blob: 3ef2feb31d4d8fd5ccb0c5994f43580d1a02ed1d [file] [log] [blame]
J. Richard Barnette24adbf42012-04-11 15:04:53 -07001# Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
Dale Curtisaa5eedb2011-08-23 16:18:52 -07002# Use of this source code is governed by a BSD-style license that can be
3# found in the LICENSE file.
4
Aviv Keshet74c89a92013-02-04 15:18:30 -08005import functools
Darren Krahn0bd18e82015-10-28 23:30:46 +00006import json
J. Richard Barnette1d78b012012-05-15 13:56:30 -07007import logging
Dan Shi0f466e82013-02-22 15:44:58 -08008import os
Simran Basid5e5e272012-09-24 15:23:59 -07009import re
J. Richard Barnette134ec2c2012-04-25 12:59:37 -070010import time
11
mussa584b4462014-06-20 15:13:28 -070012import common
J. Richard Barnette45e93de2012-04-11 17:24:15 -070013from autotest_lib.client.bin import utils
Dan Shi9cb0eec2014-06-03 09:04:50 -070014from autotest_lib.client.common_lib import autotemp
Richard Barnette0c73ffc2012-11-19 15:21:18 -080015from autotest_lib.client.common_lib import error
16from autotest_lib.client.common_lib import global_config
Dan Shi549fb822015-03-24 18:01:11 -070017from autotest_lib.client.common_lib import lsbrelease_utils
J. Richard Barnette45e93de2012-04-11 17:24:15 -070018from autotest_lib.client.common_lib.cros import autoupdater
Richard Barnette03a0c132012-11-05 12:40:35 -080019from autotest_lib.client.common_lib.cros import dev_server
Gabe Blackb72f4fb2015-01-20 16:47:13 -080020from autotest_lib.client.common_lib.cros.graphite import autotest_es
Gabe Black1e1c41b2015-02-04 23:55:15 -080021from autotest_lib.client.common_lib.cros.graphite import autotest_stats
Hsinyu Chaoe0b08e62015-08-11 10:50:37 +000022from autotest_lib.client.cros import constants as client_constants
J. Richard Barnette84890bd2014-02-21 11:05:47 -080023from autotest_lib.client.cros import cros_ui
Cheng-Yi Chiangf4104ff2014-12-23 19:39:01 +080024from autotest_lib.client.cros.audio import cras_utils
Katherine Threlkeldab83d392015-06-18 16:45:57 -070025from autotest_lib.client.cros.input_playback import input_playback
Mussa5b589052015-10-26 17:55:26 -070026from autotest_lib.client.cros.video import constants as video_test_constants
MK Ryu35d661e2014-09-25 17:44:10 -070027from autotest_lib.server import autoserv_parser
28from autotest_lib.server import autotest
29from autotest_lib.server import constants
30from autotest_lib.server import crashcollect
Dan Shia1ecd5c2013-06-06 11:21:31 -070031from autotest_lib.server import utils as server_utils
Dan Shi9cb0eec2014-06-03 09:04:50 -070032from autotest_lib.server.cros import provision
Scott Zawalski89c44dd2013-02-26 09:28:02 -050033from autotest_lib.server.cros.dynamic_suite import constants as ds_constants
Simran Basi5e6339a2013-03-21 11:34:32 -070034from autotest_lib.server.cros.dynamic_suite import tools, frontend_wrappers
Dan Shi9cb0eec2014-06-03 09:04:50 -070035from autotest_lib.server.cros.faft.config.config import Config as FAFTConfig
Scottfe06ed82015-11-05 17:15:01 -080036from autotest_lib.server.cros.servo import plankton
Fang Deng96667ca2013-08-01 17:46:18 -070037from autotest_lib.server.hosts import abstract_ssh
Tom Wai-Hong Tamefe1c7f2014-01-02 14:00:11 +080038from autotest_lib.server.hosts import chameleon_host
Scottfe06ed82015-11-05 17:15:01 -080039from autotest_lib.server.hosts import plankton_host
Fang Deng5d518f42013-08-02 14:04:32 -070040from autotest_lib.server.hosts import servo_host
Simran Basidcff4252012-11-20 16:13:20 -080041from autotest_lib.site_utils.rpm_control_system import rpm_client
Simran Basid5e5e272012-09-24 15:23:59 -070042
43
Dan Shib8540a52015-07-16 14:18:23 -070044CONFIG = global_config.global_config
45
Eric Carusoee673ac2015-08-05 17:03:04 -070046LUCID_SLEEP_BOARDS = ['samus', 'lulu']
47
Dan Shid07ee2e2015-09-24 14:49:25 -070048# A file to indicate provision failure and require Repair job to powerwash the
49# dut.
50PROVISION_FAILED = '/var/tmp/provision_failed'
51
beepsc87ff602013-07-31 21:53:00 -070052class FactoryImageCheckerException(error.AutoservError):
53 """Exception raised when an image is a factory image."""
54 pass
55
56
Fang Deng0ca40e22013-08-27 17:47:44 -070057class CrosHost(abstract_ssh.AbstractSSHHost):
J. Richard Barnette45e93de2012-04-11 17:24:15 -070058 """Chromium OS specific subclass of Host."""
59
60 _parser = autoserv_parser.autoserv_parser
Scott Zawalski62bacae2013-03-05 10:40:32 -050061 _AFE = frontend_wrappers.RetryingAFE(timeout_min=5, delay_sec=10)
J. Richard Barnette45e93de2012-04-11 17:24:15 -070062
Richard Barnette03a0c132012-11-05 12:40:35 -080063 # Timeout values (in seconds) associated with various Chrome OS
64 # state changes.
J. Richard Barnette134ec2c2012-04-25 12:59:37 -070065 #
Richard Barnette0c73ffc2012-11-19 15:21:18 -080066 # In general, a good rule of thumb is that the timeout can be up
67 # to twice the typical measured value on the slowest platform.
68 # The times here have not necessarily been empirically tested to
69 # meet this criterion.
J. Richard Barnetteeb69d722012-06-18 17:29:44 -070070 #
71 # SLEEP_TIMEOUT: Time to allow for suspend to memory.
Richard Barnette0c73ffc2012-11-19 15:21:18 -080072 # RESUME_TIMEOUT: Time to allow for resume after suspend, plus
73 # time to restart the netwowrk.
J. Richard Barnette84890bd2014-02-21 11:05:47 -080074 # SHUTDOWN_TIMEOUT: Time to allow for shut down.
J. Richard Barnetteeb69d722012-06-18 17:29:44 -070075 # BOOT_TIMEOUT: Time to allow for boot from power off. Among
Richard Barnette0c73ffc2012-11-19 15:21:18 -080076 # other things, this must account for the 30 second dev-mode
J. Richard Barnette417cc792015-10-01 09:56:36 -070077 # screen delay, time to start the network on the DUT, and the
78 # ssh timeout of 120 seconds.
J. Richard Barnetteeb69d722012-06-18 17:29:44 -070079 # USB_BOOT_TIMEOUT: Time to allow for boot from a USB device,
Richard Barnette0c73ffc2012-11-19 15:21:18 -080080 # including the 30 second dev-mode delay and time to start the
J. Richard Barnetted4649c62013-03-06 17:42:27 -080081 # network.
beepsf079cfb2013-09-18 17:49:51 -070082 # INSTALL_TIMEOUT: Time to allow for chromeos-install.
J. Richard Barnette84890bd2014-02-21 11:05:47 -080083 # POWERWASH_BOOT_TIMEOUT: Time to allow for a reboot that
84 # includes powerwash.
J. Richard Barnetteeb69d722012-06-18 17:29:44 -070085
86 SLEEP_TIMEOUT = 2
J. Richard Barnetted4649c62013-03-06 17:42:27 -080087 RESUME_TIMEOUT = 10
Tom Wai-Hong Tamfe005c22014-12-03 09:25:44 +080088 SHUTDOWN_TIMEOUT = 10
J. Richard Barnette417cc792015-10-01 09:56:36 -070089 BOOT_TIMEOUT = 150
J. Richard Barnette5bab5f52015-08-03 13:14:38 -070090 USB_BOOT_TIMEOUT = 300
J. Richard Barnette7817b052014-08-28 09:47:29 -070091 INSTALL_TIMEOUT = 480
Dan Shi2c88eed2013-11-12 10:18:38 -080092 POWERWASH_BOOT_TIMEOUT = 60
Chris Sosab76e0ee2013-05-22 16:55:41 -070093
Dan Shica503482015-03-30 17:23:25 -070094 # Minimum OS version that supports server side packaging. Older builds may
95 # not have server side package built or with Autotest code change to support
96 # server-side packaging.
Dan Shib8540a52015-07-16 14:18:23 -070097 MIN_VERSION_SUPPORT_SSP = CONFIG.get_config_value(
Dan Shiced09e42015-04-17 16:09:34 -070098 'AUTOSERV', 'min_version_support_ssp', type=int)
Dan Shica503482015-03-30 17:23:25 -070099
J. Richard Barnette84890bd2014-02-21 11:05:47 -0800100 # REBOOT_TIMEOUT: How long to wait for a reboot.
101 #
Chris Sosab76e0ee2013-05-22 16:55:41 -0700102 # We have a long timeout to ensure we don't flakily fail due to other
103 # issues. Shorter timeouts are vetted in platform_RebootAfterUpdate.
