466e82013-02-22 15:44:58 -0800578 check_file_cmd = 'test -f %s; echo $?'
579 for folder in folders_to_check:
580 test_file_path = os.path.join(folder, test_file)
581 result = self.run(check_file_cmd % test_file_path,
582 ignore_status=True)
583 if result.exit_status == 1:
584 return False
585 return True
586
587
J. Richard Barnette7275b612013-06-04 18:13:11 -0700588 def _post_update_processing(self, updater, expected_kernel=None):
Dan Shi0f466e82013-02-22 15:44:58 -0800589 """After the DUT is updated, confirm machine_install succeeded.
590
591 @param updater: ChromiumOSUpdater instance used to update the DUT.
J. Richard Barnette7275b612013-06-04 18:13:11 -0700592 @param expected_kernel: kernel expected to be active after reboot,
593 or `None` to skip rollback checking.
Dan Shi0f466e82013-02-22 15:44:58 -0800594
595 """
J. Richard Barnette7275b612013-06-04 18:13:11 -0700596 # Touch the lab machine file to leave a marker that
597 # distinguishes this image from other test images.
598 # Afterwards, we must re-run the autoreboot script because
599 # it depends on the _LAB_MACHINE_FILE.
Dan Shi0f466e82013-02-22 15:44:58 -0800600 self.run('touch %s' % self._LAB_MACHINE_FILE)
Dan Shi0f466e82013-02-22 15:44:58 -0800601 self.run('start autoreboot')
Chris Sosa65425082013-10-16 13:26:22 -0700602 updater.verify_boot_expectations(
603 expected_kernel, rollback_message=
604 'Build %s failed to boot on %s; system rolled back to previous'
605 'build' % (updater.update_version, self.hostname))
J. Richard Barnette7275b612013-06-04 18:13:11 -0700606 # Check that we've got the build we meant to install.
607 if not updater.check_version_to_confirm_install():
608 raise autoupdater.ChromiumOSError(
609 'Failed to update %s to build %s; found build '
610 '%s instead' % (self.hostname,
Chris Sosa65425082013-10-16 13:26:22 -0700611 updater.update_version,
Dan Shi0942b1d2015-03-31 11:07:00 -0700612 self.get_release_version()))
Dan Shi0f466e82013-02-22 15:44:58 -0800613
Chris Sosae92399e2015-04-24 11:32:59 -0700614 logging.debug('Cleaning up old autotest directories.')
615 try:
616 installed_autodir = autotest.Autotest.get_installed_autodir(self)
617 self.run('rm -rf ' + installed_autodir)
618 except autotest.AutodirNotFoundError:
619 logging.debug('No autotest installed directory found.')
620
Dan Shi0f466e82013-02-22 15:44:58 -0800621
J. Richard Barnettee4af8b92013-05-01 13:16:12 -0700622 def _stage_image_for_update(self, image_name=None):
Chris Sosae92399e2015-04-24 11:32:59 -0700623 """Stage a build on a devserver and return the update_url and devserver.
Scott Zawalskieadbf702013-03-14 09:23:06 -0400624
625 @param image_name: a name like lumpy-release/R27-3837.0.0
Chris Sosae92399e2015-04-24 11:32:59 -0700626 @returns a tuple with an update URL like:
Scott Zawalskieadbf702013-03-14 09:23:06 -0400627 http://172.22.50.205:8082/update/lumpy-release/R27-3837.0.0
Chris Sosae92399e2015-04-24 11:32:59 -0700628 and the devserver instance.
Scott Zawalskieadbf702013-03-14 09:23:06 -0400629 """
J. Richard Barnettee4af8b92013-05-01 13:16:12 -0700630 if not image_name:
631 image_name = self.get_repair_image_name()
Chris Sosae92399e2015-04-24 11:32:59 -0700632
J. Richard Barnettee4af8b92013-05-01 13:16:12 -0700633 logging.info('Staging build for AU: %s', image_name)
Scott Zawalskieadbf702013-03-14 09:23:06 -0400634 devserver = dev_server.ImageServer.resolve(image_name)
635 devserver.trigger_download(image_name, synchronous=False)
Chris Sosae92399e2015-04-24 11:32:59 -0700636 return (tools.image_url_pattern() % (devserver.url(), image_name),
637 devserver)
Scott Zawalskieadbf702013-03-14 09:23:06 -0400638
639
J. Richard Barnettee4af8b92013-05-01 13:16:12 -0700640 def stage_image_for_servo(self, image_name=None):
641 """Stage a build on a devserver and return the update_url.
642
643 @param image_name: a name like lumpy-release/R27-3837.0.0
644 @returns an update URL like:
645 http://172.22.50.205:8082/update/lumpy-release/R27-3837.0.0
646 """
647 if not image_name:
648 image_name = self.get_repair_image_name()
649 logging.info('Staging build for servo install: %s', image_name)
650 devserver = dev_server.ImageServer.resolve(image_name)
651 devserver.stage_artifacts(image_name, ['test_image'])
652 return devserver.get_test_image_url(image_name)
653
654
beepse539be02013-07-31 21:57:39 -0700655 def stage_factory_image_for_servo(self, image_name):
656 """Stage a build on a devserver and return the update_url.
657
658 @param image_name: a name like <baord>/4262.204.0
beeps12c0a3c2013-09-03 11:58:27 -0700659
beepse539be02013-07-31 21:57:39 -0700660 @return: An update URL, eg:
661 http://<devserver>/static/canary-channel/\
662 <board>/4262.204.0/factory_test/chromiumos_factory_image.bin
beeps12c0a3c2013-09-03 11:58:27 -0700663
664 @raises: ValueError if the factory artifact name is missing from
665 the config.
666
beepse539be02013-07-31 21:57:39 -0700667 """
668 if not image_name:
669 logging.error('Need an image_name to stage a factory image.')
670 return
671
Dan Shib8540a52015-07-16 14:18:23 -0700672 factory_artifact = CONFIG.get_config_value(
beeps12c0a3c2013-09-03 11:58:27 -0700673 'CROS', 'factory_artifact', type=str, default='')
674 if not factory_artifact:
675 raise ValueError('Cannot retrieve the factory artifact name from '
676 'autotest config, and hence cannot stage factory '
677 'artifacts.')
678
beepse539be02013-07-31 21:57:39 -0700679 logging.info('Staging build for servo install: %s', image_name)
680 devserver = dev_server.ImageServer.resolve(image_name)
681 devserver.stage_artifacts(
682 image_name,
beeps12c0a3c2013-09-03 11:58:27 -0700683 [factory_artifact],
684 archive_url=None)
beepse539be02013-07-31 21:57:39 -0700685
686 return tools.factory_image_url_pattern() % (devserver.url(), image_name)
687
688
Chris Sosaa3ac2152012-05-23 22:23:13 -0700689 def machine_install(self, update_url=None, force_update=False,
Richard Barnette0b023a72015-04-24 16:07:30 +0000690 local_devserver=False, repair=False,
691 force_full_update=False):
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500692 """Install the DUT.
693
Dan Shi0f466e82013-02-22 15:44:58 -0800694 Use stateful update if the DUT is already running the same build.
695 Stateful update does not update kernel and tends to run much faster
696 than a full reimage. If the DUT is running a different build, or it
697 failed to do a stateful update, full update, including kernel update,
698 will be applied to the DUT.
699
Scott Zawalskieadbf702013-03-14 09:23:06 -0400700 Once a host enters machine_install its cros_version label will be
701 removed as well as its host attribute job_repo_url (used for
702 package install).
703
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500704 @param update_url: The url to use for the update
705 pattern: http://$devserver:###/update/$build
706 If update_url is None and repair is True we will install the
Dan Shi6964fa52014-12-18 11:04:27 -0800707 stable image listed in afe_stable_versions table. If the table
708 is not setup, global_config value under CROS.stable_cros_version
709 will be used instead.
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500710 @param force_update: Force an update even if the version installed
711 is the same. Default:False
Christopher Wiley6a4ff932015-05-15 14:00:47 -0700712 @param local_devserver: Used by test_that to allow people to
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500713 use their local devserver. Default: False
Chris Sosae92399e2015-04-24 11:32:59 -0700714 @param repair: Forces update to repair image. Implies force_update.
Fang Deng3d3b9272014-12-22 12:20:28 -0800715 @param force_full_update: If True, do not attempt to run stateful
716 update, force a full reimage. If False, try stateful update
717 first when the dut is already installed with the same version.
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500718 @raises autoupdater.ChromiumOSError
719
720 """
Chris Sosae92399e2015-04-24 11:32:59 -0700721 devserver = None
Richard Barnette0b023a72015-04-24 16:07:30 +0000722 if repair:
Chris Sosae92399e2015-04-24 11:32:59 -0700723 update_url, devserver = self._stage_image_for_update()
Richard Barnette0b023a72015-04-24 16:07:30 +0000724 force_update = True
Dan Shi0f466e82013-02-22 15:44:58 -0800725
Chris Sosae92399e2015-04-24 11:32:59 -0700726 if not update_url and not self._parser.options.image:
727 raise error.AutoservError(
728 'There is no update URL, nor a method to get one.')
729
730 if not update_url and self._parser.options.image:
731 # This is the base case where we have no given update URL i.e.
732 # dynamic suites logic etc. This is the most flexible case where we
733 # can serve an update from any of our fleet of devservers.
734 requested_build = self._parser.options.image
735 if not requested_build.startswith('http://'):
736 logging.debug('Update will be staged for this installation')
737 update_url, devserver = self._stage_image_for_update(
738 requested_build)
739 else:
740 update_url = requested_build
741
742 logging.debug('Update URL is %s', update_url)
743
Scott Zawalskieadbf702013-03-14 09:23:06 -0400744 # Remove cros-version and job_repo_url host attribute from host.
745 self.clear_cros_version_labels_and_job_repo_url()
Chris Sosae92399e2015-04-24 11:32:59 -0700746
747 update_complete = False
748 updater = autoupdater.ChromiumOSUpdater(
749 update_url, host=self, local_devserver=local_devserver)
Fang Deng3d3b9272014-12-22 12:20:28 -0800750 if not force_full_update:
751 try:
Chris Sosae92399e2015-04-24 11:32:59 -0700752 # If the DUT is already running the same build, try stateful
753 # update first as it's much quicker than a full re-image.
754 update_complete = self._try_stateful_update(
755 update_url, force_update, updater)
Fang Deng3d3b9272014-12-22 12:20:28 -0800756 except Exception as e:
757 logging.exception(e)
J. Richard Barnette45e93de2012-04-11 17:24:15 -0700758
Dan Shi0f466e82013-02-22 15:44:58 -0800759 inactive_kernel = None
Chris Sosae92399e2015-04-24 11:32:59 -0700760 if update_complete or (not force_update and updater.check_version()):
761 logging.info('Install complete without full update')
762 else:
763 logging.info('DUT requires full update.')
764 self.reboot(timeout=self.REBOOT_TIMEOUT, wait=True)
765 num_of_attempts = provision.FLAKY_DEVSERVER_ATTEMPTS
Chris Sosab7612bc2013-03-21 10:32:37 -0700766
Chris Sosae92399e2015-04-24 11:32:59 -0700767 while num_of_attempts > 0:
768 num_of_attempts -= 1
769 try:
770 updater.run_update()
771 except Exception:
772 logging.warn('Autoupdate did not complete.')
773 # Do additional check for the devserver health. Ideally,
774 # the autoupdater.py could raise an exception when it
775 # detected network flake but that would require
776 # instrumenting the update engine and parsing it log.
777 if (num_of_attempts <= 0 or
778 devserver is None or
779 dev_server.DevServer.devserver_healthy(
780 devserver.url())):
781 raise
J. Richard Barnette45e93de2012-04-11 17:24:15 -0700782
Chris Sosae92399e2015-04-24 11:32:59 -0700783 logging.warn('Devserver looks unhealthy. Trying another')
784 update_url, devserver = self._stage_image_for_update(
785 requested_build)
786 logging.debug('New Update URL is %s', update_url)
787 updater = autoupdater.ChromiumOSUpdater(
788 update_url, host=self,
789 local_devserver=local_devserver)
790 else:
791 break
J. Richard Barnette45e93de2012-04-11 17:24:15 -0700792
Chris Sosae92399e2015-04-24 11:32:59 -0700793 # Give it some time in case of IO issues.
794 time.sleep(10)
Dan Shi5699ac22014-12-19 10:55:49 -0800795
Chris Sosae92399e2015-04-24 11:32:59 -0700796 # Figure out active and inactive kernel.
797 active_kernel, inactive_kernel = updater.get_kernel_state()
Simran Basi13fa1ba2013-03-04 10:56:47 -0800798
Chris Sosae92399e2015-04-24 11:32:59 -0700799 # Ensure inactive kernel has higher priority than active.
800 if (updater.get_kernel_priority(inactive_kernel)
801 < updater.get_kernel_priority(active_kernel)):
802 raise autoupdater.ChromiumOSError(
803 'Update failed. The priority of the inactive kernel'
804 ' partition is less than that of the active kernel'
805 ' partition.')
806
807 # Updater has returned successfully; reboot the host.
808 self.reboot(timeout=self.REBOOT_TIMEOUT, wait=True)
809
810 self._post_update_processing(updater, inactive_kernel)
811 self.add_cros_version_labels_and_job_repo_url(
812 autoupdater.url_to_image_name(update_url))
J. Richard Barnette45e93de2012-04-11 17:24:15 -0700813
814
Dan Shi9cb0eec2014-06-03 09:04:50 -0700815 def _clear_fw_version_labels(self):
816 """Clear firmware version labels from the machine."""
817 labels = self._AFE.get_labels(
Dan Shi0723bf52015-06-24 10:52:38 -0700818 name__startswith=provision.FW_RW_VERSION_PREFIX,
Dan Shi9cb0eec2014-06-03 09:04:50 -0700819 host__hostname=self.hostname)
820 for label in labels:
821 label.remove_hosts(hosts=[self.hostname])
822
823
824 def _add_fw_version_label(self, build):
825 """Add firmware version label to the machine.
826
827 @param build: Build of firmware.
828
829 """
830 fw_label = provision.fw_version_to_label(build)
MK Ryu73be9862015-07-06 12:25:00 -0700831 self._AFE.run('label_add_hosts', id=fw_label, hosts=[self.hostname])
Dan Shi9cb0eec2014-06-03 09:04:50 -0700832
833
834 def firmware_install(self, build=None):
835 """Install firmware to the DUT.
836
837 Use stateful update if the DUT is already running the same build.
838 Stateful update does not update kernel and tends to run much faster
839 than a full reimage. If the DUT is running a different build, or it
840 failed to do a stateful update, full update, including kernel update,
841 will be applied to the DUT.
842
843 Once a host enters firmware_install its fw_version label will be
844 removed. After the firmware is updated successfully, a new fw_version
845 label will be added to the host.
846
847 @param build: The build version to which we want to provision the
848 firmware of the machine,
849 e.g. 'link-firmware/R22-2695.1.144'.
850
851 TODO(dshi): After bug 381718 is fixed, update here with corresponding
852 exceptions that could be raised.
853
854 """
855 if not self.servo:
856 raise error.TestError('Host %s does not have servo.' %
857 self.hostname)
858
859 # TODO(fdeng): use host.get_board() after
860 # crbug.com/271834 is fixed.
861 board = self._get_board_from_afe()
862
Chris Sosae92399e2015-04-24 11:32:59 -0700863 # If build is not set, try to install firmware from stable CrOS.