Simran Basi1160e2c2013-10-04 16:00:24 -0700104 # TODO(sbasi - crbug.com/276094) Restore to 5 mins once the 'host did not
105 # return from reboot' bug is solved.
106 REBOOT_TIMEOUT = 480
Chris Sosab76e0ee2013-05-22 16:55:41 -0700107
Ismail Noorbasha07fdb612013-02-14 14:13:31 -0800108 # _USB_POWER_TIMEOUT: Time to allow for USB to power toggle ON and OFF.
109 # _POWER_CYCLE_TIMEOUT: Time to allow for manual power cycle.
110 _USB_POWER_TIMEOUT = 5
111 _POWER_CYCLE_TIMEOUT = 10
112
Dan Shib8540a52015-07-16 14:18:23 -0700113 _RPM_RECOVERY_BOARDS = CONFIG.get_config_value('CROS',
Richard Barnette82c35912012-11-20 10:09:10 -0800114 'rpm_recovery_boards', type=str).split(',')
115
116 _MAX_POWER_CYCLE_ATTEMPTS = 6
117 _LAB_MACHINE_FILE = '/mnt/stateful_partition/.labmachine'
Fang Dengdeba14f2014-11-14 11:54:09 -0800118 _RPM_HOSTNAME_REGEX = ('chromeos(\d+)(-row(\d+))?-rack(\d+[a-z]*)'
119 '-host(\d+)')
Katherine Threlkeldab83d392015-06-18 16:45:57 -0700120 _LIGHTSENSOR_FILES = [ "in_illuminance0_input",
121 "in_illuminance_input",
122 "in_illuminance0_raw",
123 "in_illuminance_raw",
124 "illuminance0_input"]
Richard Barnette82c35912012-11-20 10:09:10 -0800125 _LIGHTSENSOR_SEARCH_DIR = '/sys/bus/iio/devices'
126 _LABEL_FUNCTIONS = []
Aviv Keshet74c89a92013-02-04 15:18:30 -0800127 _DETECTABLE_LABELS = []
Kevin Cheng3a4a57a2015-09-30 12:09:50 -0700128 label_decorator = functools.partial(server_utils.add_label_detector,
129 _LABEL_FUNCTIONS,
Aviv Keshet74c89a92013-02-04 15:18:30 -0800130 _DETECTABLE_LABELS)
J. Richard Barnette134ec2c2012-04-25 12:59:37 -0700131
J. Richard Barnetteb6de7e32013-02-14 13:28:04 -0800132 # Constants used in ping_wait_up() and ping_wait_down().
133 #
134 # _PING_WAIT_COUNT is the approximate number of polling
135 # cycles to use when waiting for a host state change.
136 #
137 # _PING_STATUS_DOWN and _PING_STATUS_UP are names used
138 # for arguments to the internal _ping_wait_for_status()
139 # method.
140 _PING_WAIT_COUNT = 40
141 _PING_STATUS_DOWN = False
142 _PING_STATUS_UP = True
143
Ismail Noorbasha07fdb612013-02-14 14:13:31 -0800144 # Allowed values for the power_method argument.
145
146 # POWER_CONTROL_RPM: Passed as default arg for power_off/on/cycle() methods.
147 # POWER_CONTROL_SERVO: Used in set_power() and power_cycle() methods.
148 # POWER_CONTROL_MANUAL: Used in set_power() and power_cycle() methods.
149 POWER_CONTROL_RPM = 'RPM'
150 POWER_CONTROL_SERVO = 'servoj10'
151 POWER_CONTROL_MANUAL = 'manual'
152
153 POWER_CONTROL_VALID_ARGS = (POWER_CONTROL_RPM,
154 POWER_CONTROL_SERVO,
155 POWER_CONTROL_MANUAL)
Richard Barnette0c73ffc2012-11-19 15:21:18 -0800156
Simran Basi5e6339a2013-03-21 11:34:32 -0700157 _RPM_OUTLET_CHANGED = 'outlet_changed'
158
Dan Shi9cb0eec2014-06-03 09:04:50 -0700159 # URL pattern to download firmware image.
Dan Shib8540a52015-07-16 14:18:23 -0700160 _FW_IMAGE_URL_PATTERN = CONFIG.get_config_value(
Dan Shi9cb0eec2014-06-03 09:04:50 -0700161 'CROS', 'firmware_url_pattern', type=str)
beeps687243d2013-07-18 15:29:27 -0700162
MK Ryu35d661e2014-09-25 17:44:10 -0700163 # File that has a list of directories to be collected
164 _LOGS_TO_COLLECT_FILE = os.path.join(
165 common.client_dir, 'common_lib', 'logs_to_collect')
166
167 # Prefix of logging message w.r.t. crash collection
168 _CRASHLOGS_PREFIX = 'collect_crashlogs'
169
170 # Time duration waiting for host up/down check
171 _CHECK_HOST_UP_TIMEOUT_SECS = 15
172
173 # A command that interacts with kernel and hardware (e.g., rm, mkdir, etc)
174 # might not be completely done deep through the hardware when the machine
175 # is powered down right after the command returns.
176 # We should wait for a few seconds to make them done. Finger crossed.
177 _SAFE_WAIT_SECS = 10
178
179
J. Richard Barnette964fba02012-10-24 17:34:29 -0700180 @staticmethod
beeps46dadc92013-11-07 14:07:10 -0800181 def check_host(host, timeout=10):
182 """
183 Check if the given host is a chrome-os host.
184
185 @param host: An ssh host representing a device.
186 @param timeout: The timeout for the run command.
187
188 @return: True if the host device is chromeos.
189
beeps46dadc92013-11-07 14:07:10 -0800190 """
191 try:
Simran Basi933c8af2015-04-29 14:05:07 -0700192 result = host.run(
193 'grep -q CHROMEOS /etc/lsb-release && '
194 '! test -f /mnt/stateful_partition/.android_tester && '
195 '! grep -q moblab /etc/lsb-release',
196 ignore_status=True, timeout=timeout)
beeps46dadc92013-11-07 14:07:10 -0800197 except (error.AutoservRunError, error.AutoservSSHTimeout):
198 return False
199 return result.exit_status == 0
200
201
202 @staticmethod
Tom Wai-Hong Tamefe1c7f2014-01-02 14:00:11 +0800203 def _extract_arguments(args_dict, key_subset):
204 """Extract options from `args_dict` and return a subset result.
J. Richard Barnette7214e0b2013-02-06 15:20:49 -0800205
206 Take the provided dictionary of argument options and return
Tom Wai-Hong Tamefe1c7f2014-01-02 14:00:11 +0800207 a subset that represent standard arguments needed to construct
208 a test-assistant object (chameleon or servo) for a host. The
209 intent is to provide standard argument processing from
Christopher Wiley644ef3e2015-05-15 13:14:14 -0700210 CrosHost for tests that require a test-assistant board
Tom Wai-Hong Tamefe1c7f2014-01-02 14:00:11 +0800211 to operate.
212
213 @param args_dict Dictionary from which to extract the arguments.
214 @param key_subset Tuple of keys to extract from the args_dict, e.g.
215 ('servo_host', 'servo_port').
216 """
217 result = {}
218 for arg in key_subset:
219 if arg in args_dict:
220 result[arg] = args_dict[arg]
221 return result
222
223
224 @staticmethod
225 def get_chameleon_arguments(args_dict):
226 """Extract chameleon options from `args_dict` and return the result.
227
228 Recommended usage:
229 ~~~~~~~~
230 args_dict = utils.args_to_dict(args)
231 chameleon_args = hosts.CrosHost.get_chameleon_arguments(args_dict)
232 host = hosts.create_host(machine, chameleon_args=chameleon_args)
233 ~~~~~~~~
234
235 @param args_dict Dictionary from which to extract the chameleon
236 arguments.
237 """
238 return CrosHost._extract_arguments(
239 args_dict, ('chameleon_host', 'chameleon_port'))
240
241
242 @staticmethod
Scottfe06ed82015-11-05 17:15:01 -0800243 def get_plankton_arguments(args_dict):
244 """Extract chameleon options from `args_dict` and return the result.
245
246 Recommended usage:
247 ~~~~~~~~
248 args_dict = utils.args_to_dict(args)
249 plankon_args = hosts.CrosHost.get_plankton_arguments(args_dict)
250 host = hosts.create_host(machine, plankton_args=polankton_args)
251 ~~~~~~~~
252
253 @param args_dict Dictionary from which to extract the plankton
254 arguments.
255 """
256 args = CrosHost._extract_arguments(
257 args_dict, ('plankton_host', 'plankton_port'))
258 return args
259
260
261 @staticmethod
Tom Wai-Hong Tamefe1c7f2014-01-02 14:00:11 +0800262 def get_servo_arguments(args_dict):
263 """Extract servo options from `args_dict` and return the result.
J. Richard Barnette7214e0b2013-02-06 15:20:49 -0800264
265 Recommended usage:
266 ~~~~~~~~
267 args_dict = utils.args_to_dict(args)
Fang Deng0ca40e22013-08-27 17:47:44 -0700268 servo_args = hosts.CrosHost.get_servo_arguments(args_dict)
J. Richard Barnette7214e0b2013-02-06 15:20:49 -0800269 host = hosts.create_host(machine, servo_args=servo_args)
270 ~~~~~~~~
271
272 @param args_dict Dictionary from which to extract the servo
273 arguments.
274 """
Tom Wai-Hong Tamefe1c7f2014-01-02 14:00:11 +0800275 return CrosHost._extract_arguments(
276 args_dict, ('servo_host', 'servo_port'))
J. Richard Barnette134ec2c2012-04-25 12:59:37 -0700277
J. Richard Barnette964fba02012-10-24 17:34:29 -0700278
Scottfe06ed82015-11-05 17:15:01 -0800279 def _initialize(self, hostname, chameleon_args=None, servo_args=None, plankton_args=None,
Fang Denge545abb2014-12-30 18:43:47 -0800280 try_lab_servo=False, ssh_verbosity_flag='', ssh_options='',
Fang Dengd1c2b732013-08-20 12:59:46 -0700281 *args, **dargs):
Tom Wai-Hong Tamefe1c7f2014-01-02 14:00:11 +0800282 """Initialize superclasses, |self.chameleon|, and |self.servo|.
J. Richard Barnette67ccb872012-04-19 16:34:56 -0700283
Fang Denge545abb2014-12-30 18:43:47 -0800284 This method will attempt to create the test-assistant object
285 (chameleon/servo) when it is needed by the test. Check
286 the docstring of chameleon_host.create_chameleon_host and
287 servo_host.create_servo_host for how this is determined.
Fang Deng5d518f42013-08-02 14:04:32 -0700288
Fang Denge545abb2014-12-30 18:43:47 -0800289 @param hostname: Hostname of the dut.
290 @param chameleon_args: A dictionary that contains args for creating
291 a ChameleonHost. See chameleon_host for details.
292 @param servo_args: A dictionary that contains args for creating
293 a ServoHost object. See servo_host for details.
294 @param try_lab_servo: Boolean, False indicates that ServoHost should
295 not be created for a device in Cros test lab.
296 See servo_host for details.
297 @param ssh_verbosity_flag: String, to pass to the ssh command to control
298 verbosity.
299 @param ssh_options: String, other ssh options to pass to the ssh
300 command.
J. Richard Barnette67ccb872012-04-19 16:34:56 -0700301 """
Fang Deng0ca40e22013-08-27 17:47:44 -0700302 super(CrosHost, self)._initialize(hostname=hostname,
J. Richard Barnette45e93de2012-04-11 17:24:15 -0700303 *args, **dargs)
J. Richard Barnettef0859852012-08-20 14:55:50 -0700304 # self.env is a dictionary of environment variable settings
305 # to be exported for commands run on the host.
306 # LIBC_FATAL_STDERR_ can be useful for diagnosing certain
307 # errors that might happen.
308 self.env['LIBC_FATAL_STDERR_'] = '1'
Fang Dengd1c2b732013-08-20 12:59:46 -0700309 self._ssh_verbosity_flag = ssh_verbosity_flag
Aviv Keshetc5947fa2013-09-04 14:06:29 -0700310 self._ssh_options = ssh_options
Fang Deng5d518f42013-08-02 14:04:32 -0700311 # TODO(fdeng): We need to simplify the
312 # process of servo and servo_host initialization.
313 # crbug.com/298432
Fang Denge545abb2014-12-30 18:43:47 -0800314 self._servo_host = servo_host.create_servo_host(
315 dut=self.hostname, servo_args=servo_args,
316 try_lab_servo=try_lab_servo)
Tom Wai-Hong Tamefe1c7f2014-01-02 14:00:11 +0800317 # TODO(waihong): Do the simplication on Chameleon too.
Tom Wai-Hong Tam3d6790d2014-04-14 16:15:47 +0800318 self._chameleon_host = chameleon_host.create_chameleon_host(
319 dut=self.hostname, chameleon_args=chameleon_args)
Scottfe06ed82015-11-05 17:15:01 -0800320 # Add plankton host if plankton args were added on command line
321 self._plankton_host = plankton_host.create_plankton_host(plankton_args)
Tom Wai-Hong Tam3d6790d2014-04-14 16:15:47 +0800322
Dan Shi4d478522014-02-14 13:46:32 -0800323 if self._servo_host is not None:
324 self.servo = self._servo_host.get_servo()
325 else:
326 self.servo = None
327
Tom Wai-Hong Tam3d6790d2014-04-14 16:15:47 +0800328 if self._chameleon_host:
Tom Wai-Hong Tameaee3402014-01-22 08:52:10 +0800329 self.chameleon = self._chameleon_host.create_chameleon_board()
Tom Wai-Hong Tamefe1c7f2014-01-02 14:00:11 +0800330 else:
Tom Wai-Hong Tam3d6790d2014-04-14 16:15:47 +0800331 self.chameleon = None
Fang Deng5d518f42013-08-02 14:04:32 -0700332
Scottfe06ed82015-11-05 17:15:01 -0800333 if self._plankton_host:
334 self.plankton_servo = self._plankton_host.get_servo()
335 logging.info('plankton_servo: %r', self.plankton_servo)
336 # Create the plankton object used to access the ec uart
Scott07a848f2016-01-12 15:04:52 -0800337 self.plankton = plankton.Plankton(self.plankton_servo,
338 self._plankton_host.get_servod_server_proxy())
Scottfe06ed82015-11-05 17:15:01 -0800339 else:
Scott07a848f2016-01-12 15:04:52 -0800340 self.plankton = None
Scottfe06ed82015-11-05 17:15:01 -0800341
Fang Deng5d518f42013-08-02 14:04:32 -0700342
Dan Shi3d7a0e12015-10-12 11:55:45 -0700343 def get_repair_image_name(self, image_type='cros'):
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500344 """Generate a image_name from variables in the global config.
345
Dan Shi3d7a0e12015-10-12 11:55:45 -0700346 image_type is used to differentiate different images. Default is CrOS,
347 in which case, repair image's name follows the naming convention defined
348 in global setting CROS/stable_build_pattern.
349 If the image_type is not `cros`, the repair image will be looked up
350 using key `board_name/image_type`, e.g., daisy_spring/firmware.
351
352 @param image_type: Type of the image. Default is `cros`.
353
Dan Shi08173202015-11-12 13:08:45 -0800354 @returns a str of $board-version/$BUILD. Returns None if stable version
355 for the board and the default are both not set, e.g., stable
356 firmware version for a new board.
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500357
358 """
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500359 board = self._get_board_from_afe()
360 if board is None:
361 raise error.AutoservError('DUT has no board attribute, '
362 'cannot be repaired.')
Dan Shi3d7a0e12015-10-12 11:55:45 -0700363 if image_type != 'cros':
364 board = '%s/%s' % (board, image_type)
Dan Shi6964fa52014-12-18 11:04:27 -0800365 stable_version = self._AFE.run('get_stable_version', board=board)
Dan Shi3d7a0e12015-10-12 11:55:45 -0700366 if image_type == 'cros':
367 build_pattern = CONFIG.get_config_value(
368 'CROS', 'stable_build_pattern')
369 stable_version = build_pattern % (board, stable_version)
Dan Shi08173202015-11-12 13:08:45 -0800370 elif image_type == 'firmware':
371 # If firmware stable version is not specified, `stable_version`
372 # from the RPC is the default stable version for CrOS image.
373 # firmware stable version must be from firmware branch, thus its
374 # value must be like board-firmware/R31-1234.0.0. Check if
375 # firmware exists in the stable version, if not, return None.
376 if 'firmware' not in stable_version:
377 return None
Dan Shi3d7a0e12015-10-12 11:55:45 -0700378 return stable_version
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500379
380
Scott Zawalski62bacae2013-03-05 10:40:32 -0500381 def _host_in_AFE(self):
382 """Check if the host is an object the AFE knows.
383
384 @returns the host object.
385 """
386 return self._AFE.get_hosts(hostname=self.hostname)
387
388
Chris Sosab76e0ee2013-05-22 16:55:41 -0700389 def lookup_job_repo_url(self):
390 """Looks up the job_repo_url for the host.
391
392 @returns job_repo_url from AFE or None if not found.
393
394 @raises KeyError if the host does not have a job_repo_url
395 """
Chris Sosab76e0ee2013-05-22 16:55:41 -0700396 hosts = self._AFE.get_hosts(hostname=self.hostname)
beepsb5efc532013-06-04 11:29:34 -0700397 if hosts and ds_constants.JOB_REPO_URL in hosts[0].attributes:
398 return hosts[0].attributes[ds_constants.JOB_REPO_URL]
J. Richard Barnette85d0aac2015-08-20 10:34:39 -0700399 else:
400 return None
Chris Sosab76e0ee2013-05-22 16:55:41 -0700401
402
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500403 def clear_cros_version_labels_and_job_repo_url(self):
404 """Clear cros_version labels and host attribute job_repo_url."""