Dan Shi9cb0eec2014-06-03 09:04:50 -0700864 if not build:
865 build = self.get_repair_image_name()
866
867 config = FAFTConfig(board)
868 if config.use_u_boot:
869 ap_image = 'image-%s.bin' % board
870 else: # Depthcharge platform
871 ap_image = 'image.bin'
872 ec_image = 'ec.bin'
873 ds = dev_server.ImageServer.resolve(build)
874 ds.stage_artifacts(build, ['firmware'])
875
876 tmpd = autotemp.tempdir(unique_id='fwimage')
877 try:
878 fwurl = self._FW_IMAGE_URL_PATTERN % (ds.url(), build)
879 local_tarball = os.path.join(tmpd.name, os.path.basename(fwurl))
880 server_utils.system('wget -O %s %s' % (local_tarball, fwurl),
881 timeout=60)
882 server_utils.system('tar xf %s -C %s %s %s' %
883 (local_tarball, tmpd.name, ap_image, ec_image),
884 timeout=60)
885 server_utils.system('tar xf %s --wildcards -C %s "dts/*"' %
886 (local_tarball, tmpd.name),
887 timeout=60, ignore_status=True)
888
889 self._clear_fw_version_labels()
890 logging.info('Will re-program EC now')
891 self.servo.program_ec(os.path.join(tmpd.name, ec_image))
892 logging.info('Will re-program BIOS now')
893 self.servo.program_bios(os.path.join(tmpd.name, ap_image))
894 self.servo.get_power_state_controller().reset()
895 time.sleep(self.servo.BOOT_DELAY)
Dan Shia5fef052015-05-18 23:28:47 -0700896 self._add_fw_version_label(build)
Dan Shi9cb0eec2014-06-03 09:04:50 -0700897 finally:
898 tmpd.clean()
899
900
Dan Shi10e992b2013-08-30 11:02:59 -0700901 def show_update_engine_log(self):
902 """Output update engine log."""
MK Ryu35d661e2014-09-25 17:44:10 -0700903 logging.debug('Dumping %s', client_constants.UPDATE_ENGINE_LOG)
904 self.run('cat %s' % client_constants.UPDATE_ENGINE_LOG)
Dan Shi10e992b2013-08-30 11:02:59 -0700905
906
Richard Barnette82c35912012-11-20 10:09:10 -0800907 def _get_board_from_afe(self):
908 """Retrieve this host's board from its labels in the AFE.
909
910 Looks for a host label of the form "board:<board>", and
911 returns the "<board>" part of the label. `None` is returned
912 if there is not a single, unique label matching the pattern.
913
914 @returns board from label, or `None`.
915 """
Dan Shia1ecd5c2013-06-06 11:21:31 -0700916 return server_utils.get_board_from_afe(self.hostname, self._AFE)
Simran Basi833814b2013-01-29 13:13:43 -0800917
918
919 def get_build(self):
920 """Retrieve the current build for this Host from the AFE.
921
922 Looks through this host's labels in the AFE to determine its build.
923
924 @returns The current build or None if it could not find it or if there
925 were multiple build labels assigned to this host.
926 """
Dan Shia1ecd5c2013-06-06 11:21:31 -0700927 return server_utils.get_build_from_afe(self.hostname, self._AFE)
Richard Barnette82c35912012-11-20 10:09:10 -0800928
929
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500930 def _install_repair(self):
Chris Sosae92399e2015-04-24 11:32:59 -0700931 """Attempt to repair this host using the update-engine.
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500932
933 If the host is up, try installing the DUT with a stable
Dan Shi6964fa52014-12-18 11:04:27 -0800934 "repair" version of Chrome OS as defined in afe_stable_versions table.
935 If the table is not setup, global_config value under
936 CROS.stable_cros_version will be used instead.
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500937
Scott Zawalski62bacae2013-03-05 10:40:32 -0500938 @raises AutoservRepairMethodNA if the DUT is not reachable.
939 @raises ChromiumOSError if the install failed for some reason.
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500940
941 """
942 if not self.is_up():
Scott Zawalski62bacae2013-03-05 10:40:32 -0500943 raise error.AutoservRepairMethodNA('DUT unreachable for install.')
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500944 logging.info('Attempting to reimage machine to repair image.')
945 try:
Richard Barnette0b023a72015-04-24 16:07:30 +0000946 self.machine_install(repair=True)
Fang Dengd0672f32013-03-18 17:18:09 -0700947 except autoupdater.ChromiumOSError as e:
948 logging.exception(e)
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500949 logging.info('Repair via install failed.')
Scott Zawalski62bacae2013-03-05 10:40:32 -0500950 raise
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500951
952
Dan Shi2c88eed2013-11-12 10:18:38 -0800953 def _install_repair_with_powerwash(self):
Dan Shi9cc48452013-11-12 12:39:26 -0800954 """Attempt to powerwash first then repair this host using update-engine.
Dan Shi2c88eed2013-11-12 10:18:38 -0800955
Dan Shi9cc48452013-11-12 12:39:26 -0800956 update-engine may fail due to a bad image. In such case, powerwash
957 may help to cleanup the DUT for update-engine to work again.
Dan Shi2c88eed2013-11-12 10:18:38 -0800958
959 @raises AutoservRepairMethodNA if the DUT is not reachable.
960 @raises ChromiumOSError if the install failed for some reason.
961
962 """
963 if not self.is_up():
964 raise error.AutoservRepairMethodNA('DUT unreachable for install.')
965
966 logging.info('Attempting to powerwash the DUT.')
967 self.run('echo "fast safe" > '
968 '/mnt/stateful_partition/factory_install_reset')
969 self.reboot(timeout=self.POWERWASH_BOOT_TIMEOUT, wait=True)
970 if not self.is_up():
Dan Shi9cc48452013-11-12 12:39:26 -0800971 logging.error('Powerwash failed. DUT did not come back after '
Dan Shi2c88eed2013-11-12 10:18:38 -0800972 'reboot.')
973 raise error.AutoservRepairFailure(
974 'DUT failed to boot from powerwash after %d seconds' %
975 self.POWERWASH_BOOT_TIMEOUT)
976
977 logging.info('Powerwash succeeded.')
978 self._install_repair()
979
980
beepsf079cfb2013-09-18 17:49:51 -0700981 def servo_install(self, image_url=None, usb_boot_timeout=USB_BOOT_TIMEOUT,
982 install_timeout=INSTALL_TIMEOUT):
Scott Zawalski62bacae2013-03-05 10:40:32 -0500983 """
984 Re-install the OS on the DUT by:
985 1) installing a test image on a USB storage device attached to the Servo
986 board,
Richard Barnette03a0c132012-11-05 12:40:35 -0800987 2) booting that image in recovery mode, and then
J. Richard Barnette31b2e312013-04-04 16:05:22 -0700988 3) installing the image with chromeos-install.
989
Scott Zawalski62bacae2013-03-05 10:40:32 -0500990 @param image_url: If specified use as the url to install on the DUT.
991 otherwise boot the currently staged image on the USB stick.
beepsf079cfb2013-09-18 17:49:51 -0700992 @param usb_boot_timeout: The usb_boot_timeout to use during reimage.
993 Factory images need a longer usb_boot_timeout than regular
994 cros images.
995 @param install_timeout: The timeout to use when installing the chromeos
996 image. Factory images need a longer install_timeout.
Richard Barnette03a0c132012-11-05 12:40:35 -0800997
Scott Zawalski62bacae2013-03-05 10:40:32 -0500998 @raises AutoservError if the image fails to boot.
beepsf079cfb2013-09-18 17:49:51 -0700999
J. Richard Barnette0199cc82014-12-05 17:08:40 -08001000 """
beepsf079cfb2013-09-18 17:49:51 -07001001 usb_boot_timer_key = ('servo_install.usb_boot_timeout_%s'
1002 % usb_boot_timeout)
1003 logging.info('Downloading image to USB, then booting from it. Usb boot '
1004 'timeout = %s', usb_boot_timeout)
Gabe Black1e1c41b2015-02-04 23:55:15 -08001005 timer = autotest_stats.Timer(usb_boot_timer_key)
beepsf079cfb2013-09-18 17:49:51 -07001006 timer.start()
J. Richard Barnette31b2e312013-04-04 16:05:22 -07001007 self.servo.install_recovery_image(image_url)
beepsf079cfb2013-09-18 17:49:51 -07001008 if not self.wait_up(timeout=usb_boot_timeout):
Scott Zawalski62bacae2013-03-05 10:40:32 -05001009 raise error.AutoservRepairFailure(
1010 'DUT failed to boot from USB after %d seconds' %
beepsf079cfb2013-09-18 17:49:51 -07001011 usb_boot_timeout)
1012 timer.stop()
Scott Zawalski62bacae2013-03-05 10:40:32 -05001013
Tom Wai-Hong Tamf6b4f812015-08-08 04:14:59 +08001014 # The new chromeos-tpm-recovery has been merged since R44-7073.0.0.
1015 # In old CrOS images, this command fails. Skip the error.
Tom Wai-Hong Tam27af7332015-07-25 06:09:39 +08001016 logging.info('Resetting the TPM status')
Tom Wai-Hong Tamf6b4f812015-08-08 04:14:59 +08001017 try:
1018 self.run('chromeos-tpm-recovery')
1019 except error.AutoservRunError:
1020 logging.warn('chromeos-tpm-recovery is too old.')
1021
Tom Wai-Hong Tam27af7332015-07-25 06:09:39 +08001022
beepsf079cfb2013-09-18 17:49:51 -07001023 install_timer_key = ('servo_install.install_timeout_%s'
1024 % install_timeout)
Gabe Black1e1c41b2015-02-04 23:55:15 -08001025 timer = autotest_stats.Timer(install_timer_key)
beepsf079cfb2013-09-18 17:49:51 -07001026 timer.start()
1027 logging.info('Installing image through chromeos-install.')
J. Richard Barnette2522a8f2015-03-04 15:59:15 -08001028 self.run('chromeos-install --yes',
MK Ryu35d661e2014-09-25 17:44:10 -07001029 timeout=install_timeout)
J. Richard Barnette709024c2015-08-20 12:06:54 -07001030 self.run('( sleep 1 ; halt ) </dev/null >/dev/null 2>&1 &')
beepsf079cfb2013-09-18 17:49:51 -07001031 timer.stop()
1032
1033 logging.info('Power cycling DUT through servo.')
J. Richard Barnette0199cc82014-12-05 17:08:40 -08001034 self.servo.get_power_state_controller().power_off()
Fang Dengafb88142013-05-30 17:44:31 -07001035 self.servo.switch_usbkey('off')
J. Richard Barnette0199cc82014-12-05 17:08:40 -08001036 # N.B. The Servo API requires that we use power_on() here
1037 # for two reasons:
1038 # 1) After turning on a DUT in recovery mode, you must turn
1039 # it off and then on with power_on() once more to
1040 # disable recovery mode (this is a Parrot specific
1041 # requirement).
1042 # 2) After power_off(), the only way to turn on is with
1043 # power_on() (this is a Storm specific requirement).
J. Richard Barnettefbcc7122013-07-24 18:24:59 -07001044 self.servo.get_power_state_controller().power_on()
beepsf079cfb2013-09-18 17:49:51 -07001045
1046 logging.info('Waiting for DUT to come back up.')
Richard Barnette03a0c132012-11-05 12:40:35 -08001047 if not self.wait_up(timeout=self.BOOT_TIMEOUT):
1048 raise error.AutoservError('DUT failed to reboot installed '
1049 'test image after %d seconds' %
Scott Zawalski62bacae2013-03-05 10:40:32 -05001050 self.BOOT_TIMEOUT)
1051
1052
Dan Shic1b8bdd2015-09-14 23:11:24 -07001053 def _setup_servo(self):
1054 """Try to force to create servo object if it's not set up yet.
1055 """
1056 if self.servo:
1057 return
1058
1059 try:
1060 # Setting servo_args to {} will force it to create the servo_host
1061 # object if possible.
1062 self._servo_host = servo_host.create_servo_host(
1063 dut=self.hostname, servo_args={})
1064 if self._servo_host:
1065 self.servo = self._servo_host.get_servo()
1066 else:
1067 logging.error('Failed to create servo_host object.')
1068 except Exception as e:
1069 logging.error('Failed to create servo object: %s', e)
1070
1071
J. Richard Barnettee4af8b92013-05-01 13:16:12 -07001072 def _servo_repair_reinstall(self):
Scott Zawalski62bacae2013-03-05 10:40:32 -05001073 """Reinstall the DUT utilizing servo and a test image.
1074
1075 Re-install the OS on the DUT by:
1076 1) installing a test image on a USB storage device attached to the Servo
1077 board,
Tom Wai-Hong Tam27af7332015-07-25 06:09:39 +08001078 2) booting that image in recovery mode,
1079 3) resetting the TPM status, and then
1080 4) installing the image with chromeos-install.
Scott Zawalski62bacae2013-03-05 10:40:32 -05001081
Scott Zawalski62bacae2013-03-05 10:40:32 -05001082 @raises AutoservRepairMethodNA if the device does not have servo
1083 support.
1084
1085 """
Dan Shic1b8bdd2015-09-14 23:11:24 -07001086 # To repair a DUT connected to a moblab, try to create a servo object if
1087 # it was failed to be created earlier as there may be a servo_host host
1088 # attribute for this host.
1089 if utils.is_moblab():
1090 self._setup_servo()
1091
Scott Zawalski62bacae2013-03-05 10:40:32 -05001092 if not self.servo:
1093 raise error.AutoservRepairMethodNA('Repair Reinstall NA: '
1094 'DUT has no servo support.')
1095
1096 logging.info('Attempting to recovery servo enabled device with '
1097 'servo_repair_reinstall')
1098
J. Richard Barnettee4af8b92013-05-01 13:16:12 -07001099 image_url = self.stage_image_for_servo()
Scott Zawalski62bacae2013-03-05 10:40:32 -05001100 self.servo_install(image_url)
1101
1102
1103 def _servo_repair_power(self):
1104 """Attempt to repair DUT using an attached Servo.
1105
1106 Attempt to power on the DUT via power_long_press.
1107
1108 @raises AutoservRepairMethodNA if the device does not have servo
1109 support.
1110 @raises AutoservRepairFailure if the repair fails for any reason.
1111 """
1112 if not self.servo:
1113 raise error.AutoservRepairMethodNA('Repair Power NA: '
1114 'DUT has no servo support.')
1115
1116 logging.info('Attempting to recover servo enabled device by '
1117 'powering it off and on.')
1118 self.servo.get_power_state_controller().power_off()
1119 self.servo.get_power_state_controller().power_on()
1120 if self.wait_up(self.BOOT_TIMEOUT):
1121 return
1122
1123 raise error.AutoservRepairFailure('DUT did not boot after long_press.')
Richard Barnette03a0c132012-11-05 12:40:35 -08001124
1125
Richard Barnette82c35912012-11-20 10:09:10 -08001126 def _powercycle_to_repair(self):
1127 """Utilize the RPM Infrastructure to bring the host back up.
1128
1129 If the host is not up/repaired after the first powercycle we utilize
1130 auto fallback to the last good install by powercycling and rebooting the
1131 host 6 times.
Scott Zawalski62bacae2013-03-05 10:40:32 -05001132
1133 @raises AutoservRepairMethodNA if the device does not support remote
1134 power.
1135 @raises AutoservRepairFailure if the repair fails for any reason.