Scott Zawalski62bacae2013-03-05 10:40:32 -0500405 if not self._host_in_AFE():
Scott Zawalskieadbf702013-03-14 09:23:06 -0400406 return
407
Scott Zawalski62bacae2013-03-05 10:40:32 -0500408 host_list = [self.hostname]
409 labels = self._AFE.get_labels(
410 name__startswith=ds_constants.VERSION_PREFIX,
411 host__hostname=self.hostname)
Dan Shi0f466e82013-02-22 15:44:58 -0800412
Scott Zawalski62bacae2013-03-05 10:40:32 -0500413 for label in labels:
414 label.remove_hosts(hosts=host_list)
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500415
beepscb6f1e22013-06-28 19:14:10 -0700416 self.update_job_repo_url(None, None)
417
418
419 def update_job_repo_url(self, devserver_url, image_name):
420 """
421 Updates the job_repo_url host attribute and asserts it's value.
422
423 @param devserver_url: The devserver to use in the job_repo_url.
424 @param image_name: The name of the image to use in the job_repo_url.
425
426 @raises AutoservError: If we failed to update the job_repo_url.
427 """
428 repo_url = None
429 if devserver_url and image_name:
430 repo_url = tools.get_package_url(devserver_url, image_name)
431 self._AFE.set_host_attribute(ds_constants.JOB_REPO_URL, repo_url,
Scott Zawalski62bacae2013-03-05 10:40:32 -0500432 hostname=self.hostname)
beepscb6f1e22013-06-28 19:14:10 -0700433 if self.lookup_job_repo_url() != repo_url:
434 raise error.AutoservError('Failed to update job_repo_url with %s, '
435 'host %s' % (repo_url, self.hostname))
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500436
437
Dan Shie9309262013-06-19 22:50:21 -0700438 def add_cros_version_labels_and_job_repo_url(self, image_name):
Scott Zawalskieadbf702013-03-14 09:23:06 -0400439 """Add cros_version labels and host attribute job_repo_url.
440
441 @param image_name: The name of the image e.g.
442 lumpy-release/R27-3837.0.0
Dan Shi7458bf62013-06-10 12:50:16 -0700443
Scott Zawalskieadbf702013-03-14 09:23:06 -0400444 """
Scott Zawalski62bacae2013-03-05 10:40:32 -0500445 if not self._host_in_AFE():
Scott Zawalskieadbf702013-03-14 09:23:06 -0400446 return
Scott Zawalski62bacae2013-03-05 10:40:32 -0500447
Scott Zawalskieadbf702013-03-14 09:23:06 -0400448 cros_label = '%s%s' % (ds_constants.VERSION_PREFIX, image_name)
Dan Shi216389c2015-12-22 11:03:06 -0800449 devserver_url = dev_server.ImageServer.resolve(image_name,
450 self.hostname).url()
Scott Zawalski62bacae2013-03-05 10:40:32 -0500451
MK Ryufb5e3a82015-07-01 12:21:20 -0700452 self._AFE.run('label_add_hosts', id=cros_label, hosts=[self.hostname])
beepscb6f1e22013-06-28 19:14:10 -0700453 self.update_job_repo_url(devserver_url, image_name)
454
455
beepsdae65fd2013-07-26 16:24:41 -0700456 def verify_job_repo_url(self, tag=''):
beepscb6f1e22013-06-28 19:14:10 -0700457 """
458 Make sure job_repo_url of this host is valid.
459
joychen03eaad92013-06-26 09:55:21 -0700460 Eg: The job_repo_url "http://lmn.cd.ab.xyx:8080/static/\
beepscb6f1e22013-06-28 19:14:10 -0700461 lumpy-release/R29-4279.0.0/autotest/packages" claims to have the
462 autotest package for lumpy-release/R29-4279.0.0. If this isn't the case,
463 download and extract it. If the devserver embedded in the url is
464 unresponsive, update the job_repo_url of the host after staging it on
465 another devserver.
466
467 @param job_repo_url: A url pointing to the devserver where the autotest
468 package for this build should be staged.
beepsdae65fd2013-07-26 16:24:41 -0700469 @param tag: The tag from the server job, in the format
470 <job_id>-<user>/<hostname>, or <hostless> for a server job.
beepscb6f1e22013-06-28 19:14:10 -0700471
472 @raises DevServerException: If we could not resolve a devserver.
473 @raises AutoservError: If we're unable to save the new job_repo_url as
474 a result of choosing a new devserver because the old one failed to
475 respond to a health check.
beeps0c865032013-07-30 11:37:06 -0700476 @raises urllib2.URLError: If the devserver embedded in job_repo_url
477 doesn't respond within the timeout.
beepscb6f1e22013-06-28 19:14:10 -0700478 """
479 job_repo_url = self.lookup_job_repo_url()
480 if not job_repo_url:
481 logging.warning('No job repo url set on host %s', self.hostname)
482 return
483
484 logging.info('Verifying job repo url %s', job_repo_url)
485 devserver_url, image_name = tools.get_devserver_build_from_package_url(
486 job_repo_url)
487
beeps0c865032013-07-30 11:37:06 -0700488 ds = dev_server.ImageServer(devserver_url)
beepscb6f1e22013-06-28 19:14:10 -0700489
490 logging.info('Staging autotest artifacts for %s on devserver %s',
491 image_name, ds.url())
beeps687243d2013-07-18 15:29:27 -0700492
493 start_time = time.time()
Simran Basi25e7a922014-10-31 11:56:10 -0700494 ds.stage_artifacts(image_name, ['autotest_packages'])
beeps687243d2013-07-18 15:29:27 -0700495 stage_time = time.time() - start_time
496
497 # Record how much of the verification time comes from a devserver
498 # restage. If we're doing things right we should not see multiple
499 # devservers for a given board/build/branch path.
500 try:
J. Richard Barnette3cbd76b2013-11-27 12:11:25 -0800501 board, build_type, branch = server_utils.ParseBuildName(
beeps687243d2013-07-18 15:29:27 -0700502 image_name)[:3]
J. Richard Barnette3cbd76b2013-11-27 12:11:25 -0800503 except server_utils.ParseBuildNameException:
beeps687243d2013-07-18 15:29:27 -0700504 pass
505 else:
beeps0c865032013-07-30 11:37:06 -0700506 devserver = devserver_url[
Chris Sosa65425082013-10-16 13:26:22 -0700507 devserver_url.find('/') + 2:devserver_url.rfind(':')]
beeps687243d2013-07-18 15:29:27 -0700508 stats_key = {
509 'board': board,
510 'build_type': build_type,
511 'branch': branch,
beeps0c865032013-07-30 11:37:06 -0700512 'devserver': devserver.replace('.', '_'),
beeps687243d2013-07-18 15:29:27 -0700513 }
Gabe Black1e1c41b2015-02-04 23:55:15 -0800514 autotest_stats.Gauge('verify_job_repo_url').send(
beeps687243d2013-07-18 15:29:27 -0700515 '%(board)s.%(build_type)s.%(branch)s.%(devserver)s' % stats_key,
516 stage_time)
beepscb6f1e22013-06-28 19:14:10 -0700517
Scott Zawalskieadbf702013-03-14 09:23:06 -0400518
Dan Shicf4d2032015-03-12 15:04:21 -0700519 def stage_server_side_package(self, image=None):
520 """Stage autotest server-side package on devserver.
521
522 @param image: Full path of an OS image to install or a build name.
523
524 @return: A url to the autotest server-side package.
525 """
526 if image:
527 image_name = tools.get_build_from_image(image)
528 if not image_name:
529 raise error.AutoservError(
530 'Failed to parse build name from %s' % image)
531 ds = dev_server.ImageServer.resolve(image_name)
532 else:
533 job_repo_url = self.lookup_job_repo_url()
534 if job_repo_url:
535 devserver_url, image_name = (
536 tools.get_devserver_build_from_package_url(job_repo_url))
537 ds = dev_server.ImageServer(devserver_url)
538 else:
539 labels = self._AFE.get_labels(
540 name__startswith=ds_constants.VERSION_PREFIX,
541 host__hostname=self.hostname)
542 if not labels:
543 raise error.AutoservError(
544 'Failed to stage server-side package. The host has '
545 'no job_report_url attribute or version label.')
546 image_name = labels[0].name[len(ds_constants.VERSION_PREFIX):]
547 ds = dev_server.ImageServer.resolve(image_name)
Dan Shica503482015-03-30 17:23:25 -0700548
549 # Get the OS version of the build, for any build older than
550 # MIN_VERSION_SUPPORT_SSP, server side packaging is not supported.
551 match = re.match('.*/R\d+-(\d+)\.', image_name)
552 if match and int(match.group(1)) < self.MIN_VERSION_SUPPORT_SSP:
553 logging.warn('Build %s is older than %s. Server side packaging is '
554 'disabled.', image_name, self.MIN_VERSION_SUPPORT_SSP)
555 return None
556
Dan Shicf4d2032015-03-12 15:04:21 -0700557 ds.stage_artifacts(image_name, ['autotest_server_package'])
558 return '%s/static/%s/%s' % (ds.url(), image_name,
559 'autotest_server_package.tar.bz2')
560
561
Dan Shi0f466e82013-02-22 15:44:58 -0800562 def _try_stateful_update(self, update_url, force_update, updater):
563 """Try to use stateful update to initialize DUT.
564
565 When DUT is already running the same version that machine_install
566 tries to install, stateful update is a much faster way to clean up
567 the DUT for testing, compared to a full reimage. It is implemeted
568 by calling autoupdater.run_update, but skipping updating root, as
569 updating the kernel is time consuming and not necessary.
570
571 @param update_url: url of the image.