1136
Richard Barnette82c35912012-11-20 10:09:10 -08001137 """
Scott Zawalski62bacae2013-03-05 10:40:32 -05001138 if not self.has_power():
1139 raise error.AutoservRepairMethodNA('Device does not support power.')
1140
Richard Barnette82c35912012-11-20 10:09:10 -08001141 logging.info('Attempting repair via RPM powercycle.')
1142 failed_cycles = 0
1143 self.power_cycle()
1144 while not self.wait_up(timeout=self.BOOT_TIMEOUT):
1145 failed_cycles += 1
1146 if failed_cycles >= self._MAX_POWER_CYCLE_ATTEMPTS:
Scott Zawalski62bacae2013-03-05 10:40:32 -05001147 raise error.AutoservRepairFailure(
1148 'Powercycled host %s %d times; device did not come back'
1149 ' online.' % (self.hostname, failed_cycles))
Richard Barnette82c35912012-11-20 10:09:10 -08001150 self.power_cycle()
1151 if failed_cycles == 0:
1152 logging.info('Powercycling was successful first time.')
1153 else:
1154 logging.info('Powercycling was successful after %d failures.',
1155 failed_cycles)
1156
1157
MK Ryu35d661e2014-09-25 17:44:10 -07001158 def _reboot_repair(self):
1159 """SSH to this host and reboot."""
1160 if not self.is_up(self._CHECK_HOST_UP_TIMEOUT_SECS):
1161 raise error.AutoservRepairMethodNA('DUT unreachable for reboot.')
1162 logging.info('Attempting repair via SSH reboot.')
1163 self.reboot(timeout=self.BOOT_TIMEOUT, wait=True)
1164
1165
Prashanth B4d8184f2014-05-05 12:22:02 -07001166 def check_device(self):
1167 """Check if a device is ssh-able, and if so, clean and verify it.
1168
1169 @raise AutoservSSHTimeout: If the ssh ping times out.
1170 @raise AutoservSshPermissionDeniedError: If ssh ping fails due to
1171 permissions.
1172 @raise AutoservSshPingHostError: For other AutoservRunErrors during
1173 ssh_ping.
1174 @raises AutoservError: As appropriate, during cleanup and verify.
1175 """
1176 self.ssh_ping()
1177 self.cleanup()
1178 self.verify()
1179
1180
Dan Shi90466352015-09-22 15:01:05 -07001181 def confirm_servo(self):
1182 """Confirm servo is initialized and verified.
1183
1184 @raise AutoservError: If servo is not initialized and verified.
1185 """
1186 if self._servo_host.required_by_test and self.servo:
1187 return
1188
1189 # Force to re-create the servo object to make sure servo is verified.
1190 logging.debug('Rebuilding the servo object.')
1191 self.servo = None
1192 self._servo_host = None
1193 self._setup_servo()
1194 if not self.servo:
1195 raise error.AutoservError('Failed to create servo object.')
1196
1197
Richard Barnette82c35912012-11-20 10:09:10 -08001198 def repair_full(self):
1199 """Repair a host for repair level NO_PROTECTION.
1200
1201 This overrides the base class function for repair; it does
1202 not call back to the parent class, but instead offers a
1203 simplified implementation based on the capabilities in the
1204 Chrome OS test lab.
1205
Fang Deng5d518f42013-08-02 14:04:32 -07001206 It first verifies and repairs servo if it is a DUT in CrOS
Fang Deng03590af2013-10-07 17:34:20 -07001207 lab and a servo is attached.
Fang Deng5d518f42013-08-02 14:04:32 -07001208
Jakob Juelich82b7d1c2014-09-15 16:10:57 -07001209 This escalates in order through the following procedures and verifies
1210 the status using `self.check_device()` after each of them. This is done
1211 until both the repair and the veryfing step succeed.
1212
MK Ryu35d661e2014-09-25 17:44:10 -07001213 Escalation order of repair procedures from less intrusive to
1214 more intrusive repairs:
1215 1. SSH to the DUT and reboot.
Scott Zawalski62bacae2013-03-05 10:40:32 -05001216 2. If there's a servo for the DUT, try to power the DUT off and
1217 on.
MK Ryu35d661e2014-09-25 17:44:10 -07001218 3. If the DUT can be power-cycled via RPM, try to repair
Richard Barnette82c35912012-11-20 10:09:10 -08001219 by power-cycling.
MK Ryu35d661e2014-09-25 17:44:10 -07001220 4. Try to re-install to a known stable image using
1221 auto-update.
1222 5. If there's a servo for the DUT, try to re-install via
1223 the servo.
Richard Barnette82c35912012-11-20 10:09:10 -08001224
1225 As with the parent method, the last operation performed on
Prashanth B4d8184f2014-05-05 12:22:02 -07001226 the DUT must be to call `self.check_device()`; If that call fails the
1227 exception it raises is passed back to the caller.
J. Richard Barnettefde55fc2013-03-15 17:47:01 -07001228
Scott Zawalski62bacae2013-03-05 10:40:32 -05001229 @raises AutoservRepairTotalFailure if the repair process fails to
1230 fix the DUT.
Fang Deng5d518f42013-08-02 14:04:32 -07001231 @raises ServoHostRepairTotalFailure if the repair process fails to
1232 fix the servo host if one is attached to the DUT.
1233 @raises AutoservSshPermissionDeniedError if it is unable
1234 to ssh to the servo host due to permission error.
1235
Richard Barnette82c35912012-11-20 10:09:10 -08001236 """
Jakob Juelich82b7d1c2014-09-15 16:10:57 -07001237 # Caution: Deleting shards relies on repair to always reboot the DUT.
1238
Dan Shi4d478522014-02-14 13:46:32 -08001239 if self._servo_host and not self.servo:
Fang Deng03590af2013-10-07 17:34:20 -07001240 try:
Dan Shi4d478522014-02-14 13:46:32 -08001241 self._servo_host.repair_full()
Fang Deng03590af2013-10-07 17:34:20 -07001242 except Exception as e:
Fang Deng03590af2013-10-07 17:34:20 -07001243 logging.error('Could not create a healthy servo: %s', e)
Dan Shi4d478522014-02-14 13:46:32 -08001244 self.servo = self._servo_host.get_servo()
Fang Deng5d518f42013-08-02 14:04:32 -07001245
MK Ryu35d661e2014-09-25 17:44:10 -07001246 self.try_collect_crashlogs()
1247
Scott Zawalski62bacae2013-03-05 10:40:32 -05001248 # TODO(scottz): This should use something similar to label_decorator,
1249 # but needs to be populated in order so DUTs are repaired with the
1250 # least amount of effort.
MK Ryu35d661e2014-09-25 17:44:10 -07001251 repair_funcs = [self._reboot_repair,
1252 self._servo_repair_power,
1253 self._powercycle_to_repair,
Dan Shi849a1c42014-03-05 11:10:43 -08001254 self._install_repair,
Dan Shi2c88eed2013-11-12 10:18:38 -08001255 self._install_repair_with_powerwash,
MK Ryu35d661e2014-09-25 17:44:10 -07001256 self._servo_repair_reinstall]
Scott Zawalski62bacae2013-03-05 10:40:32 -05001257 errors = []
Simran Basie6130932013-10-01 14:07:52 -07001258 board = self._get_board_from_afe()
Scott Zawalski62bacae2013-03-05 10:40:32 -05001259 for repair_func in repair_funcs:
1260 try:
1261 repair_func()
MK Ryu35d661e2014-09-25 17:44:10 -07001262 self.try_collect_crashlogs()
Prashanth B4d8184f2014-05-05 12:22:02 -07001263 self.check_device()
Gabe Black1e1c41b2015-02-04 23:55:15 -08001264 autotest_stats.Counter(
Simran Basie6130932013-10-01 14:07:52 -07001265 '%s.SUCCEEDED' % repair_func.__name__).increment()
1266 if board:
Gabe Black1e1c41b2015-02-04 23:55:15 -08001267 autotest_stats.Counter(
Dan Shib87c3aa2014-02-12 15:40:31 -08001268 '%s.%s.SUCCEEDED' % (repair_func.__name__,
Simran Basie6130932013-10-01 14:07:52 -07001269 board)).increment()
Scott Zawalski62bacae2013-03-05 10:40:32 -05001270 return
Simran Basie6130932013-10-01 14:07:52 -07001271 except error.AutoservRepairMethodNA as e:
Gabe Black1e1c41b2015-02-04 23:55:15 -08001272 autotest_stats.Counter(
Simran Basie6130932013-10-01 14:07:52 -07001273 '%s.RepairNA' % repair_func.__name__).increment()
1274 if board:
Gabe Black1e1c41b2015-02-04 23:55:15 -08001275 autotest_stats.Counter(
Dan Shib87c3aa2014-02-12 15:40:31 -08001276 '%s.%s.RepairNA' % (repair_func.__name__,
Simran Basie6130932013-10-01 14:07:52 -07001277 board)).increment()
Ilja H. Friedel04be2bd2014-05-07 21:29:59 -07001278 logging.warning('Repair function NA: %s', e)
Simran Basie6130932013-10-01 14:07:52 -07001279 errors.append(str(e))
Scott Zawalski62bacae2013-03-05 10:40:32 -05001280 except Exception as e:
Gabe Black1e1c41b2015-02-04 23:55:15 -08001281 autotest_stats.Counter(
Simran Basie6130932013-10-01 14:07:52 -07001282 '%s.FAILED' % repair_func.__name__).increment()
1283 if board:
Gabe Black1e1c41b2015-02-04 23:55:15 -08001284 autotest_stats.Counter(
Dan Shib87c3aa2014-02-12 15:40:31 -08001285 '%s.%s.FAILED' % (repair_func.__name__,
Simran Basie6130932013-10-01 14:07:52 -07001286 board)).increment()
Ilja H. Friedel04be2bd2014-05-07 21:29:59 -07001287 logging.warning('Failed to repair device: %s', e)
Scott Zawalski62bacae2013-03-05 10:40:32 -05001288 errors.append(str(e))
Scott Zawalski89c44dd2013-02-26 09:28:02 -05001289
Gabe Black1e1c41b2015-02-04 23:55:15 -08001290 autotest_stats.Counter('Full_Repair_Failed').increment()
Simran Basie6130932013-10-01 14:07:52 -07001291 if board:
Gabe Black1e1c41b2015-02-04 23:55:15 -08001292 autotest_stats.Counter(
Simran Basie6130932013-10-01 14:07:52 -07001293 'Full_Repair_Failed.%s' % board).increment()
Scott Zawalski62bacae2013-03-05 10:40:32 -05001294 raise error.AutoservRepairTotalFailure(
1295 'All attempts at repairing the device failed:\n%s' %
1296 '\n'.join(errors))
Richard Barnette82c35912012-11-20 10:09:10 -08001297
1298
MK Ryu35d661e2014-09-25 17:44:10 -07001299 def try_collect_crashlogs(self, check_host_up=True):
1300 """
1301 Check if a host is up and logs need to be collected from the host,
1302 if yes, collect them.
1303
1304 @param check_host_up: Flag for checking host is up. Default is True.
1305 """
1306 try:
1307 crash_job = self._need_crash_logs()
1308 if crash_job:
1309 logging.debug('%s: Job %s was crashed', self._CRASHLOGS_PREFIX,
1310 crash_job)
1311 if not check_host_up or self.is_up(
1312 self._CHECK_HOST_UP_TIMEOUT_SECS):
1313 self._collect_crashlogs(crash_job)
1314 logging.debug('%s: Completed collecting logs for the '
1315 'crashed job %s', self._CRASHLOGS_PREFIX,
1316 crash_job)
1317 except Exception as e:
1318 # Exception should not result in repair failure.
1319 # Therefore, suppress all exceptions here.
1320 logging.error('%s: Failed while trying to collect crash-logs: %s',
1321 self._CRASHLOGS_PREFIX, e)
1322
1323
1324 def _need_crash_logs(self):
1325 """Get the value of need_crash_logs attribute of this host.
1326
1327 @return: Value string of need_crash_logs attribute
1328 None if there is no need_crash_logs attribute
1329 """
1330 attrs = self._AFE.get_host_attribute(constants.CRASHLOGS_HOST_ATTRIBUTE,
1331 hostname=self.hostname)
1332 assert len(attrs) < 2
1333 return attrs[0].value if attrs else None
1334
1335
1336 def _collect_crashlogs(self, job_id):
1337 """Grab logs from the host where a job was crashed.
1338
1339 First, check if PRIOR_LOGS_DIR exists in the host.
1340 If yes, collect them.
1341 Otherwise, check if a lab-machine marker (_LAB_MACHINE_FILE) exists
1342 in the host.
1343 If yes, the host was repaired automatically, and we collect normal
1344 system logs.
1345
1346 @param job_id: Id of the job that was crashed.
1347 """
1348 crashlogs_dir = crashcollect.get_crashinfo_dir(self,
1349 constants.CRASHLOGS_DEST_DIR_PREFIX)
1350 flag_prior_logs = False
1351
1352 if self.path_exists(client_constants.PRIOR_LOGS_DIR):
1353 flag_prior_logs = True
1354 self._collect_prior_logs(crashlogs_dir)
1355 elif self.path_exists(self._LAB_MACHINE_FILE):
1356 self._collect_system_logs(crashlogs_dir)
1357 else:
1358 logging.warning('%s: Host was manually re-installed without '
1359 '--lab_preserve_log option. Skip collecting '
1360 'crash-logs.', self._CRASHLOGS_PREFIX)
1361
1362 # We make crash collection be one-time effort.
1363 # _collect_prior_logs() and _collect_system_logs() will not throw
1364 # any exception, and following codes will be executed even when
1365 # those methods fail.
1366 # _collect_crashlogs() is called only when the host is up (refer
1367 # to try_collect_crashlogs()). We assume _collect_prior_logs() and
1368 # _collect_system_logs() fail rarely when the host is up.
1369 # In addition, it is not clear how many times we should try crash
1370 # collection again while not triggering next repair unnecessarily.
1371 # Threfore, we try crash collection one time.
1372
1373 # Create a marker file as soon as log collection is done.
1374 # Leave the job id to this marker for gs_offloader to consume.
1375 marker_file = os.path.join(crashlogs_dir, constants.CRASHLOGS_MARKER)
1376 with open(marker_file, 'a') as f:
1377 f.write('%s\n' % job_id)
1378
1379 # Remove need_crash_logs attribute
1380 logging.debug('%s: Remove attribute need_crash_logs from host %s',
1381 self._CRASHLOGS_PREFIX, self.hostname)
1382 self._AFE.set_host_attribute(constants.CRASHLOGS_HOST_ATTRIBUTE,
1383 None, hostname=self.hostname)
1384
1385 if flag_prior_logs:
1386 logging.debug('%s: Remove %s from host %s', self._CRASHLOGS_PREFIX,
1387 client_constants.PRIOR_LOGS_DIR, self.hostname)
1388 self.run('rm -rf %s; sync' % client_constants.PRIOR_LOGS_DIR)
1389 # Wait for a few seconds to make sure the prior command is
1390 # done deep through storage.
1391 time.sleep(self._SAFE_WAIT_SECS)
1392
1393
1394 def _collect_prior_logs(self, crashlogs_dir):
1395 """Grab prior logs that were stashed before re-installing a host.
1396
1397 @param crashlogs_dir: Directory path where crash-logs are stored.