572 @param force_update: Set to True to update the image even if the DUT
573 is running the same version.
574 @param updater: ChromiumOSUpdater instance used to update the DUT.
575 @returns: True if the DUT was updated with stateful update.
576
577 """
J. Richard Barnette3f731032014-04-07 17:42:59 -0700578 # TODO(jrbarnette): Yes, I hate this re.match() test case.
579 # It's better than the alternative: see crbug.com/360944.
580 image_name = autoupdater.url_to_image_name(update_url)
581 release_pattern = r'^.*-release/R[0-9]+-[0-9]+\.[0-9]+\.0$'
582 if not re.match(release_pattern, image_name):
583 return False
Dan Shi0f466e82013-02-22 15:44:58 -0800584 if not updater.check_version():
585 return False
586 if not force_update:
587 logging.info('Canceling stateful update because the new and '
588 'old versions are the same.')
589 return False
590 # Following folders should be rebuilt after stateful update.
591 # A test file is used to confirm each folder gets rebuilt after
592 # the stateful update.
593 folders_to_check = ['/var', '/home', '/mnt/stateful_partition']
594 test_file = '.test_file_to_be_deleted'
595 for folder in folders_to_check:
596 touch_path = os.path.join(folder, test_file)
597 self.run('touch %s' % touch_path)
598
Chris Sosae92399e2015-04-24 11:32:59 -0700599 updater.run_update(update_root=False)
Dan Shi0f466e82013-02-22 15:44:58 -0800600
601 # Reboot to complete stateful update.
Chris Sosab76e0ee2013-05-22 16:55:41 -0700602 self.reboot(timeout=self.REBOOT_TIMEOUT, wait=True)
Dan Shi0f466e82013-02-22 15:44:58 -0800603 check_file_cmd = 'test -f %s; echo $?'
604 for folder in folders_to_check:
605 test_file_path = os.path.join(folder, test_file)
606 result = self.run(check_file_cmd % test_file_path,
607 ignore_status=True)
608 if result.exit_status == 1:
609 return False
610 return True
611
612
J. Richard Barnette7275b612013-06-04 18:13:11 -0700613 def _post_update_processing(self, updater, expected_kernel=None):
Dan Shi0f466e82013-02-22 15:44:58 -0800614 """After the DUT is updated, confirm machine_install succeeded.
615
616 @param updater: ChromiumOSUpdater instance used to update the DUT.
J. Richard Barnette7275b612013-06-04 18:13:11 -0700617 @param expected_kernel: kernel expected to be active after reboot,
618 or `None` to skip rollback checking.
Dan Shi0f466e82013-02-22 15:44:58 -0800619
620 """
J. Richard Barnette7275b612013-06-04 18:13:11 -0700621 # Touch the lab machine file to leave a marker that
622 # distinguishes this image from other test images.
623 # Afterwards, we must re-run the autoreboot script because
624 # it depends on the _LAB_MACHINE_FILE.
J. Richard Barnette71cc1862015-12-02 10:32:38 -0800625 autoreboot_cmd = ('FILE="%s" ; [ -f "$FILE" ] || '
626 '( touch "$FILE" ; start autoreboot )')
627 self.run(autoreboot_cmd % self._LAB_MACHINE_FILE)
Chris Sosa65425082013-10-16 13:26:22 -0700628 updater.verify_boot_expectations(
629 expected_kernel, rollback_message=
Gilad Arnoldc26ae1f2015-10-22 16:09:41 -0700630 'Build %s failed to boot on %s; system rolled back to previous '
Chris Sosa65425082013-10-16 13:26:22 -0700631 'build' % (updater.update_version, self.hostname))
J. Richard Barnette7275b612013-06-04 18:13:11 -0700632 # Check that we've got the build we meant to install.
633 if not updater.check_version_to_confirm_install():
634 raise autoupdater.ChromiumOSError(
635 'Failed to update %s to build %s; found build '
636 '%s instead' % (self.hostname,
Chris Sosa65425082013-10-16 13:26:22 -0700637 updater.update_version,
Dan Shi0942b1d2015-03-31 11:07:00 -0700638 self.get_release_version()))
Dan Shi0f466e82013-02-22 15:44:58 -0800639
Chris Sosae92399e2015-04-24 11:32:59 -0700640 logging.debug('Cleaning up old autotest directories.')
641 try:
642 installed_autodir = autotest.Autotest.get_installed_autodir(self)
643 self.run('rm -rf ' + installed_autodir)
644 except autotest.AutodirNotFoundError:
645 logging.debug('No autotest installed directory found.')
646
Dan Shi0f466e82013-02-22 15:44:58 -0800647
J. Richard Barnettee4af8b92013-05-01 13:16:12 -0700648 def _stage_image_for_update(self, image_name=None):
Chris Sosae92399e2015-04-24 11:32:59 -0700649 """Stage a build on a devserver and return the update_url and devserver.
Scott Zawalskieadbf702013-03-14 09:23:06 -0400650
651 @param image_name: a name like lumpy-release/R27-3837.0.0
Chris Sosae92399e2015-04-24 11:32:59 -0700652 @returns a tuple with an update URL like:
Scott Zawalskieadbf702013-03-14 09:23:06 -0400653 http://172.22.50.205:8082/update/lumpy-release/R27-3837.0.0
Chris Sosae92399e2015-04-24 11:32:59 -0700654 and the devserver instance.
Scott Zawalskieadbf702013-03-14 09:23:06 -0400655 """
J. Richard Barnettee4af8b92013-05-01 13:16:12 -0700656 if not image_name:
657 image_name = self.get_repair_image_name()
Chris Sosae92399e2015-04-24 11:32:59 -0700658
J. Richard Barnettee4af8b92013-05-01 13:16:12 -0700659 logging.info('Staging build for AU: %s', image_name)
Dan Shi216389c2015-12-22 11:03:06 -0800660 devserver = dev_server.ImageServer.resolve(image_name, self.hostname)
Scott Zawalskieadbf702013-03-14 09:23:06 -0400661 devserver.trigger_download(image_name, synchronous=False)
Chris Sosae92399e2015-04-24 11:32:59 -0700662 return (tools.image_url_pattern() % (devserver.url(), image_name),
663 devserver)
Scott Zawalskieadbf702013-03-14 09:23:06 -0400664
665
J. Richard Barnettee4af8b92013-05-01 13:16:12 -0700666 def stage_image_for_servo(self, image_name=None):
667 """Stage a build on a devserver and return the update_url.
668
669 @param image_name: a name like lumpy-release/R27-3837.0.0
670 @returns an update URL like:
671 http://172.22.50.205:8082/update/lumpy-release/R27-3837.0.0
672 """
673 if not image_name:
674 image_name = self.get_repair_image_name()
675 logging.info('Staging build for servo install: %s', image_name)
Dan Shi216389c2015-12-22 11:03:06 -0800676 devserver = dev_server.ImageServer.resolve(image_name, self.hostname)
J. Richard Barnettee4af8b92013-05-01 13:16:12 -0700677 devserver.stage_artifacts(image_name, ['test_image'])
678 return devserver.get_test_image_url(image_name)
679
680
beepse539be02013-07-31 21:57:39 -0700681 def stage_factory_image_for_servo(self, image_name):
682 """Stage a build on a devserver and return the update_url.
683
684 @param image_name: a name like <baord>/4262.204.0
beeps12c0a3c2013-09-03 11:58:27 -0700685
beepse539be02013-07-31 21:57:39 -0700686 @return: An update URL, eg:
687 http://<devserver>/static/canary-channel/\
688 <board>/4262.204.0/factory_test/chromiumos_factory_image.bin
beeps12c0a3c2013-09-03 11:58:27 -0700689
690 @raises: ValueError if the factory artifact name is missing from
691 the config.
692
beepse539be02013-07-31 21:57:39 -0700693 """
694 if not image_name:
695 logging.error('Need an image_name to stage a factory image.')
696 return
697
Dan Shib8540a52015-07-16 14:18:23 -0700698 factory_artifact = CONFIG.get_config_value(
beeps12c0a3c2013-09-03 11:58:27 -0700699 'CROS', 'factory_artifact', type=str, default='')
700 if not factory_artifact:
701 raise ValueError('Cannot retrieve the factory artifact name from '
702 'autotest config, and hence cannot stage factory '
703 'artifacts.')
704
beepse539be02013-07-31 21:57:39 -0700705 logging.info('Staging build for servo install: %s', image_name)
Dan Shi216389c2015-12-22 11:03:06 -0800706 devserver = dev_server.ImageServer.resolve(image_name, self.hostname)
beepse539be02013-07-31 21:57:39 -0700707 devserver.stage_artifacts(
708 image_name,
beeps12c0a3c2013-09-03 11:58:27 -0700709 [factory_artifact],
710 archive_url=None)
beepse539be02013-07-31 21:57:39 -0700711
712 return tools.factory_image_url_pattern() % (devserver.url(), image_name)
713
714
Chris Sosaa3ac2152012-05-23 22:23:13 -0700715 def machine_install(self, update_url=None, force_update=False,
Richard Barnette0b023a72015-04-24 16:07:30 +0000716 local_devserver=False, repair=False,
717 force_full_update=False):
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500718 """Install the DUT.
719
Dan Shi0f466e82013-02-22 15:44:58 -0800720 Use stateful update if the DUT is already running the same build.