1398 """
1399 logging.debug('%s: Found %s, collecting them...',
1400 self._CRASHLOGS_PREFIX, client_constants.PRIOR_LOGS_DIR)
1401 try:
1402 self.collect_logs(client_constants.PRIOR_LOGS_DIR,
1403 crashlogs_dir, False)
1404 logging.debug('%s: %s is collected',
1405 self._CRASHLOGS_PREFIX, client_constants.PRIOR_LOGS_DIR)
1406 except Exception as e:
1407 logging.error('%s: Failed to collect %s: %s',
1408 self._CRASHLOGS_PREFIX, client_constants.PRIOR_LOGS_DIR,
1409 e)
1410
1411
1412 def _collect_system_logs(self, crashlogs_dir):
1413 """Grab normal system logs from a host.
1414
1415 @param crashlogs_dir: Directory path where crash-logs are stored.
1416 """
1417 logging.debug('%s: Found %s, collecting system logs...',
1418 self._CRASHLOGS_PREFIX, self._LAB_MACHINE_FILE)
1419 sources = server_utils.parse_simple_config(self._LOGS_TO_COLLECT_FILE)
1420 for src in sources:
1421 try:
1422 if self.path_exists(src):
1423 logging.debug('%s: Collecting %s...',
1424 self._CRASHLOGS_PREFIX, src)
1425 dest = server_utils.concat_path_except_last(
1426 crashlogs_dir, src)
1427 self.collect_logs(src, dest, False)
1428 logging.debug('%s: %s is collected',
1429 self._CRASHLOGS_PREFIX, src)
1430 except Exception as e:
1431 logging.error('%s: Failed to collect %s: %s',
1432 self._CRASHLOGS_PREFIX, src, e)
1433
1434
J. Richard Barnette1d78b012012-05-15 13:56:30 -07001435 def close(self):
beeps32a63082013-08-22 14:02:29 -07001436 self.rpc_disconnect_all()
Fang Deng0ca40e22013-08-27 17:47:44 -07001437 super(CrosHost, self).close()
J. Richard Barnette1d78b012012-05-15 13:56:30 -07001438
1439
Dan Shi49ca0932014-11-14 11:22:27 -08001440 def get_power_supply_info(self):
1441 """Get the output of power_supply_info.
1442
1443 power_supply_info outputs the info of each power supply, e.g.,
1444 Device: Line Power
1445 online: no
1446 type: Mains
1447 voltage (V): 0
1448 current (A): 0
1449 Device: Battery
1450 state: Discharging
1451 percentage: 95.9276
1452 technology: Li-ion
1453
1454 Above output shows two devices, Line Power and Battery, with details of
1455 each device listed. This function parses the output into a dictionary,
1456 with key being the device name, and value being a dictionary of details
1457 of the device info.
1458
1459 @return: The dictionary of power_supply_info, e.g.,
1460 {'Line Power': {'online': 'yes', 'type': 'main'},
1461 'Battery': {'vendor': 'xyz', 'percentage': '100'}}
Dan Shie9b765d2014-12-29 16:59:49 -08001462 @raise error.AutoservRunError if power_supply_info tool is not found in
1463 the DUT. Caller should handle this error to avoid false failure
1464 on verification.
Dan Shi49ca0932014-11-14 11:22:27 -08001465 """
1466 result = self.run('power_supply_info').stdout.strip()
1467 info = {}
1468 device_name = None
1469 device_info = {}
1470 for line in result.split('\n'):
1471 pair = [v.strip() for v in line.split(':')]
1472 if len(pair) != 2:
1473 continue
1474 if pair[0] == 'Device':
1475 if device_name:
1476 info[device_name] = device_info
1477 device_name = pair[1]
1478 device_info = {}
1479 else:
1480 device_info[pair[0]] = pair[1]
1481 if device_name and not device_name in info:
1482 info[device_name] = device_info
1483 return info
1484
1485
1486 def get_battery_percentage(self):
1487 """Get the battery percentage.
1488
1489 @return: The percentage of battery level, value range from 0-100. Return
1490 None if the battery info cannot be retrieved.
1491 """
1492 try:
1493 info = self.get_power_supply_info()
1494 logging.info(info)
1495 return float(info['Battery']['percentage'])
Dan Shie9b765d2014-12-29 16:59:49 -08001496 except (KeyError, ValueError, error.AutoservRunError):
Dan Shi49ca0932014-11-14 11:22:27 -08001497 return None
1498
1499
1500 def is_ac_connected(self):
1501 """Check if the dut has power adapter connected and charging.
1502
1503 @return: True if power adapter is connected and charging.
1504 """
1505 try:
1506 info = self.get_power_supply_info()
1507 return info['Line Power']['online'] == 'yes'
Dan Shie9b765d2014-12-29 16:59:49 -08001508 except (KeyError, error.AutoservRunError):
1509 return None
Dan Shi49ca0932014-11-14 11:22:27 -08001510
1511
Simran Basi5e6339a2013-03-21 11:34:32 -07001512 def _cleanup_poweron(self):
1513 """Special cleanup method to make sure hosts always get power back."""
1514 afe = frontend_wrappers.RetryingAFE(timeout_min=5, delay_sec=10)
1515 hosts = afe.get_hosts(hostname=self.hostname)
1516 if not hosts or not (self._RPM_OUTLET_CHANGED in
1517 hosts[0].attributes):
1518 return
1519 logging.debug('This host has recently interacted with the RPM'
1520 ' Infrastructure. Ensuring power is on.')
1521 try:
1522 self.power_on()
Dan Shi7dca56e2014-11-11 17:07:56 -08001523 afe.set_host_attribute(self._RPM_OUTLET_CHANGED, None,
1524 hostname=self.hostname)
Simran Basi5e6339a2013-03-21 11:34:32 -07001525 except rpm_client.RemotePowerException:
Simran Basi5e6339a2013-03-21 11:34:32 -07001526 logging.error('Failed to turn Power On for this host after '
1527 'cleanup through the RPM Infrastructure.')
Gabe Blackb72f4fb2015-01-20 16:47:13 -08001528 autotest_es.post(
Dan Shi7dca56e2014-11-11 17:07:56 -08001529 type_str='RPM_poweron_failure',
1530 metadata={'hostname': self.hostname})
Dan Shi49ca0932014-11-14 11:22:27 -08001531
1532 battery_percentage = self.get_battery_percentage()
Dan Shif01ebe22014-12-05 13:10:57 -08001533 if battery_percentage and battery_percentage < 50:
Dan Shi49ca0932014-11-14 11:22:27 -08001534 raise
1535 elif self.is_ac_connected():
1536 logging.info('The device has power adapter connected and '
1537 'charging. No need to try to turn RPM on '
1538 'again.')
1539 afe.set_host_attribute(self._RPM_OUTLET_CHANGED, None,
1540 hostname=self.hostname)
1541 logging.info('Battery level is now at %s%%. The device may '
1542 'still have enough power to run test, so no '
1543 'exception will be raised.', battery_percentage)
1544
Simran Basi5e6339a2013-03-21 11:34:32 -07001545
beepsc87ff602013-07-31 21:53:00 -07001546 def _is_factory_image(self):
1547 """Checks if the image on the DUT is a factory image.
1548
1549 @return: True if the image on the DUT is a factory image.
1550 False otherwise.
1551 """
1552 result = self.run('[ -f /root/.factory_test ]', ignore_status=True)
1553 return result.exit_status == 0
1554
1555
1556 def _restart_ui(self):
J. Richard Barnette84890bd2014-02-21 11:05:47 -08001557 """Restart the Chrome UI.
beepsc87ff602013-07-31 21:53:00 -07001558
1559 @raises: FactoryImageCheckerException for factory images, since
1560 we cannot attempt to restart ui on them.
1561 error.AutoservRunError for any other type of error that
1562 occurs while restarting ui.
1563 """
1564 if self._is_factory_image():
Dan Shi549fb822015-03-24 18:01:11 -07001565 raise FactoryImageCheckerException('Cannot restart ui on factory '
1566 'images')
beepsc87ff602013-07-31 21:53:00 -07001567
J. Richard Barnette84890bd2014-02-21 11:05:47 -08001568 # TODO(jrbarnette): The command to stop/start the ui job
1569 # should live inside cros_ui, too. However that would seem
1570 # to imply interface changes to the existing start()/restart()
1571 # functions, which is a bridge too far (for now).
J. Richard Barnette6069aa12015-06-08 09:10:24 -07001572 prompt = cros_ui.get_chrome_session_ident(self)
J. Richard Barnette84890bd2014-02-21 11:05:47 -08001573 self.run('stop ui; start ui')
1574 cros_ui.wait_for_chrome_ready(prompt, self)
beepsc87ff602013-07-31 21:53:00 -07001575
1576
Dan Shi549fb822015-03-24 18:01:11 -07001577 def get_release_version(self):
1578 """Get the value of attribute CHROMEOS_RELEASE_VERSION from lsb-release.
1579
1580 @returns The version string in lsb-release, under attribute
1581 CHROMEOS_RELEASE_VERSION.
1582 """
1583 lsb_release_content = self.run(
1584 'cat "%s"' % client_constants.LSB_RELEASE).stdout.strip()
1585 return lsbrelease_utils.get_chromeos_release_version(
1586 lsb_release_content=lsb_release_content)
1587
1588
1589 def verify_cros_version_label(self):
1590 """ Make sure host's cros-version label match the actual image in dut.
1591
1592 Remove any cros-version: label that doesn't match that installed in
1593 the dut.
1594
1595 @param raise_error: Set to True to raise exception if any mismatch found
1596
1597 @raise error.AutoservError: If any mismatch between cros-version label
1598 and the build installed in dut is found.
1599 """
1600 labels = self._AFE.get_labels(
1601 name__startswith=ds_constants.VERSION_PREFIX,
1602 host__hostname=self.hostname)
1603 mismatch_found = False
1604 if labels:
1605 # Get CHROMEOS_RELEASE_VERSION from lsb-release, e.g., 6908.0.0.
1606 # Note that it's different from cros-version label, which has
1607 # builder and branch info, e.g.,
1608 # cros-version:peppy-release/R43-6908.0.0
1609 release_version = self.get_release_version()
1610 host_list = [self.hostname]
1611 for label in labels:
1612 # Remove any cros-version label that does not match
1613 # release_version.
1614 build_version = label.name[len(ds_constants.VERSION_PREFIX):]
1615 if not utils.version_match(build_version, release_version):
1616 logging.warn('cros-version label "%s" does not match '
1617 'release version %s. Removing the label.',
1618 label.name, release_version)
1619 label.remove_hosts(hosts=host_list)
1620 mismatch_found = True
1621 if mismatch_found:
Dan Shi1057bae2015-03-30 11:35:09 -07001622 autotest_es.post(use_http=True,
1623 type_str='cros_version_label_mismatch',
1624 metadata={'hostname': self.hostname})
Dan Shi549fb822015-03-24 18:01:11 -07001625 raise error.AutoservError('The host has wrong cros-version label.')
1626
1627
Darren Krahn495b0982015-09-21 19:12:51 -07001628 def verify_tpm_status(self):
1629 """ Verify the host's TPM is in a good state.
1630
1631 @raise error.AutoservError: If state is not good.
1632 """
1633 # This cryptohome command emits status information in JSON format. It
1634 # looks something like this:
1635 # {
1636 # "installattrs": {
1637 # "first_install": false,
1638 # "initialized": true,
1639 # "invalid": false,
1640 # "lockbox_index": 536870916,
1641 # "lockbox_nvram_version": 2,
1642 # "secure": true,
1643 # "size": 0,
1644 # "version": 1
1645 # },
1646 # "mounts": [ {
1647 # "enterprise": false,
1648 # "keysets": [ {
1649 # "current": true,
1650 # "index": 0,
1651 # "last_activity": 1330111359,
1652 # "ok": true,
1653 # "scrypt": true,
1654 # "tpm": false
1655 # } ],
1656 # "mounted": true,
1657 # "owner": "dbb3dd34edb181245130e136be51fa08478d3909"
1658 # } ],
1659 # "tpm": {
1660 # "being_owned": false,
1661 # "can_connect": true,
1662 # "can_decrypt": false,
1663 # "can_encrypt": false,
1664 # "can_load_srk": true,
1665 # "can_load_srk_pubkey": true,
1666 # "enabled": true,
1667 # "has_context": true,
1668 # "has_cryptohome_key": false,
1669 # "has_key_handle": false,
1670 # "last_error": 0,
1671 # "owned": true
1672 # }
1673 # }
1674 output = self.run('cryptohome --action=status').stdout.strip()
1675 try:
1676 status = json.loads(output)
1677 except ValueError:
1678 logging.error('TPM_VERIFY: Cryptohome did not return valid status.')
1679 return
1680 try:
1681 tpm = status['tpm']
1682 if (not tpm['enabled'] or not tpm['can_connect'] or
1683 (tpm['owned'] and not tpm['can_load_srk']) or
1684 (tpm['can_load_srk'] and not tpm['can_load_srk_pubkey'])):
1685 logging.error('TPM_VERIFY: The host TPM is in a bad state.')
1686 raise error.AutoservError('The host TPM is in a bad state.')
1687 else:
1688 logging.debug('TPM_VERIFY: The host TPM is in a good state.')
1689 except KeyError:
1690 logging.error('TPM_VERIFY: Cryptohome did not return valid status.')
1691
1692
beepsc87ff602013-07-31 21:53:00 -07001693 def cleanup(self):
MK Ryu35d661e2014-09-25 17:44:10 -07001694 self.run('rm -f %s' % client_constants.CLEANUP_LOGS_PAUSED_FILE)
Scott Zawalskiddbc31e2012-11-15 11:29:01 -05001695 try:
beepsc87ff602013-07-31 21:53:00 -07001696 self._restart_ui()
1697 except (error.AutotestRunError, error.AutoservRunError,
1698 FactoryImageCheckerException):
Ilja H. Friedel04be2bd2014-05-07 21:29:59 -07001699 logging.warning('Unable to restart ui, rebooting device.')
Scott Zawalskiddbc31e2012-11-15 11:29:01 -05001700 # Since restarting the UI fails fall back to normal Autotest
1701 # cleanup routines, i.e. reboot the machine.
Fang Deng0ca40e22013-08-27 17:47:44 -07001702 super(CrosHost, self).cleanup()
Simran Basi5e6339a2013-03-21 11:34:32 -07001703 # Check if the rpm outlet was manipulated.
Simran Basid5e5e272012-09-24 15:23:59 -07001704 if self.has_power():
Simran Basi5e6339a2013-03-21 11:34:32 -07001705 self._cleanup_poweron()
Dan Shi549fb822015-03-24 18:01:11 -07001706 self.verify_cros_version_label()
J. Richard Barnette45e93de2012-04-11 17:24:15 -07001707
1708
Yu-Ju Honga2be94a2012-07-31 09:48:52 -07001709 def reboot(self, **dargs):
1710 """
1711 This function reboots the site host. The more generic
1712 RemoteHost.reboot() performs sync and sleeps for 5
1713 seconds. This is not necessary for Chrome OS devices as the
1714 sync should be finished in a short time during the reboot
1715 command.
1716 """
Tom Wai-Hong Tamf5cd1d42012-08-13 12:04:08 +08001717 if 'reboot_cmd' not in dargs:
Doug Anderson7d5aeb22014-02-27 15:12:17 -08001718 reboot_timeout = dargs.get('reboot_timeout', 10)
1719 dargs['reboot_cmd'] = ('((reboot & sleep %d; reboot -f &)'
1720 ' </dev/null >/dev/null 2>&1 &)' %
1721 reboot_timeout)
Yu-Ju Honga2be94a2012-07-31 09:48:52 -07001722 # Enable fastsync to avoid running extra sync commands before reboot.