721 Stateful update does not update kernel and tends to run much faster
722 than a full reimage. If the DUT is running a different build, or it
723 failed to do a stateful update, full update, including kernel update,
724 will be applied to the DUT.
725
Scott Zawalskieadbf702013-03-14 09:23:06 -0400726 Once a host enters machine_install its cros_version label will be
727 removed as well as its host attribute job_repo_url (used for
728 package install).
729
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500730 @param update_url: The url to use for the update
731 pattern: http://$devserver:###/update/$build
732 If update_url is None and repair is True we will install the
Dan Shi6964fa52014-12-18 11:04:27 -0800733 stable image listed in afe_stable_versions table. If the table
734 is not setup, global_config value under CROS.stable_cros_version
735 will be used instead.
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500736 @param force_update: Force an update even if the version installed
737 is the same. Default:False
Christopher Wiley6a4ff932015-05-15 14:00:47 -0700738 @param local_devserver: Used by test_that to allow people to
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500739 use their local devserver. Default: False
Chris Sosae92399e2015-04-24 11:32:59 -0700740 @param repair: Forces update to repair image. Implies force_update.
Fang Deng3d3b9272014-12-22 12:20:28 -0800741 @param force_full_update: If True, do not attempt to run stateful
742 update, force a full reimage. If False, try stateful update
743 first when the dut is already installed with the same version.
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500744 @raises autoupdater.ChromiumOSError
745
746 """
Chris Sosae92399e2015-04-24 11:32:59 -0700747 devserver = None
Richard Barnette0b023a72015-04-24 16:07:30 +0000748 if repair:
Chris Sosae92399e2015-04-24 11:32:59 -0700749 update_url, devserver = self._stage_image_for_update()
Richard Barnette0b023a72015-04-24 16:07:30 +0000750 force_update = True
Dan Shi0f466e82013-02-22 15:44:58 -0800751
Chris Sosae92399e2015-04-24 11:32:59 -0700752 if not update_url and not self._parser.options.image:
753 raise error.AutoservError(
Dan Shid07ee2e2015-09-24 14:49:25 -0700754 'There is no update URL, nor a method to get one.')
Chris Sosae92399e2015-04-24 11:32:59 -0700755
756 if not update_url and self._parser.options.image:
757 # This is the base case where we have no given update URL i.e.
758 # dynamic suites logic etc. This is the most flexible case where we
759 # can serve an update from any of our fleet of devservers.
760 requested_build = self._parser.options.image
761 if not requested_build.startswith('http://'):
762 logging.debug('Update will be staged for this installation')
763 update_url, devserver = self._stage_image_for_update(
Dan Shid07ee2e2015-09-24 14:49:25 -0700764 requested_build)
Chris Sosae92399e2015-04-24 11:32:59 -0700765 else:
766 update_url = requested_build
767
768 logging.debug('Update URL is %s', update_url)
769
Scott Zawalskieadbf702013-03-14 09:23:06 -0400770 # Remove cros-version and job_repo_url host attribute from host.
771 self.clear_cros_version_labels_and_job_repo_url()
Chris Sosae92399e2015-04-24 11:32:59 -0700772
Dan Shid07ee2e2015-09-24 14:49:25 -0700773 # Create a file to indicate if provision fails. The file will be removed
774 # by stateful update or full install.
775 self.run('touch %s' % PROVISION_FAILED)
776
Chris Sosae92399e2015-04-24 11:32:59 -0700777 update_complete = False
778 updater = autoupdater.ChromiumOSUpdater(
779 update_url, host=self, local_devserver=local_devserver)
Fang Deng3d3b9272014-12-22 12:20:28 -0800780 if not force_full_update:
781 try:
Chris Sosae92399e2015-04-24 11:32:59 -0700782 # If the DUT is already running the same build, try stateful
783 # update first as it's much quicker than a full re-image.
784 update_complete = self._try_stateful_update(
Dan Shid07ee2e2015-09-24 14:49:25 -0700785 update_url, force_update, updater)
Fang Deng3d3b9272014-12-22 12:20:28 -0800786 except Exception as e:
787 logging.exception(e)
J. Richard Barnette45e93de2012-04-11 17:24:15 -0700788
Dan Shi0f466e82013-02-22 15:44:58 -0800789 inactive_kernel = None
Chris Sosae92399e2015-04-24 11:32:59 -0700790 if update_complete or (not force_update and updater.check_version()):
791 logging.info('Install complete without full update')
792 else:
793 logging.info('DUT requires full update.')
794 self.reboot(timeout=self.REBOOT_TIMEOUT, wait=True)
795 num_of_attempts = provision.FLAKY_DEVSERVER_ATTEMPTS
Chris Sosab7612bc2013-03-21 10:32:37 -0700796
Chris Sosae92399e2015-04-24 11:32:59 -0700797 while num_of_attempts > 0:
798 num_of_attempts -= 1
799 try:
800 updater.run_update()
801 except Exception:
802 logging.warn('Autoupdate did not complete.')
803 # Do additional check for the devserver health. Ideally,
804 # the autoupdater.py could raise an exception when it
805 # detected network flake but that would require
806 # instrumenting the update engine and parsing it log.
807 if (num_of_attempts <= 0 or
808 devserver is None or
809 dev_server.DevServer.devserver_healthy(
810 devserver.url())):
Dan Shid07ee2e2015-09-24 14:49:25 -0700811 raise
J. Richard Barnette45e93de2012-04-11 17:24:15 -0700812
Chris Sosae92399e2015-04-24 11:32:59 -0700813 logging.warn('Devserver looks unhealthy. Trying another')
814 update_url, devserver = self._stage_image_for_update(
815 requested_build)
816 logging.debug('New Update URL is %s', update_url)
817 updater = autoupdater.ChromiumOSUpdater(
818 update_url, host=self,
819 local_devserver=local_devserver)
820 else:
821 break
J. Richard Barnette45e93de2012-04-11 17:24:15 -0700822
Chris Sosae92399e2015-04-24 11:32:59 -0700823 # Give it some time in case of IO issues.
824 time.sleep(10)
Dan Shi5699ac22014-12-19 10:55:49 -0800825
Chris Sosae92399e2015-04-24 11:32:59 -0700826 # Figure out active and inactive kernel.
827 active_kernel, inactive_kernel = updater.get_kernel_state()
Simran Basi13fa1ba2013-03-04 10:56:47 -0800828
Chris Sosae92399e2015-04-24 11:32:59 -0700829 # Ensure inactive kernel has higher priority than active.
830 if (updater.get_kernel_priority(inactive_kernel)
831 < updater.get_kernel_priority(active_kernel)):
832 raise autoupdater.ChromiumOSError(
833 'Update failed. The priority of the inactive kernel'
834 ' partition is less than that of the active kernel'
835 ' partition.')
836
837 # Updater has returned successfully; reboot the host.
838 self.reboot(timeout=self.REBOOT_TIMEOUT, wait=True)
839
840 self._post_update_processing(updater, inactive_kernel)
841 self.add_cros_version_labels_and_job_repo_url(
842 autoupdater.url_to_image_name(update_url))
J. Richard Barnette45e93de2012-04-11 17:24:15 -0700843
844
Tom Wai-Hong Tam2d00cb22016-01-08 06:40:50 +0800845 def _clear_fw_version_labels(self, rw_only):
846 """Clear firmware version labels from the machine.
847
848 @param rw_only: True to only clear fwrw_version; otherewise, clear
849 both fwro_version and fwrw_version.
850 """
Dan Shi9cb0eec2014-06-03 09:04:50 -0700851 labels = self._AFE.get_labels(
Dan Shi0723bf52015-06-24 10:52:38 -0700852 name__startswith=provision.FW_RW_VERSION_PREFIX,
Dan Shi9cb0eec2014-06-03 09:04:50 -0700853 host__hostname=self.hostname)
Tom Wai-Hong Tam2d00cb22016-01-08 06:40:50 +0800854 if not rw_only:
855 labels = labels + self._AFE.get_labels(
856 name__startswith=provision.FW_RO_VERSION_PREFIX,
857 host__hostname=self.hostname)
Dan Shi9cb0eec2014-06-03 09:04:50 -0700858 for label in labels:
859 label.remove_hosts(hosts=[self.hostname])
860
861
Tom Wai-Hong Tam2d00cb22016-01-08 06:40:50 +0800862 def _add_fw_version_label(self, build, rw_only):
Dan Shi9cb0eec2014-06-03 09:04:50 -0700863 """Add firmware version label to the machine.
864
865 @param build: Build of firmware.
Tom Wai-Hong Tam2d00cb22016-01-08 06:40:50 +0800866 @param rw_only: True to only add fwrw_version; otherwise, add both
867 fwro_version and fwrw_version.
Dan Shi9cb0eec2014-06-03 09:04:50 -0700868
869 """
Tom Wai-Hong Tam2d00cb22016-01-08 06:40:50 +0800870 fw_label = provision.fwrw_version_to_label(build)
MK Ryu73be9862015-07-06 12:25:00 -0700871 self._AFE.run('label_add_hosts', id=fw_label, hosts=[self.hostname])
Tom Wai-Hong Tam2d00cb22016-01-08 06:40:50 +0800872 if not rw_only:
873 fw_label = provision.fwro_version_to_label(build)
874 self._AFE.run('label_add_hosts', id=fw_label, hosts=[self.hostname])
Dan Shi9cb0eec2014-06-03 09:04:50 -0700875
876
Tom Wai-Hong Tam4ac78982016-01-08 02:34:37 +0800877 def firmware_install(self, build=None, rw_only=False):
Dan Shi9cb0eec2014-06-03 09:04:50 -0700878 """Install firmware to the DUT.