Tom Wai-Hong Tamf5cd1d42012-08-13 12:04:08 +08001723 if 'fastsync' not in dargs:
1724 dargs['fastsync'] = True
Michael Liangda8c60a2014-06-03 13:24:51 -07001725
Charlie Mooneya8e6dab2014-05-29 14:37:55 -07001726 # For purposes of logging reboot times:
1727 # Get the board name i.e. 'daisy_spring'
Michael Liangca4f5a62014-07-10 15:45:13 -07001728 board_fullname = self.get_board()
1729
1730 # Strip the prefix and add it to dargs.
1731 dargs['board'] = board_fullname[board_fullname.find(':')+1:]
Fang Deng0ca40e22013-08-27 17:47:44 -07001732 super(CrosHost, self).reboot(**dargs)
Yu-Ju Honga2be94a2012-07-31 09:48:52 -07001733
1734
Gwendal Grignou7a61d2f2014-05-23 11:05:51 -07001735 def suspend(self, **dargs):
1736 """
1737 This function suspends the site host.
1738 """
1739 suspend_time = dargs.get('suspend_time', 60)
1740 dargs['timeout'] = suspend_time
1741 if 'suspend_cmd' not in dargs:
1742 cmd = ' && '.join(['echo 0 > /sys/class/rtc/rtc0/wakealarm',
1743 'echo +%d > /sys/class/rtc/rtc0/wakealarm' % suspend_time,
1744 'powerd_dbus_suspend --delay=0 &'])
1745 dargs['suspend_cmd'] = ('(( %s )'
1746 '< /dev/null >/dev/null 2>&1 &)' % cmd)
1747 super(CrosHost, self).suspend(**dargs)
1748
1749
Simran Basiec564392014-08-25 16:48:09 -07001750 def upstart_status(self, service_name):
1751 """Check the status of an upstart init script.
1752
1753 @param service_name: Service to look up.
1754
1755 @returns True if the service is running, False otherwise.
1756 """
1757 return self.run('status %s | grep start/running' %
1758 service_name).stdout.strip() != ''
1759
1760
J. Richard Barnette45e93de2012-04-11 17:24:15 -07001761 def verify_software(self):
Richard Barnetteb2bc13c2013-01-08 17:32:51 -08001762 """Verify working software on a Chrome OS system.
J. Richard Barnette45e93de2012-04-11 17:24:15 -07001763
Richard Barnetteb2bc13c2013-01-08 17:32:51 -08001764 Tests for the following conditions:
1765 1. All conditions tested by the parent version of this
1766 function.
1767 2. Sufficient space in /mnt/stateful_partition.
Fang Deng6b05f5b2013-03-20 13:42:11 -07001768 3. Sufficient space in /mnt/stateful_partition/encrypted.
1769 4. update_engine answers a simple status request over DBus.
J. Richard Barnette45e93de2012-04-11 17:24:15 -07001770
J. Richard Barnette45e93de2012-04-11 17:24:15 -07001771 """
MK Ryu35d661e2014-09-25 17:44:10 -07001772 # Check if a job was crashed on this host.
1773 # If yes, avoid verification until crash-logs are collected.
1774 if self._need_crash_logs():
1775 raise error.AutoservCrashLogCollectRequired(
1776 'Need to collect crash-logs before verification')
1777
Fang Deng0ca40e22013-08-27 17:47:44 -07001778 super(CrosHost, self).verify_software()
Dan Shib8540a52015-07-16 14:18:23 -07001779 default_kilo_inodes_required = CONFIG.get_config_value(
1780 'SERVER', 'kilo_inodes_required', type=int, default=100)
1781 board = self.get_board().replace(ds_constants.BOARD_PREFIX, '')
1782 kilo_inodes_required = CONFIG.get_config_value(
1783 'SERVER', 'kilo_inodes_required_%s' % board,
1784 type=int, default=default_kilo_inodes_required)
1785 self.check_inodes('/mnt/stateful_partition', kilo_inodes_required)
J. Richard Barnette45e93de2012-04-11 17:24:15 -07001786 self.check_diskspace(
1787 '/mnt/stateful_partition',
Dan Shib8540a52015-07-16 14:18:23 -07001788 CONFIG.get_config_value(
Fang Deng6b05f5b2013-03-20 13:42:11 -07001789 'SERVER', 'gb_diskspace_required', type=float,
1790 default=20.0))
Gaurav Shahe448af82014-06-19 15:18:59 -07001791 encrypted_stateful_path = '/mnt/stateful_partition/encrypted'
1792 # Not all targets build with encrypted stateful support.
1793 if self.path_exists(encrypted_stateful_path):
1794 self.check_diskspace(
1795 encrypted_stateful_path,
Dan Shib8540a52015-07-16 14:18:23 -07001796 CONFIG.get_config_value(
Gaurav Shahe448af82014-06-19 15:18:59 -07001797 'SERVER', 'gb_encrypted_diskspace_required', type=float,
1798 default=0.1))
beepsc87ff602013-07-31 21:53:00 -07001799
Simran Basiec564392014-08-25 16:48:09 -07001800 if not self.upstart_status('system-services'):
Prashanth B5d0a0512014-04-25 12:26:08 -07001801 raise error.AutoservError('Chrome failed to reach login. '
1802 'System services not running.')
1803
beepsc87ff602013-07-31 21:53:00 -07001804 # Factory images don't run update engine,
1805 # goofy controls dbus on these DUTs.
1806 if not self._is_factory_image():
1807 self.run('update_engine_client --status')
Scott Zawalskifbca4a92013-03-04 15:56:42 -05001808 # Makes sure python is present, loads and can use built in functions.
1809 # We have seen cases where importing cPickle fails with undefined
1810 # symbols in cPickle.so.
1811 self.run('python -c "import cPickle"')
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07001812
Dan Shi549fb822015-03-24 18:01:11 -07001813 self.verify_cros_version_label()
1814
Darren Krahn495b0982015-09-21 19:12:51 -07001815 self.verify_tpm_status()
1816
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07001817
Dan Shi49ca0932014-11-14 11:22:27 -08001818 def verify_hardware(self):
1819 """Verify hardware system of a Chrome OS system.
1820
1821 Check following hardware conditions:
1822 1. Battery level.
1823 2. Is power adapter connected.
1824 """
1825 logging.info('Battery percentage: %s', self.get_battery_percentage())
Dan Shie9b765d2014-12-29 16:59:49 -08001826 if self.is_ac_connected() is None:
1827 logging.info('Can not determine if the device has power adapter '
1828 'connected.')
1829 else:
1830 logging.info('Device %s power adapter connected and charging.',
1831 'has' if self.is_ac_connected() else 'does not have')
Dan Shi49ca0932014-11-14 11:22:27 -08001832
1833
Fang Deng96667ca2013-08-01 17:46:18 -07001834 def make_ssh_command(self, user='root', port=22, opts='', hosts_file=None,
1835 connect_timeout=None, alive_interval=None):
1836 """Override default make_ssh_command to use options tuned for Chrome OS.
1837
1838 Tuning changes:
1839 - ConnectTimeout=30; maximum of 30 seconds allowed for an SSH
1840 connection failure. Consistency with remote_access.sh.
1841
Samuel Tan2ce155b2015-06-23 18:24:38 -07001842 - ServerAliveInterval=900; which causes SSH to ping connection every
1843 900 seconds. In conjunction with ServerAliveCountMax ensures
1844 that if the connection dies, Autotest will bail out.
Fang Deng96667ca2013-08-01 17:46:18 -07001845 Originally tried 60 secs, but saw frequent job ABORTS where
Samuel Tan2ce155b2015-06-23 18:24:38 -07001846 the test completed successfully. Later increased from 180 seconds to
1847 900 seconds to account for tests where the DUT is suspended for
1848 longer periods of time.
Fang Deng96667ca2013-08-01 17:46:18 -07001849
1850 - ServerAliveCountMax=3; consistency with remote_access.sh.
1851
1852 - ConnectAttempts=4; reduce flakiness in connection errors;
1853 consistency with remote_access.sh.
1854
1855 - UserKnownHostsFile=/dev/null; we don't care about the keys.
1856 Host keys change with every new installation, don't waste
1857 memory/space saving them.
1858
1859 - SSH protocol forced to 2; needed for ServerAliveInterval.
1860
1861 @param user User name to use for the ssh connection.
1862 @param port Port on the target host to use for ssh connection.
1863 @param opts Additional options to the ssh command.
1864 @param hosts_file Ignored.
1865 @param connect_timeout Ignored.
1866 @param alive_interval Ignored.
1867 """
Aviv Keshetc5947fa2013-09-04 14:06:29 -07001868 base_command = ('/usr/bin/ssh -a -x %s %s %s'
1869 ' -o StrictHostKeyChecking=no'
Fang Deng96667ca2013-08-01 17:46:18 -07001870 ' -o UserKnownHostsFile=/dev/null -o BatchMode=yes'
Samuel Tan2ce155b2015-06-23 18:24:38 -07001871 ' -o ConnectTimeout=30 -o ServerAliveInterval=900'
Fang Deng96667ca2013-08-01 17:46:18 -07001872 ' -o ServerAliveCountMax=3 -o ConnectionAttempts=4'
1873 ' -o Protocol=2 -l %s -p %d')
Aviv Keshetc5947fa2013-09-04 14:06:29 -07001874 return base_command % (self._ssh_verbosity_flag, self._ssh_options,
1875 opts, user, port)
Fang Deng96667ca2013-08-01 17:46:18 -07001876
1877
Christopher Wileydd181852013-10-10 19:56:58 -07001878 def _setup_rpc(self, port, command_name, remote_pid=None):
beeps32a63082013-08-22 14:02:29 -07001879 """Sets up a tunnel process and performs rpc connection book keeping.
1880
Cheng-Yi Chianga155e7e2015-08-20 20:42:04 +08001881 Chrome OS on the target closes down most external ports for security.
1882 We could open the port, but doing that would conflict with security
1883 tests that check that only expected ports are open. So, to get to
1884 the port on the target we use an ssh tunnel.
1885
beeps32a63082013-08-22 14:02:29 -07001886 This method assumes that xmlrpc and jsonrpc never conflict, since
1887 we can only either have an xmlrpc or a jsonrpc server listening on
1888 a remote port. As such, it enforces a single proxy->remote port
1889 policy, i.e if one starts a jsonrpc proxy/server from port A->B,
1890 and then tries to start an xmlrpc proxy forwarded to the same port,
1891 the xmlrpc proxy will override the jsonrpc tunnel process, however:
1892
1893 1. None of the methods on the xmlrpc proxy will work because
1894 the server listening on B is jsonrpc.
1895
1896 2. The xmlrpc client cannot initiate a termination of the JsonRPC
1897 server, as the only use case currently is goofy, which is tied to
1898 the factory image. It is much easier to handle a failed xmlrpc
1899 call on the client than it is to terminate goofy in this scenario,
1900 as doing the latter might leave the DUT in a hard to recover state.
1901
1902 With the current implementation newer rpc proxy connections will
1903 terminate the tunnel processes of older rpc connections tunneling
1904 to the same remote port. If methods are invoked on the client
1905 after this has happened they will fail with connection closed errors.
1906
1907 @param port: The remote forwarding port.
1908 @param command_name: The name of the remote process, to terminate
1909 using pkill.
1910
1911 @return A url that we can use to initiate the rpc connection.
1912 """
1913 self.rpc_disconnect(port)
1914 local_port = utils.get_unused_port()
1915 tunnel_proc = self._create_ssh_tunnel(port, local_port)
Christopher Wileydd181852013-10-10 19:56:58 -07001916 self._rpc_proxy_map[port] = (command_name, tunnel_proc, remote_pid)
beeps32a63082013-08-22 14:02:29 -07001917 return self._RPC_PROXY_URL % local_port
1918
1919
Christopher Wileyd78249a2013-03-01 13:05:31 -08001920 def xmlrpc_connect(self, command, port, command_name=None,
Yusuf Mohsinallyfff89d62013-11-18 16:34:07 -08001921 ready_test_name=None, timeout_seconds=10,
1922 logfile='/dev/null'):
J. Richard Barnette1d78b012012-05-15 13:56:30 -07001923 """Connect to an XMLRPC server on the host.
1924
1925 The `command` argument should be a simple shell command that
1926 starts an XMLRPC server on the given `port`. The command
1927 must not daemonize, and must terminate cleanly on SIGTERM.
1928 The command is started in the background on the host, and a
1929 local XMLRPC client for the server is created and returned
1930 to the caller.
1931
1932 Note that the process of creating an XMLRPC client makes no
1933 attempt to connect to the remote server; the caller is
1934 responsible for determining whether the server is running
1935 correctly, and is ready to serve requests.
1936
Christopher Wileyd78249a2013-03-01 13:05:31 -08001937 Optionally, the caller can pass ready_test_name, a string
1938 containing the name of a method to call on the proxy. This
1939 method should take no parameters and return successfully only
1940 when the server is ready to process client requests. When
1941 ready_test_name is set, xmlrpc_connect will block until the
1942 proxy is ready, and throw a TestError if the server isn't
1943 ready by timeout_seconds.
1944
beeps32a63082013-08-22 14:02:29 -07001945 If a server is already running on the remote port, this
1946 method will kill it and disconnect the tunnel process
1947 associated with the connection before establishing a new one,
1948 by consulting the rpc_proxy_map in rpc_disconnect.
1949
J. Richard Barnette1d78b012012-05-15 13:56:30 -07001950 @param command Shell command to start the server.
1951 @param port Port number on which the server is expected to
1952 be serving.
J. Richard Barnette7214e0b2013-02-06 15:20:49 -08001953 @param command_name String to use as input to `pkill` to
1954 terminate the XMLRPC server on the host.
Christopher Wileyd78249a2013-03-01 13:05:31 -08001955 @param ready_test_name String containing the name of a
1956 method defined on the XMLRPC server.
1957 @param timeout_seconds Number of seconds to wait
1958 for the server to become 'ready.' Will throw a
1959 TestFail error if server is not ready in time.
Yusuf Mohsinallyfff89d62013-11-18 16:34:07 -08001960 @param logfile Logfile to send output when running
1961 'command' argument.
Yusuf Mohsinally8d19e3c2013-11-21 14:25:45 -08001962
J. Richard Barnette1d78b012012-05-15 13:56:30 -07001963 """
Christopher Wileyc14f06a2013-10-16 13:55:39 -07001964 # Clean up any existing state. If the caller is willing
1965 # to believe their server is down, we ought to clean up
1966 # any tunnels we might have sitting around.
1967 self.rpc_disconnect(port)
J. Richard Barnette1d78b012012-05-15 13:56:30 -07001968 # Start the server on the host. Redirection in the command
1969 # below is necessary, because 'ssh' won't terminate until
1970 # background child processes close stdin, stdout, and
1971 # stderr.
Yusuf Mohsinallyfff89d62013-11-18 16:34:07 -08001972 remote_cmd = '%s </dev/null >%s 2>&1 & echo $!' % (command, logfile)
Christopher Wileydd181852013-10-10 19:56:58 -07001973 remote_pid = self.run(remote_cmd).stdout.rstrip('\n')
J. Richard Barnette1d78b012012-05-15 13:56:30 -07001974 logging.debug('Started XMLRPC server on host %s, pid = %s',
1975 self.hostname, remote_pid)
1976
Christopher Wileydd181852013-10-10 19:56:58 -07001977 # Tunnel through SSH to be able to reach that remote port.
1978 rpc_url = self._setup_rpc(port, command_name, remote_pid=remote_pid)
Christopher Wileyd78249a2013-03-01 13:05:31 -08001979 proxy = xmlrpclib.ServerProxy(rpc_url, allow_none=True)
Christopher Wileydd181852013-10-10 19:56:58 -07001980
Christopher Wileyd78249a2013-03-01 13:05:31 -08001981 if ready_test_name is not None:
J. Richard Barnette13eb7c02013-03-07 12:06:29 -08001982 # retry.retry logs each attempt; calculate delay_sec to
1983 # keep log spam to a dull roar.
Christopher Wiley0ed712b2013-04-09 15:25:12 -07001984 @retry.retry((socket.error,
1985 xmlrpclib.ProtocolError,
1986 httplib.BadStatusLine),
Chris Sosa65425082013-10-16 13:26:22 -07001987 timeout_min=timeout_seconds / 60.0,
1988 delay_sec=min(max(timeout_seconds / 20.0, 0.1), 1))
Christopher Wileyd78249a2013-03-01 13:05:31 -08001989 def ready_test():
1990 """ Call proxy.ready_test_name(). """
1991 getattr(proxy, ready_test_name)()
1992 successful = False
1993 try:
1994 logging.info('Waiting %d seconds for XMLRPC server '
1995 'to start.', timeout_seconds)
1996 ready_test()
1997 successful = True
Christopher Wileyd78249a2013-03-01 13:05:31 -08001998 finally:
1999 if not successful:
2000 logging.error('Failed to start XMLRPC server.')
beeps32a63082013-08-22 14:02:29 -07002001 self.rpc_disconnect(port)
Christopher Wileyd78249a2013-03-01 13:05:31 -08002002 logging.info('XMLRPC server started successfully.')
2003 return proxy
J. Richard Barnette1d78b012012-05-15 13:56:30 -07002004
J. Richard Barnette1d78b012012-05-15 13:56:30 -07002005
Jason Abeleb6f924f2013-11-13 16:01:54 -08002006 def syslog(self, message, tag='autotest'):
2007 """Logs a message to syslog on host.
2008
2009 @param message String message to log into syslog
2010 @param tag String tag prefix for syslog
2011
2012 """
2013 self.run('logger -t "%s" "%s"' % (tag, message))
2014
2015
beeps32a63082013-08-22 14:02:29 -07002016 def jsonrpc_connect(self, port):
2017 """Creates a jsonrpc proxy connection through an ssh tunnel.
2018
2019 This method exists to facilitate communication with goofy (which is
2020 the default system manager on all factory images) and as such, leaves
2021 most of the rpc server sanity checking to the caller. Unlike
2022 xmlrpc_connect, this method does not facilitate the creation of a remote
2023 jsonrpc server, as the only clients of this code are factory tests,
2024 for which the goofy system manager is built in to the image and starts
2025 when the target boots.
2026
2027 One can theoretically create multiple jsonrpc proxies all forwarded
2028 to the same remote port, provided the remote port has an rpc server
2029 listening. However, in doing so we stand the risk of leaking an
2030 existing tunnel process, so we always disconnect any older tunnels
2031 we might have through rpc_disconnect.
2032
2033 @param port: port on the remote host that is serving this proxy.
2034
2035 @return: The client proxy.
2036 """
2037 if not jsonrpclib:
2038 logging.warning('Jsonrpclib could not be imported. Check that '
2039 'site-packages contains jsonrpclib.')
2040 return None
2041
2042 proxy = jsonrpclib.jsonrpc.ServerProxy(self._setup_rpc(port, None))
2043
2044 logging.info('Established a jsonrpc connection through port %s.', port)
2045 return proxy
2046
2047
2048 def rpc_disconnect(self, port):
2049 """Disconnect from an RPC server on the host.
2050
2051 Terminates the remote RPC server previously started for
J. Richard Barnette1d78b012012-05-15 13:56:30 -07002052 the given `port`. Also closes the local ssh tunnel created
2053 for the connection to the host. This function does not
beeps32a63082013-08-22 14:02:29 -07002054 directly alter the state of a previously returned RPC
J. Richard Barnette1d78b012012-05-15 13:56:30 -07002055 client object; however disconnection will cause all
2056 subsequent calls to methods on the object to fail.
2057
2058 This function does nothing if requested to disconnect a port
beeps32a63082013-08-22 14:02:29 -07002059 that was not previously connected via _setup_rpc.
J. Richard Barnette1d78b012012-05-15 13:56:30 -07002060
2061 @param port Port number passed to a previous call to
beeps32a63082013-08-22 14:02:29 -07002062 `_setup_rpc()`.
J. Richard Barnette1d78b012012-05-15 13:56:30 -07002063 """
beeps32a63082013-08-22 14:02:29 -07002064 if port not in self._rpc_proxy_map:
J. Richard Barnette1d78b012012-05-15 13:56:30 -07002065 return
Christopher Wileydd181852013-10-10 19:56:58 -07002066 remote_name, tunnel_proc, remote_pid = self._rpc_proxy_map[port]
J. Richard Barnette1d78b012012-05-15 13:56:30 -07002067 if remote_name:
2068 # We use 'pkill' to find our target process rather than
2069 # a PID, because the host may have rebooted since
2070 # connecting, and we don't want to kill an innocent
2071 # process with the same PID.
2072 #
2073 # 'pkill' helpfully exits with status 1 if no target
2074 # process is found, for which run() will throw an
Simran Basid5e5e272012-09-24 15:23:59 -07002075 # exception. We don't want that, so we the ignore
J. Richard Barnette1d78b012012-05-15 13:56:30 -07002076 # status.
2077 self.run("pkill -f '%s'" % remote_name, ignore_status=True)
Christopher Wileydd181852013-10-10 19:56:58 -07002078 if remote_pid:
2079 logging.info('Waiting for RPC server "%s" shutdown',
2080 remote_name)
2081 start_time = time.time()
2082 while (time.time() - start_time <
2083 self._RPC_SHUTDOWN_TIMEOUT_SECONDS):
2084 running_processes = self.run(
2085 "pgrep -f '%s'" % remote_name,
2086 ignore_status=True).stdout.split()
2087 if not remote_pid in running_processes:
2088 logging.info('Shut down RPC server.')
2089 break
2090 time.sleep(self._RPC_SHUTDOWN_POLLING_PERIOD_SECONDS)
2091 else:
2092 raise error.TestError('Failed to shutdown RPC server %s' %
2093 remote_name)
J. Richard Barnette1d78b012012-05-15 13:56:30 -07002094
2095 if tunnel_proc.poll() is None:
2096 tunnel_proc.terminate()
2097 logging.debug('Terminated tunnel, pid %d', tunnel_proc.pid)
2098 else:
2099 logging.debug('Tunnel pid %d terminated early, status %d',
2100 tunnel_proc.pid, tunnel_proc.returncode)
beeps32a63082013-08-22 14:02:29 -07002101 del self._rpc_proxy_map[port]
J. Richard Barnette1d78b012012-05-15 13:56:30 -07002102
2103
beeps32a63082013-08-22 14:02:29 -07002104 def rpc_disconnect_all(self):
2105 """Disconnect all known RPC proxy ports."""
2106 for port in self._rpc_proxy_map.keys():
2107 self.rpc_disconnect(port)
J. Richard Barnette1d78b012012-05-15 13:56:30 -07002108
2109
Ilja H. Friedel1232e8a2014-06-17 21:30:48 -07002110 def poor_mans_rpc(self, fun):
2111 """
2112 Calls a function from client utils on the host and returns a string.
2113
2114 @param fun function in client utils namespace.
2115 @return output string from calling fun.
2116 """
Simran Basi263a9d32014-08-19 11:16:51 -07002117 script = 'cd %s/bin; ' % autotest.Autotest.get_installed_autodir(self)
Ilja H. Friedel1232e8a2014-06-17 21:30:48 -07002118 script += 'python -c "import common; import utils;'
2119 script += 'print utils.%s"' % fun
2120 return script
2121
2122
J. Richard Barnetteb6de7e32013-02-14 13:28:04 -08002123 def _ping_check_status(self, status):
2124 """Ping the host once, and return whether it has a given status.
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002125
J. Richard Barnetteb6de7e32013-02-14 13:28:04 -08002126 @param status Check the ping status against this value.
2127 @return True iff `status` and the result of ping are the same
2128 (i.e. both True or both False).
2129
2130 """
2131 ping_val = utils.ping(self.hostname, tries=1, deadline=1)
2132 return not (status ^ (ping_val == 0))
2133
2134 def _ping_wait_for_status(self, status, timeout):
2135 """Wait for the host to have a given status (UP or DOWN).
2136
2137 Status is checked by polling. Polling will not last longer
2138 than the number of seconds in `timeout`. The polling
2139 interval will be long enough that only approximately
2140 _PING_WAIT_COUNT polling cycles will be executed, subject
2141 to a maximum interval of about one minute.
2142
2143 @param status Waiting will stop immediately if `ping` of the
2144 host returns this status.
2145 @param timeout Poll for at most this many seconds.
2146 @return True iff the host status from `ping` matched the
2147 requested status at the time of return.
2148
2149 """
2150 # _ping_check_status() takes about 1 second, hence the
2151 # "- 1" in the formula below.
2152 poll_interval = min(int(timeout / self._PING_WAIT_COUNT), 60) - 1
2153 end_time = time.time() + timeout
2154 while time.time() <= end_time:
2155 if self._ping_check_status(status):
2156 return True
2157 if poll_interval > 0:
2158 time.sleep(poll_interval)
2159
2160 # The last thing we did was sleep(poll_interval), so it may
2161 # have been too long since the last `ping`. Check one more
2162 # time, just to be sure.
2163 return self._ping_check_status(status)
2164
2165 def ping_wait_up(self, timeout):
2166 """Wait for the host to respond to `ping`.
2167
2168 N.B. This method is not a reliable substitute for
2169 `wait_up()`, because a host that responds to ping will not
2170 necessarily respond to ssh. This method should only be used
2171 if the target DUT can be considered functional even if it
2172 can't be reached via ssh.
2173
2174 @param timeout Minimum time to allow before declaring the
2175 host to be non-responsive.
2176 @return True iff the host answered to ping before the timeout.
2177
2178 """
2179 return self._ping_wait_for_status(self._PING_STATUS_UP, timeout)
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002180
Andrew Bresticker678c0c72013-01-22 10:44:09 -08002181 def ping_wait_down(self, timeout):
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002182 """Wait until the host no longer responds to `ping`.
2183
J. Richard Barnetteb6de7e32013-02-14 13:28:04 -08002184 This function can be used as a slightly faster version of
2185 `wait_down()`, by avoiding potentially long ssh timeouts.
2186
2187 @param timeout Minimum time to allow for the host to become
2188 non-responsive.
2189 @return True iff the host quit answering ping before the
2190 timeout.
2191
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002192 """
J. Richard Barnetteb6de7e32013-02-14 13:28:04 -08002193 return self._ping_wait_for_status(self._PING_STATUS_DOWN, timeout)
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002194
Tom Wai-Hong Tamfced4f62014-04-17 10:56:30 +08002195 def test_wait_for_sleep(self, sleep_timeout=None):
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002196 """Wait for the client to enter low-power sleep mode.
2197
2198 The test for "is asleep" can't distinguish a system that is
2199 powered off; to confirm that the unit was asleep, it is
2200 necessary to force resume, and then call
2201 `test_wait_for_resume()`.
2202
2203 This function is expected to be called from a test as part
2204 of a sequence like the following:
2205
2206 ~~~~~~~~
2207 boot_id = host.get_boot_id()
2208 # trigger sleep on the host
2209 host.test_wait_for_sleep()
2210 # trigger resume on the host
2211 host.test_wait_for_resume(boot_id)
2212 ~~~~~~~~
2213
Tom Wai-Hong Tamfced4f62014-04-17 10:56:30 +08002214 @param sleep_timeout time limit in seconds to allow the host sleep.
2215
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002216 @exception TestFail The host did not go to sleep within
2217 the allowed time.
2218 """
Tom Wai-Hong Tamfced4f62014-04-17 10:56:30 +08002219 if sleep_timeout is None:
2220 sleep_timeout = self.SLEEP_TIMEOUT
2221
2222 if not self.ping_wait_down(timeout=sleep_timeout):
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002223 raise error.TestFail(
Tom Wai-Hong Tamfced4f62014-04-17 10:56:30 +08002224 'client failed to sleep after %d seconds' % sleep_timeout)
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002225
2226
Tom Wai-Hong Tamfced4f62014-04-17 10:56:30 +08002227 def test_wait_for_resume(self, old_boot_id, resume_timeout=None):
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002228 """Wait for the client to resume from low-power sleep mode.
2229
2230 The `old_boot_id` parameter should be the value from
2231 `get_boot_id()` obtained prior to entering sleep mode. A
2232 `TestFail` exception is raised if the boot id changes.
2233
2234 See @ref test_wait_for_sleep for more on this function's
2235 usage.
2236
J. Richard Barnette7214e0b2013-02-06 15:20:49 -08002237 @param old_boot_id A boot id value obtained before the
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002238 target host went to sleep.
Tom Wai-Hong Tamfced4f62014-04-17 10:56:30 +08002239 @param resume_timeout time limit in seconds to allow the host up.
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002240
2241 @exception TestFail The host did not respond within the
2242 allowed time.
2243 @exception TestFail The host responded, but the boot id test
2244 indicated a reboot rather than a sleep
2245 cycle.
2246 """
Tom Wai-Hong Tamfced4f62014-04-17 10:56:30 +08002247 if resume_timeout is None:
2248 resume_timeout = self.RESUME_TIMEOUT
2249
2250 if not self.wait_up(timeout=resume_timeout):
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002251 raise error.TestFail(
2252 'client failed to resume from sleep after %d seconds' %
Tom Wai-Hong Tamfced4f62014-04-17 10:56:30 +08002253 resume_timeout)
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002254 else:
2255 new_boot_id = self.get_boot_id()
2256 if new_boot_id != old_boot_id:
Tom Wai-Hong Tam01792682015-01-06 08:00:46 +08002257 logging.error('client rebooted (old boot %s, new boot %s)',
2258 old_boot_id, new_boot_id)
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002259 raise error.TestFail(
Tom Wai-Hong Tam01792682015-01-06 08:00:46 +08002260 'client rebooted, but sleep was expected')
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002261
2262
Tom Wai-Hong Tamfe005c22014-12-03 09:25:44 +08002263 def test_wait_for_shutdown(self, shutdown_timeout=None):
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002264 """Wait for the client to shut down.
2265
2266 The test for "has shut down" can't distinguish a system that
2267 is merely asleep; to confirm that the unit was down, it is
2268 necessary to force boot, and then call test_wait_for_boot().
2269
2270 This function is expected to be called from a test as part
2271 of a sequence like the following:
2272
2273 ~~~~~~~~
2274 boot_id = host.get_boot_id()
2275 # trigger shutdown on the host
2276 host.test_wait_for_shutdown()
2277 # trigger boot on the host
2278 host.test_wait_for_boot(boot_id)
2279 ~~~~~~~~
2280
Tom Wai-Hong Tamfe005c22014-12-03 09:25:44 +08002281 @param shutdown_timeout time limit in seconds to allow the host down.