879
880 Use stateful update if the DUT is already running the same build.
881 Stateful update does not update kernel and tends to run much faster
882 than a full reimage. If the DUT is running a different build, or it
883 failed to do a stateful update, full update, including kernel update,
884 will be applied to the DUT.
885
Tom Wai-Hong Tam2d00cb22016-01-08 06:40:50 +0800886 Once a host enters firmware_install its fw[ro|rw]_version label will
887 be removed. After the firmware is updated successfully, a new
888 fw[ro|rw]_version label will be added to the host.
Dan Shi9cb0eec2014-06-03 09:04:50 -0700889
890 @param build: The build version to which we want to provision the
891 firmware of the machine,
892 e.g. 'link-firmware/R22-2695.1.144'.
Tom Wai-Hong Tam4ac78982016-01-08 02:34:37 +0800893 @param rw_only: True to only install firmware to its RW portions. Keep
894 the RO portions unchanged.
Dan Shi9cb0eec2014-06-03 09:04:50 -0700895
896 TODO(dshi): After bug 381718 is fixed, update here with corresponding
897 exceptions that could be raised.
898
899 """
900 if not self.servo:
901 raise error.TestError('Host %s does not have servo.' %
902 self.hostname)
903
904 # TODO(fdeng): use host.get_board() after
905 # crbug.com/271834 is fixed.
906 board = self._get_board_from_afe()
907
Chris Sosae92399e2015-04-24 11:32:59 -0700908 # If build is not set, try to install firmware from stable CrOS.
Dan Shi9cb0eec2014-06-03 09:04:50 -0700909 if not build:
Dan Shi3d7a0e12015-10-12 11:55:45 -0700910 build = self.get_repair_image_name(image_type='firmware')
911 if not build:
912 raise error.TestError(
913 'Failed to find stable firmware build for %s.',
914 self.hostname)
915 logging.info('Will install firmware from build %s.', build)
Dan Shi9cb0eec2014-06-03 09:04:50 -0700916
917 config = FAFTConfig(board)
918 if config.use_u_boot:
919 ap_image = 'image-%s.bin' % board
920 else: # Depthcharge platform
921 ap_image = 'image.bin'
922 ec_image = 'ec.bin'
Dan Shi216389c2015-12-22 11:03:06 -0800923 ds = dev_server.ImageServer.resolve(build, self.hostname)
Dan Shi9cb0eec2014-06-03 09:04:50 -0700924 ds.stage_artifacts(build, ['firmware'])
925
926 tmpd = autotemp.tempdir(unique_id='fwimage')
927 try:
928 fwurl = self._FW_IMAGE_URL_PATTERN % (ds.url(), build)
929 local_tarball = os.path.join(tmpd.name, os.path.basename(fwurl))
930 server_utils.system('wget -O %s %s' % (local_tarball, fwurl),
931 timeout=60)
932 server_utils.system('tar xf %s -C %s %s %s' %
933 (local_tarball, tmpd.name, ap_image, ec_image),
934 timeout=60)
935 server_utils.system('tar xf %s --wildcards -C %s "dts/*"' %
936 (local_tarball, tmpd.name),
937 timeout=60, ignore_status=True)
938
Tom Wai-Hong Tam2d00cb22016-01-08 06:40:50 +0800939 self._clear_fw_version_labels(rw_only)
Tom Wai-Hong Tam4ac78982016-01-08 02:34:37 +0800940 logging.info('Will re-program EC %snow', 'RW ' if rw_only else '')
941 self.servo.program_ec(os.path.join(tmpd.name, ec_image), rw_only)
942 logging.info('Will re-program BIOS %snow', 'RW ' if rw_only else '')
943 self.servo.program_bios(os.path.join(tmpd.name, ap_image), rw_only)
Dan Shi9cb0eec2014-06-03 09:04:50 -0700944 self.servo.get_power_state_controller().reset()
945 time.sleep(self.servo.BOOT_DELAY)
Tom Wai-Hong Tam2d00cb22016-01-08 06:40:50 +0800946 self._add_fw_version_label(build, rw_only)
Dan Shi9cb0eec2014-06-03 09:04:50 -0700947 finally:
948 tmpd.clean()
949
950
Dan Shi10e992b2013-08-30 11:02:59 -0700951 def show_update_engine_log(self):
952 """Output update engine log."""
MK Ryu35d661e2014-09-25 17:44:10 -0700953 logging.debug('Dumping %s', client_constants.UPDATE_ENGINE_LOG)
954 self.run('cat %s' % client_constants.UPDATE_ENGINE_LOG)
Dan Shi10e992b2013-08-30 11:02:59 -0700955
956
Richard Barnette82c35912012-11-20 10:09:10 -0800957 def _get_board_from_afe(self):
958 """Retrieve this host's board from its labels in the AFE.
959
960 Looks for a host label of the form "board:<board>", and
961 returns the "<board>" part of the label. `None` is returned
962 if there is not a single, unique label matching the pattern.
963
964 @returns board from label, or `None`.
965 """
Dan Shia1ecd5c2013-06-06 11:21:31 -0700966 return server_utils.get_board_from_afe(self.hostname, self._AFE)
Simran Basi833814b2013-01-29 13:13:43 -0800967
968
969 def get_build(self):
970 """Retrieve the current build for this Host from the AFE.
971
972 Looks through this host's labels in the AFE to determine its build.
973
974 @returns The current build or None if it could not find it or if there
975 were multiple build labels assigned to this host.
976 """
Dan Shia1ecd5c2013-06-06 11:21:31 -0700977 return server_utils.get_build_from_afe(self.hostname, self._AFE)
Richard Barnette82c35912012-11-20 10:09:10 -0800978
979
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500980 def _install_repair(self):
Chris Sosae92399e2015-04-24 11:32:59 -0700981 """Attempt to repair this host using the update-engine.
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500982
983 If the host is up, try installing the DUT with a stable
Dan Shi6964fa52014-12-18 11:04:27 -0800984 "repair" version of Chrome OS as defined in afe_stable_versions table.
985 If the table is not setup, global_config value under
986 CROS.stable_cros_version will be used instead.
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500987
Scott Zawalski62bacae2013-03-05 10:40:32 -0500988 @raises AutoservRepairMethodNA if the DUT is not reachable.
989 @raises ChromiumOSError if the install failed for some reason.
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500990
991 """
992 if not self.is_up():
Scott Zawalski62bacae2013-03-05 10:40:32 -0500993 raise error.AutoservRepairMethodNA('DUT unreachable for install.')
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500994 logging.info('Attempting to reimage machine to repair image.')
995 try:
Richard Barnette0b023a72015-04-24 16:07:30 +0000996 self.machine_install(repair=True)
Fang Dengd0672f32013-03-18 17:18:09 -0700997 except autoupdater.ChromiumOSError as e:
998 logging.exception(e)
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500999 logging.info('Repair via install failed.')
Scott Zawalski62bacae2013-03-05 10:40:32 -05001000 raise
Scott Zawalski89c44dd2013-02-26 09:28:02 -05001001
1002
Dan Shi2c88eed2013-11-12 10:18:38 -08001003 def _install_repair_with_powerwash(self):
Dan Shi9cc48452013-11-12 12:39:26 -08001004 """Attempt to powerwash first then repair this host using update-engine.
Dan Shi2c88eed2013-11-12 10:18:38 -08001005
Dan Shi9cc48452013-11-12 12:39:26 -08001006 update-engine may fail due to a bad image. In such case, powerwash
1007 may help to cleanup the DUT for update-engine to work again.
Dan Shi2c88eed2013-11-12 10:18:38 -08001008
1009 @raises AutoservRepairMethodNA if the DUT is not reachable.
1010 @raises ChromiumOSError if the install failed for some reason.
1011
1012 """
1013 if not self.is_up():
1014 raise error.AutoservRepairMethodNA('DUT unreachable for install.')
1015
1016 logging.info('Attempting to powerwash the DUT.')
1017 self.run('echo "fast safe" > '
1018 '/mnt/stateful_partition/factory_install_reset')
1019 self.reboot(timeout=self.POWERWASH_BOOT_TIMEOUT, wait=True)
1020 if not self.is_up():
Dan Shi9cc48452013-11-12 12:39:26 -08001021 logging.error('Powerwash failed. DUT did not come back after '
Dan Shi2c88eed2013-11-12 10:18:38 -08001022 'reboot.')
1023 raise error.AutoservRepairFailure(
1024 'DUT failed to boot from powerwash after %d seconds' %
1025 self.POWERWASH_BOOT_TIMEOUT)
1026
1027 logging.info('Powerwash succeeded.')