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002282 @exception TestFail The host did not shut down within the
2283 allowed time.
2284 """
Tom Wai-Hong Tamfe005c22014-12-03 09:25:44 +08002285 if shutdown_timeout is None:
2286 shutdown_timeout = self.SHUTDOWN_TIMEOUT
2287
2288 if not self.ping_wait_down(timeout=shutdown_timeout):
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002289 raise error.TestFail(
2290 'client failed to shut down after %d seconds' %
Tom Wai-Hong Tamfe005c22014-12-03 09:25:44 +08002291 shutdown_timeout)
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002292
2293
2294 def test_wait_for_boot(self, old_boot_id=None):
2295 """Wait for the client to boot from cold power.
2296
2297 The `old_boot_id` parameter should be the value from
2298 `get_boot_id()` obtained prior to shutting down. A
2299 `TestFail` exception is raised if the boot id does not
2300 change. The boot id test is omitted if `old_boot_id` is not
2301 specified.
2302
2303 See @ref test_wait_for_shutdown for more on this function's
2304 usage.
2305
J. Richard Barnette7214e0b2013-02-06 15:20:49 -08002306 @param old_boot_id A boot id value obtained before the
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002307 shut down.
2308
2309 @exception TestFail The host did not respond within the
2310 allowed time.
2311 @exception TestFail The host responded, but the boot id test
2312 indicated that there was no reboot.
2313 """
J. Richard Barnetteeb69d722012-06-18 17:29:44 -07002314 if not self.wait_up(timeout=self.REBOOT_TIMEOUT):
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002315 raise error.TestFail(
2316 'client failed to reboot after %d seconds' %
J. Richard Barnetteeb69d722012-06-18 17:29:44 -07002317 self.REBOOT_TIMEOUT)
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002318 elif old_boot_id:
2319 if self.get_boot_id() == old_boot_id:
Tom Wai-Hong Tam01792682015-01-06 08:00:46 +08002320 logging.error('client not rebooted (boot %s)',
2321 old_boot_id)
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002322 raise error.TestFail(
Tom Wai-Hong Tam01792682015-01-06 08:00:46 +08002323 'client is back up, but did not reboot')
Simran Basid5e5e272012-09-24 15:23:59 -07002324
2325
2326 @staticmethod
2327 def check_for_rpm_support(hostname):
2328 """For a given hostname, return whether or not it is powered by an RPM.
2329
Simran Basi1df55112013-09-06 11:25:09 -07002330 @param hostname: hostname to check for rpm support.
2331
Simran Basid5e5e272012-09-24 15:23:59 -07002332 @return None if this host does not follows the defined naming format
2333 for RPM powered DUT's in the lab. If it does follow the format,
2334 it returns a regular expression MatchObject instead.
2335 """
Fang Dengbaff9082015-01-06 13:46:15 -08002336 return re.match(CrosHost._RPM_HOSTNAME_REGEX, hostname)
Simran Basid5e5e272012-09-24 15:23:59 -07002337
2338
2339 def has_power(self):
2340 """For this host, return whether or not it is powered by an RPM.
2341
2342 @return True if this host is in the CROS lab and follows the defined
2343 naming format.
2344 """
Fang Deng0ca40e22013-08-27 17:47:44 -07002345 return CrosHost.check_for_rpm_support(self.hostname)
Simran Basid5e5e272012-09-24 15:23:59 -07002346
2347
Ismail Noorbasha07fdb612013-02-14 14:13:31 -08002348 def _set_power(self, state, power_method):
2349 """Sets the power to the host via RPM, Servo or manual.
2350
2351 @param state Specifies which power state to set to DUT
2352 @param power_method Specifies which method of power control to
2353 use. By default "RPM" will be used. Valid values
2354 are the strings "RPM", "manual", "servoj10".
2355
2356 """
2357 ACCEPTABLE_STATES = ['ON', 'OFF']
2358
2359 if state.upper() not in ACCEPTABLE_STATES:
2360 raise error.TestError('State must be one of: %s.'
2361 % (ACCEPTABLE_STATES,))
2362
2363 if power_method == self.POWER_CONTROL_SERVO:
2364 logging.info('Setting servo port J10 to %s', state)
2365 self.servo.set('prtctl3_pwren', state.lower())
2366 time.sleep(self._USB_POWER_TIMEOUT)
2367 elif power_method == self.POWER_CONTROL_MANUAL:
2368 logging.info('You have %d seconds to set the AC power to %s.',
2369 self._POWER_CYCLE_TIMEOUT, state)
2370 time.sleep(self._POWER_CYCLE_TIMEOUT)
2371 else:
2372 if not self.has_power():
2373 raise error.TestFail('DUT does not have RPM connected.')
Simran Basi5e6339a2013-03-21 11:34:32 -07002374 afe = frontend_wrappers.RetryingAFE(timeout_min=5, delay_sec=10)
2375 afe.set_host_attribute(self._RPM_OUTLET_CHANGED, True,
2376 hostname=self.hostname)
Simran Basi1df55112013-09-06 11:25:09 -07002377 rpm_client.set_power(self.hostname, state.upper(), timeout_mins=5)
Simran Basid5e5e272012-09-24 15:23:59 -07002378
2379
Ismail Noorbasha07fdb612013-02-14 14:13:31 -08002380 def power_off(self, power_method=POWER_CONTROL_RPM):
2381 """Turn off power to this host via RPM, Servo or manual.
2382
2383 @param power_method Specifies which method of power control to
2384 use. By default "RPM" will be used. Valid values
2385 are the strings "RPM", "manual", "servoj10".
2386
2387 """
2388 self._set_power('OFF', power_method)
Simran Basid5e5e272012-09-24 15:23:59 -07002389
2390
Ismail Noorbasha07fdb612013-02-14 14:13:31 -08002391 def power_on(self, power_method=POWER_CONTROL_RPM):
2392 """Turn on power to this host via RPM, Servo or manual.
2393
2394 @param power_method Specifies which method of power control to
2395 use. By default "RPM" will be used. Valid values
2396 are the strings "RPM", "manual", "servoj10".
2397
2398 """
2399 self._set_power('ON', power_method)
2400
2401
2402 def power_cycle(self, power_method=POWER_CONTROL_RPM):
2403 """Cycle power to this host by turning it OFF, then ON.
2404
2405 @param power_method Specifies which method of power control to
2406 use. By default "RPM" will be used. Valid values
2407 are the strings "RPM", "manual", "servoj10".
2408
2409 """
2410 if power_method in (self.POWER_CONTROL_SERVO,
2411 self.POWER_CONTROL_MANUAL):
2412 self.power_off(power_method=power_method)
2413 time.sleep(self._POWER_CYCLE_TIMEOUT)
2414 self.power_on(power_method=power_method)
2415 else:
2416 rpm_client.set_power(self.hostname, 'CYCLE')
Simran Basic6f1f7a2012-10-16 10:47:46 -07002417
2418
2419 def get_platform(self):
2420 """Determine the correct platform label for this host.
2421
2422 @returns a string representing this host's platform.
2423 """
2424 crossystem = utils.Crossystem(self)
2425 crossystem.init()
2426 # Extract fwid value and use the leading part as the platform id.
2427 # fwid generally follow the format of {platform}.{firmware version}
2428 # Example: Alex.X.YYY.Z or Google_Alex.X.YYY.Z
2429 platform = crossystem.fwid().split('.')[0].lower()
2430 # Newer platforms start with 'Google_' while the older ones do not.
2431 return platform.replace('google_', '')
2432
2433
Hung-ying Tyanb1328032014-04-01 14:18:54 +08002434 def get_architecture(self):
2435 """Determine the correct architecture label for this host.
2436
2437 @returns a string representing this host's architecture.
2438 """
2439 crossystem = utils.Crossystem(self)
2440 crossystem.init()
2441 return crossystem.arch()
2442
2443
Luis Lozano40b7d0d2014-01-17 15:12:06 -08002444 def get_chrome_version(self):
2445 """Gets the Chrome version number and milestone as strings.
2446
2447 Invokes "chrome --version" to get the version number and milestone.
2448
2449 @return A tuple (chrome_ver, milestone) where "chrome_ver" is the
2450 current Chrome version number as a string (in the form "W.X.Y.Z")
2451 and "milestone" is the first component of the version number
2452 (the "W" from "W.X.Y.Z"). If the version number cannot be parsed
2453 in the "W.X.Y.Z" format, the "chrome_ver" will be the full output
2454 of "chrome --version" and the milestone will be the empty string.
2455
2456 """
MK Ryu35d661e2014-09-25 17:44:10 -07002457 version_string = self.run(client_constants.CHROME_VERSION_COMMAND).stdout
Luis Lozano40b7d0d2014-01-17 15:12:06 -08002458 return utils.parse_chrome_version(version_string)
2459
Aviv Keshet74c89a92013-02-04 15:18:30 -08002460 @label_decorator()
Simran Basic6f1f7a2012-10-16 10:47:46 -07002461 def get_board(self):
2462 """Determine the correct board label for this host.
2463
2464 @returns a string representing this host's board.
2465 """
2466 release_info = utils.parse_cmd_output('cat /etc/lsb-release',
2467 run_method=self.run)
2468 board = release_info['CHROMEOS_RELEASE_BOARD']
2469 # Devices in the lab generally have the correct board name but our own
2470 # development devices have {board_name}-signed-{key_type}. The board
2471 # name may also begin with 'x86-' which we need to keep.
Simran Basi833814b2013-01-29 13:13:43 -08002472 board_format_string = ds_constants.BOARD_PREFIX + '%s'
Simran Basic6f1f7a2012-10-16 10:47:46 -07002473 if 'x86' not in board:
Simran Basi833814b2013-01-29 13:13:43 -08002474 return board_format_string % board.split('-')[0]
2475 return board_format_string % '-'.join(board.split('-')[0:2])
Simran Basic6f1f7a2012-10-16 10:47:46 -07002476
2477
Ilja H. Friedel1232e8a2014-06-17 21:30:48 -07002478 @label_decorator('board_freq_mem')
2479 def get_board_with_frequency_and_memory(self):
2480 """
2481 Determines the board name with frequency and memory.
2482
2483 @returns a more detailed string representing the board. Examples are
2484 butterfly_1.1GHz_2GB, link_1.8GHz_4GB, x86-zgb_1.7GHz_2GB
2485 """
2486 board = self.run(self.poor_mans_rpc(
2487 'get_board_with_frequency_and_memory()')).stdout
2488 return 'board_freq_mem:%s' % str.strip(board)
2489
2490
Aviv Keshet74c89a92013-02-04 15:18:30 -08002491 @label_decorator('lightsensor')
Simran Basic6f1f7a2012-10-16 10:47:46 -07002492 def has_lightsensor(self):
2493 """Determine the correct board label for this host.
2494
2495 @returns the string 'lightsensor' if this host has a lightsensor or
2496 None if it does not.
2497 """
2498 search_cmd = "find -L %s -maxdepth 4 | egrep '%s'" % (
Richard Barnette82c35912012-11-20 10:09:10 -08002499 self._LIGHTSENSOR_SEARCH_DIR, '|'.join(self._LIGHTSENSOR_FILES))
Simran Basic6f1f7a2012-10-16 10:47:46 -07002500 try:
2501 # Run the search cmd following the symlinks. Stderr_tee is set to
2502 # None as there can be a symlink loop, but the command will still
2503 # execute correctly with a few messages printed to stderr.
2504 self.run(search_cmd, stdout_tee=None, stderr_tee=None)
2505 return 'lightsensor'
2506 except error.AutoservRunError:
2507 # egrep exited with a return code of 1 meaning none of the possible
2508 # lightsensor files existed.
2509 return None
2510
2511
Aviv Keshet74c89a92013-02-04 15:18:30 -08002512 @label_decorator('bluetooth')
Simran Basic6f1f7a2012-10-16 10:47:46 -07002513 def has_bluetooth(self):
2514 """Determine the correct board label for this host.
2515
2516 @returns the string 'bluetooth' if this host has bluetooth or
2517 None if it does not.
2518 """
2519 try:
2520 self.run('test -d /sys/class/bluetooth/hci0')
2521 # test exited with a return code of 0.
2522 return 'bluetooth'
2523 except error.AutoservRunError:
2524 # test exited with a return code 1 meaning the directory did not
2525 # exist.
2526 return None
2527
2528
Ilja H. Friedel1232e8a2014-06-17 21:30:48 -07002529 @label_decorator('gpu_family')
2530 def get_gpu_family(self):
2531 """
2532 Determine GPU family.
2533
2534 @returns a string representing the gpu family. Examples are mali, tegra,
2535 pinetrail, sandybridge, ivybridge, haswell and baytrail.
2536 """
2537 gpu_family = self.run(self.poor_mans_rpc('get_gpu_family()')).stdout
2538 return 'gpu_family:%s' % str.strip(gpu_family)
2539
2540
Ilja Friedel0ce0b602013-08-15 18:45:27 -07002541 @label_decorator('graphics')
2542 def get_graphics(self):
2543 """
2544 Determine the correct board label for this host.
2545
2546 @returns a string representing this host's graphics. For now ARM boards
2547 return graphics:gles while all other boards return graphics:gl. This
2548 may change over time, but for robustness reasons this should avoid
2549 executing code in actual graphics libraries (which may not be ready and
2550 is tested by graphics_GLAPICheck).
2551 """
2552 uname = self.run('uname -a').stdout.lower()
2553 if 'arm' in uname:
2554 return 'graphics:gles'
2555 return 'graphics:gl'
2556
2557
Bill Richardson4f595f52014-02-13 16:20:26 -08002558 @label_decorator('ec')
2559 def get_ec(self):
2560 """
2561 Determine the type of EC on this host.
2562
2563 @returns a string representing this host's embedded controller type.
2564 At present, it only returns "ec:cros", for Chrome OS ECs. Other types
2565 of EC (or none) don't return any strings, since no tests depend on
2566 those.
2567 """
2568 cmd = 'mosys ec info'
2569 # The output should look like these, so that the last field should
2570 # match our EC version scheme:
2571 #
2572 # stm | stm32f100 | snow_v1.3.139-375eb9f
2573 # ti | Unknown-10de | peppy_v1.5.114-5d52788
2574 #
2575 # Non-Chrome OS ECs will look like these:
2576 #
2577 # ENE | KB932 | 00BE107A00
2578 # ite | it8518 | 3.08
2579 #
2580 # And some systems don't have ECs at all (Lumpy, for example).
2581 regexp = r'^.*\|\s*(\S+_v\d+\.\d+\.\d+-[0-9a-f]+)\s*$'
2582
2583 ecinfo = self.run(command=cmd, ignore_status=True)
2584 if ecinfo.exit_status == 0:
2585 res = re.search(regexp, ecinfo.stdout)
2586 if res:
2587 logging.info("EC version is %s", res.groups()[0])
2588 return 'ec:cros'
2589 logging.info("%s got: %s", cmd, ecinfo.stdout)
2590 # Has an EC, but it's not a Chrome OS EC
2591 return None
2592 logging.info("%s exited with status %d", cmd, ecinfo.exit_status)
2593 # No EC present
2594 return None
2595
2596
Alec Berg31b932b2014-04-04 16:09:11 -07002597 @label_decorator('accels')
2598 def get_accels(self):
2599 """
2600 Determine the type of accelerometers on this host.
2601
2602 @returns a string representing this host's accelerometer type.
2603 At present, it only returns "accel:cros-ec", for accelerometers
2604 attached to a Chrome OS EC, or none, if no accelerometers.
2605 """
2606 # Check to make sure we have ectool
2607 rv = self.run('which ectool', ignore_status=True)
2608 if rv.exit_status:
2609 logging.info("No ectool cmd found, assuming no EC accelerometers")
2610 return None
2611
2612 # Check that the EC supports the motionsense command
2613 rv = self.run('ectool motionsense', ignore_status=True)
2614 if rv.exit_status:
2615 logging.info("EC does not support motionsense command "
2616 "assuming no EC accelerometers")
2617 return None
2618
2619 # Check that EC motion sensors are active
2620 active = self.run('ectool motionsense active').stdout.split('\n')
2621 if active[0] == "0":
2622 logging.info("Motion sense inactive, assuming no EC accelerometers")
2623 return None
2624
2625 logging.info("EC accelerometers found")
2626 return 'accel:cros-ec'
2627
2628
Tom Wai-Hong Tam3d6790d2014-04-14 16:15:47 +08002629 @label_decorator('chameleon')
2630 def has_chameleon(self):
2631 """Determine if a Chameleon connected to this host.
2632
Tom Wai-Hong Tambadbb332014-10-10 02:59:41 +08002633 @returns a list containing two strings ('chameleon' and
2634 'chameleon:' + label, e.g. 'chameleon:hdmi') if this host
2635 has a Chameleon or None if it has not.
Tom Wai-Hong Tam3d6790d2014-04-14 16:15:47 +08002636 """
2637 if self._chameleon_host:
Tom Wai-Hong Tambadbb332014-10-10 02:59:41 +08002638 return ['chameleon', 'chameleon:' + self.chameleon.get_label()]
Tom Wai-Hong Tam3d6790d2014-04-14 16:15:47 +08002639 else:
2640 return None
2641
2642
Cheng-Yi Chiangf4104ff2014-12-23 19:39:01 +08002643 @label_decorator('audio_loopback_dongle')
2644 def has_loopback_dongle(self):
2645 """Determine if an audio loopback dongle is plugged to this host.
2646
2647 @returns 'audio_loopback_dongle' when there is an audio loopback dongle
2648 plugged to this host.
2649 None when there is no audio loopback dongle
2650 plugged to this host.
2651 """
Cheng-Yi Chiang8de78112015-05-27 14:47:08 +08002652 nodes_info = self.run(command=cras_utils.get_cras_nodes_cmd(),
2653 ignore_status=True).stdout
2654 if (cras_utils.node_type_is_plugged('HEADPHONE', nodes_info) and
2655 cras_utils.node_type_is_plugged('MIC', nodes_info)):
Cheng-Yi Chiangf4104ff2014-12-23 19:39:01 +08002656 return 'audio_loopback_dongle'
2657 else:
2658 return None
2659
2660
Derek Basehorec71ff622014-07-07 15:18:40 -07002661 @label_decorator('power_supply')
2662 def get_power_supply(self):
2663 """
2664 Determine what type of power supply the host has
2665
2666 @returns a string representing this host's power supply.
2667 'power:battery' when the device has a battery intended for
2668 extended use
2669 'power:AC_primary' when the device has a battery not intended
2670 for extended use (for moving the machine, etc)
2671 'power:AC_only' when the device has no battery at all.
2672 """
2673 psu = self.run(command='mosys psu type', ignore_status=True)
2674 if psu.exit_status:
2675 # The psu command for mosys is not included for all platforms. The
2676 # assumption is that the device will have a battery if the command
2677 # is not found.
2678 return 'power:battery'
2679
2680 psu_str = psu.stdout.strip()
2681 if psu_str == 'unknown':
2682 return None
2683
2684 return 'power:%s' % psu_str
2685
2686
Puthikorn Voravootivatfa011242014-03-14 18:45:11 -07002687 @label_decorator('storage')
2688 def get_storage(self):
2689 """
2690 Determine the type of boot device for this host.
2691
2692 Determine if the internal device is SCSI or dw_mmc device.
2693 Then check that it is SSD or HDD or eMMC or something else.
2694
2695 @returns a string representing this host's internal device type.
2696 'storage:ssd' when internal device is solid state drive
2697 'storage:hdd' when internal device is hard disk drive
2698 'storage:mmc' when internal device is mmc drive
2699 None When internal device is something else or
2700 when we are unable to determine the type
2701 """
2702 # The output should be /dev/mmcblk* for SD/eMMC or /dev/sd* for scsi
2703 rootdev_cmd = ' '.join(['. /usr/sbin/write_gpt.sh;',
2704 '. /usr/share/misc/chromeos-common.sh;',
2705 'load_base_vars;',
2706 'get_fixed_dst_drive'])
Puthikorn Voravootivat03c51682014-04-24 13:52:12 -07002707 rootdev = self.run(command=rootdev_cmd, ignore_status=True)
2708 if rootdev.exit_status:
2709 logging.info("Fail to run %s", rootdev_cmd)
2710 return None
Puthikorn Voravootivatfa011242014-03-14 18:45:11 -07002711 rootdev_str = rootdev.stdout.strip()
2712
2713 if not rootdev_str:
2714 return None
2715
2716 rootdev_base = os.path.basename(rootdev_str)
2717
2718 mmc_pattern = '/dev/mmcblk[0-9]'
2719 if re.match(mmc_pattern, rootdev_str):
2720 # Use type to determine if the internal device is eMMC or somthing
2721 # else. We can assume that MMC is always an internal device.
2722 type_cmd = 'cat /sys/block/%s/device/type' % rootdev_base
Puthikorn Voravootivat03c51682014-04-24 13:52:12 -07002723 type = self.run(command=type_cmd, ignore_status=True)
2724 if type.exit_status:
2725 logging.info("Fail to run %s", type_cmd)
2726 return None
Puthikorn Voravootivatfa011242014-03-14 18:45:11 -07002727 type_str = type.stdout.strip()
2728
2729 if type_str == 'MMC':
2730 return 'storage:mmc'
2731
2732 scsi_pattern = '/dev/sd[a-z]+'
2733 if re.match(scsi_pattern, rootdev.stdout):
2734 # Read symlink for /sys/block/sd* to determine if the internal
2735 # device is connected via ata or usb.
2736 link_cmd = 'readlink /sys/block/%s' % rootdev_base
Puthikorn Voravootivat03c51682014-04-24 13:52:12 -07002737 link = self.run(command=link_cmd, ignore_status=True)
2738 if link.exit_status:
2739 logging.info("Fail to run %s", link_cmd)
2740 return None
Puthikorn Voravootivatfa011242014-03-14 18:45:11 -07002741 link_str = link.stdout.strip()
2742 if 'usb' in link_str:
2743 return None
2744
2745 # Read rotation to determine if the internal device is ssd or hdd.
2746 rotate_cmd = str('cat /sys/block/%s/queue/rotational'
2747 % rootdev_base)
Puthikorn Voravootivat03c51682014-04-24 13:52:12 -07002748 rotate = self.run(command=rotate_cmd, ignore_status=True)
2749 if rotate.exit_status:
2750 logging.info("Fail to run %s", rotate_cmd)
2751 return None
Puthikorn Voravootivatfa011242014-03-14 18:45:11 -07002752 rotate_str = rotate.stdout.strip()
2753
2754 rotate_dict = {'0':'storage:ssd', '1':'storage:hdd'}
2755 return rotate_dict.get(rotate_str)
2756
2757 # All other internal device / error case will always fall here
2758 return None
2759
2760
Dan Shi4e9a2aa2014-03-24 14:28:42 -07002761 @label_decorator('servo')
2762 def get_servo(self):
2763 """Determine if the host has a servo attached.
2764
2765 If the host has a working servo attached, it should have a servo label.
2766
2767 @return: string 'servo' if the host has servo attached. Otherwise,
2768 returns None.
2769 """
2770 return 'servo' if self._servo_host else None
2771
2772
Dan Shi5beba472014-05-28 22:46:07 -07002773 @label_decorator('video_labels')
2774 def get_video_labels(self):
2775 """Run /usr/local/bin/avtest_label_detect to get a list of video labels.
2776
2777 Sample output of avtest_label_detect:
2778 Detected label: hw_video_acc_vp8
2779 Detected label: webcam
2780
2781 @return: A list of labels detected by tool avtest_label_detect.
2782 """
2783 try:
2784 result = self.run('/usr/local/bin/avtest_label_detect').stdout
2785 return re.findall('^Detected label: (\w+)$', result, re.M)
2786 except error.AutoservRunError:
2787 # The tool is not installed.
2788 return []
2789
2790
mussa584b4462014-06-20 15:13:28 -07002791 @label_decorator('video_glitch_detection')
2792 def is_video_glitch_detection_supported(self):
2793 """ Determine if a board under test is supported for video glitch
2794 detection tests.
2795
2796 @return: 'video_glitch_detection' if board is supported, None otherwise.
2797 """
2798 parser = ConfigParser.SafeConfigParser()
2799 filename = os.path.join(
2800 common.autotest_dir, 'client/cros/video/device_spec.conf')
2801
2802 dut = self.get_board().replace(ds_constants.BOARD_PREFIX, '')
2803
2804 try:
2805 parser.read(filename)
mussa584b4462014-06-20 15:13:28 -07002806 supported_boards = parser.sections()
2807
Mussa83c84d62014-10-02 12:11:28 -07002808 return 'video_glitch_detection' if dut in supported_boards else None
mussa584b4462014-06-20 15:13:28 -07002809
2810 except ConfigParser.error:
2811 # something went wrong while parsing the conf file
2812 return None
2813
Katherine Threlkeld7b97a9f2014-06-24 13:47:14 -07002814 @label_decorator('touch_labels')
2815 def get_touch(self):
2816 """
2817 Determine whether board under test has a touchpad or touchscreen.
2818
2819 @return: A list of some combination of 'touchscreen' and 'touchpad',
2820 depending on what is present on the device.
Katherine Threlkeldab83d392015-06-18 16:45:57 -07002821
Katherine Threlkeld7b97a9f2014-06-24 13:47:14 -07002822 """
2823 labels = []
Katherine Threlkeldab83d392015-06-18 16:45:57 -07002824 looking_for = ['touchpad', 'touchscreen']
2825 player = input_playback.InputPlayback()
2826 input_events = self.run('ls /dev/input/event*').stdout.strip().split()
2827 filename = '/tmp/touch_labels'
2828 for event in input_events:
2829 self.run('evtest %s > %s' % (event, filename), timeout=1,
2830 ignore_timeout=True)
2831 properties = self.run('cat %s' % filename).stdout
2832 input_type = player._determine_input_type(properties)
2833 if input_type in looking_for:
2834 labels.append(input_type)
2835 looking_for.remove(input_type)
2836 if len(looking_for) == 0:
2837 break
2838 self.run('rm %s' % filename)
2839
Katherine Threlkeld7b97a9f2014-06-24 13:47:14 -07002840 return labels
2841
Hung-ying Tyana39b0542015-06-30 10:36:42 +08002842
2843 @label_decorator('internal_display')
2844 def has_internal_display(self):
2845 """Determine if the device under test is equipped with an internal
2846 display.
2847
2848 @return: 'internal_display' if one is present; None otherwise.
2849 """
2850 from autotest_lib.client.cros.graphics import graphics_utils
2851 from autotest_lib.client.common_lib import utils as common_utils
2852
2853 def __system_output(cmd):
2854 return self.run(cmd).stdout
2855
2856 def __read_file(remote_path):
2857 return self.run('cat %s' % remote_path).stdout
2858
2859 # Hijack the necessary client functions so that we can take advantage
2860 # of the client lib here.
2861 # FIXME: find a less hacky way than this
2862 original_system_output = utils.system_output
2863 original_read_file = common_utils.read_file
2864 utils.system_output = __system_output
2865 common_utils.read_file = __read_file
2866 try:
2867 return ('internal_display' if graphics_utils.has_internal_display()
2868 else None)
2869 finally:
2870 utils.system_output = original_system_output
2871 common_utils.read_file = original_read_file
2872
2873
Eric Carusoee673ac2015-08-05 17:03:04 -07002874 @label_decorator('lucidsleep')
2875 def has_lucid_sleep_support(self):
2876 """Determine if the device under test has support for lucid sleep.
2877
2878 @return 'lucidsleep' if this board supports lucid sleep; None otherwise
2879 """
2880 board = self.get_board().replace(ds_constants.BOARD_PREFIX, '')
2881 return 'lucidsleep' if board in LUCID_SLEEP_BOARDS else None
2882
2883
Simran Basic6f1f7a2012-10-16 10:47:46 -07002884 def get_labels(self):
2885 """Return a list of labels for this given host.
2886
2887 This is the main way to retrieve all the automatic labels for a host
2888 as it will run through all the currently implemented label functions.
2889 """
2890 labels = []
Richard Barnette82c35912012-11-20 10:09:10 -08002891 for label_function in self._LABEL_FUNCTIONS:
J. Richard Barnetteb869b222014-09-03 17:55:44 -07002892 try:
2893 label = label_function(self)
2894 except Exception as e:
2895 logging.error('Label function %s failed; ignoring it.',
2896 label_function.__name__)
2897 logging.exception(e)
2898 label = None
Simran Basic6f1f7a2012-10-16 10:47:46 -07002899 if label:
Dan Shi5beba472014-05-28 22:46:07 -07002900 if type(label) is str:
2901 labels.append(label)
2902 elif type(label) is list:
2903 labels.extend(label)
Simran Basic6f1f7a2012-10-16 10:47:46 -07002904 return labels
Dan Shi85276d42014-04-08 22:11:45 -07002905
2906
2907 def is_boot_from_usb(self):
2908 """Check if DUT is boot from USB.
2909
2910 @return: True if DUT is boot from usb.
2911 """
2912 device = self.run('rootdev -s -d').stdout.strip()
2913 removable = int(self.run('cat /sys/block/%s/removable' %
2914 os.path.basename(device)).stdout.strip())
2915 return removable == 1
Helen Zhang17dae2b2014-11-11 09:25:52 -08002916
2917
2918 def read_from_meminfo(self, key):
Dan Shi49ca0932014-11-14 11:22:27 -08002919 """Return the memory info from /proc/meminfo
Helen Zhang17dae2b2014-11-11 09:25:52 -08002920
2921 @param key: meminfo requested
2922
2923 @return the memory value as a string
2924
2925 """
Helen Zhang17dae2b2014-11-11 09:25:52 -08002926 meminfo = self.run('grep %s /proc/meminfo' % key).stdout.strip()
2927 logging.debug('%s', meminfo)
2928 return int(re.search(r'\d+', meminfo).group(0))
Rohit Makasana8a4923c2015-08-13 17:04:26 -07002929
2930
2931 def get_board_type(self):
2932 """
2933 Get the DUT's device type from /etc/lsb-release.
Danny Chan471a8d12015-08-18 14:57:41 -07002934 DEVICETYPE can be one of CHROMEBOX, CHROMEBASE, CHROMEBOOK or more.
2935
2936 @return value of DEVICETYPE param from lsb-release.
Rohit Makasana8a4923c2015-08-13 17:04:26 -07002937 """
Danny Chan471a8d12015-08-18 14:57:41 -07002938 device_type = self.run('grep DEVICETYPE /etc/lsb-release',
2939 ignore_status=True).stdout
2940 if device_type:
Kalin Stoyanov524310b2015-08-21 16:24:04 -07002941 return device_type.split('=')[-1].strip()
Danny Chan471a8d12015-08-18 14:57:41 -07002942 return ''