1028 self._install_repair()
1029
1030
beepsf079cfb2013-09-18 17:49:51 -07001031 def servo_install(self, image_url=None, usb_boot_timeout=USB_BOOT_TIMEOUT,
1032 install_timeout=INSTALL_TIMEOUT):
Scott Zawalski62bacae2013-03-05 10:40:32 -05001033 """
1034 Re-install the OS on the DUT by:
1035 1) installing a test image on a USB storage device attached to the Servo
1036 board,
Richard Barnette03a0c132012-11-05 12:40:35 -08001037 2) booting that image in recovery mode, and then
J. Richard Barnette31b2e312013-04-04 16:05:22 -07001038 3) installing the image with chromeos-install.
1039
Scott Zawalski62bacae2013-03-05 10:40:32 -05001040 @param image_url: If specified use as the url to install on the DUT.
1041 otherwise boot the currently staged image on the USB stick.
beepsf079cfb2013-09-18 17:49:51 -07001042 @param usb_boot_timeout: The usb_boot_timeout to use during reimage.
1043 Factory images need a longer usb_boot_timeout than regular
1044 cros images.
1045 @param install_timeout: The timeout to use when installing the chromeos
1046 image. Factory images need a longer install_timeout.
Richard Barnette03a0c132012-11-05 12:40:35 -08001047
Scott Zawalski62bacae2013-03-05 10:40:32 -05001048 @raises AutoservError if the image fails to boot.
beepsf079cfb2013-09-18 17:49:51 -07001049
J. Richard Barnette0199cc82014-12-05 17:08:40 -08001050 """
beepsf079cfb2013-09-18 17:49:51 -07001051 usb_boot_timer_key = ('servo_install.usb_boot_timeout_%s'
1052 % usb_boot_timeout)
1053 logging.info('Downloading image to USB, then booting from it. Usb boot '
1054 'timeout = %s', usb_boot_timeout)
Gabe Black1e1c41b2015-02-04 23:55:15 -08001055 timer = autotest_stats.Timer(usb_boot_timer_key)
beepsf079cfb2013-09-18 17:49:51 -07001056 timer.start()
J. Richard Barnette31b2e312013-04-04 16:05:22 -07001057 self.servo.install_recovery_image(image_url)
beepsf079cfb2013-09-18 17:49:51 -07001058 if not self.wait_up(timeout=usb_boot_timeout):
Scott Zawalski62bacae2013-03-05 10:40:32 -05001059 raise error.AutoservRepairFailure(
1060 'DUT failed to boot from USB after %d seconds' %
beepsf079cfb2013-09-18 17:49:51 -07001061 usb_boot_timeout)
1062 timer.stop()
Scott Zawalski62bacae2013-03-05 10:40:32 -05001063
Tom Wai-Hong Tamf6b4f812015-08-08 04:14:59 +08001064 # The new chromeos-tpm-recovery has been merged since R44-7073.0.0.
1065 # In old CrOS images, this command fails. Skip the error.
Tom Wai-Hong Tam27af7332015-07-25 06:09:39 +08001066 logging.info('Resetting the TPM status')
Tom Wai-Hong Tamf6b4f812015-08-08 04:14:59 +08001067 try:
1068 self.run('chromeos-tpm-recovery')
1069 except error.AutoservRunError:
1070 logging.warn('chromeos-tpm-recovery is too old.')
1071
Tom Wai-Hong Tam27af7332015-07-25 06:09:39 +08001072
beepsf079cfb2013-09-18 17:49:51 -07001073 install_timer_key = ('servo_install.install_timeout_%s'
1074 % install_timeout)
Gabe Black1e1c41b2015-02-04 23:55:15 -08001075 timer = autotest_stats.Timer(install_timer_key)
beepsf079cfb2013-09-18 17:49:51 -07001076 timer.start()
1077 logging.info('Installing image through chromeos-install.')
J. Richard Barnette9af19632015-09-25 12:18:03 -07001078 self.run('chromeos-install --yes', timeout=install_timeout)
1079 self.halt()
beepsf079cfb2013-09-18 17:49:51 -07001080 timer.stop()
1081
1082 logging.info('Power cycling DUT through servo.')
J. Richard Barnette0199cc82014-12-05 17:08:40 -08001083 self.servo.get_power_state_controller().power_off()
Fang Dengafb88142013-05-30 17:44:31 -07001084 self.servo.switch_usbkey('off')
J. Richard Barnette0199cc82014-12-05 17:08:40 -08001085 # N.B. The Servo API requires that we use power_on() here
1086 # for two reasons:
1087 # 1) After turning on a DUT in recovery mode, you must turn
1088 # it off and then on with power_on() once more to
1089 # disable recovery mode (this is a Parrot specific
1090 # requirement).
1091 # 2) After power_off(), the only way to turn on is with
1092 # power_on() (this is a Storm specific requirement).
J. Richard Barnettefbcc7122013-07-24 18:24:59 -07001093 self.servo.get_power_state_controller().power_on()
beepsf079cfb2013-09-18 17:49:51 -07001094
1095 logging.info('Waiting for DUT to come back up.')
Richard Barnette03a0c132012-11-05 12:40:35 -08001096 if not self.wait_up(timeout=self.BOOT_TIMEOUT):
1097 raise error.AutoservError('DUT failed to reboot installed '
1098 'test image after %d seconds' %
Scott Zawalski62bacae2013-03-05 10:40:32 -05001099 self.BOOT_TIMEOUT)
1100
1101
Dan Shic1b8bdd2015-09-14 23:11:24 -07001102 def _setup_servo(self):
1103 """Try to force to create servo object if it's not set up yet.
1104 """
1105 if self.servo:
1106 return
1107
1108 try:
1109 # Setting servo_args to {} will force it to create the servo_host
1110 # object if possible.
1111 self._servo_host = servo_host.create_servo_host(
1112 dut=self.hostname, servo_args={})
1113 if self._servo_host:
1114 self.servo = self._servo_host.get_servo()
1115 else:
1116 logging.error('Failed to create servo_host object.')
1117 except Exception as e:
1118 logging.error('Failed to create servo object: %s', e)
1119
1120
J. Richard Barnettee4af8b92013-05-01 13:16:12 -07001121 def _servo_repair_reinstall(self):
Scott Zawalski62bacae2013-03-05 10:40:32 -05001122 """Reinstall the DUT utilizing servo and a test image.
1123
1124 Re-install the OS on the DUT by:
1125 1) installing a test image on a USB storage device attached to the Servo
1126 board,
Tom Wai-Hong Tam27af7332015-07-25 06:09:39 +08001127 2) booting that image in recovery mode,
1128 3) resetting the TPM status, and then
1129 4) installing the image with chromeos-install.
Scott Zawalski62bacae2013-03-05 10:40:32 -05001130
Scott Zawalski62bacae2013-03-05 10:40:32 -05001131 @raises AutoservRepairMethodNA if the device does not have servo
1132 support.
1133
1134 """
1135 if not self.servo:
1136 raise error.AutoservRepairMethodNA('Repair Reinstall NA: '
1137 'DUT has no servo support.')
1138
1139 logging.info('Attempting to recovery servo enabled device with '
1140 'servo_repair_reinstall')
1141
J. Richard Barnettee4af8b92013-05-01 13:16:12 -07001142 image_url = self.stage_image_for_servo()
Scott Zawalski62bacae2013-03-05 10:40:32 -05001143 self.servo_install(image_url)
1144
1145
Tom Wai-Hong Tambea741c2016-01-21 07:20:14 +08001146 def _is_firmware_repair_supported(self):
1147 """Check if the firmware repair is supported.
Dan Shi3d7a0e12015-10-12 11:55:45 -07001148
Tom Wai-Hong Tambea741c2016-01-21 07:20:14 +08001149 The firmware repair is only applicable to DUTs in pools listed in
1150 global config CROS/pools_support_firmware_repair.
Dan Shi3d7a0e12015-10-12 11:55:45 -07001151
Tom Wai-Hong Tambea741c2016-01-21 07:20:14 +08001152 @return: True if it is supported; otherwise False.
Dan Shi3d7a0e12015-10-12 11:55:45 -07001153 """
1154 logging.info('Checking if host %s can be repaired with firmware '
1155 'repair.', self.hostname)
1156 pools = server_utils.get_labels_from_afe(self.hostname, 'pool:',
1157 self._AFE)
1158 pools_support_firmware_repair = CONFIG.get_config_value('CROS',
1159 'pools_support_firmware_repair', type=str).split(',')
Tom Wai-Hong Tambea741c2016-01-21 07:20:14 +08001160
1161 return (pools and pools_support_firmware_repair and
1162 set(pools).intersection(set(pools_support_firmware_repair)))
1163
1164
1165 def _firmware_repair(self):
1166 """Reinstall the firmware image using servo.
1167
1168 This repair function attempts to install the stable firmware specified
1169 by the stable firmware version.
1170 Then reset the DUT and try to verify it. If verify fails, it will try to
1171 install the CrOS image using servo.
1172 """
1173 if not self._is_firmware_repair_supported():
1174 logging.info('Host is not in pools that support firmware repair.')
Dan Shi3d7a0e12015-10-12 11:55:45 -07001175 raise error.AutoservRepairMethodNA(
1176 'Firmware repair is not applicable to host %s.' %
1177 self.hostname)
1178
1179 # To repair a DUT connected to a moblab, try to create a servo object if
1180 # it was failed to be created earlier as there may be a servo_host host
1181 # attribute for this host.
1182 if utils.is_moblab():
1183 self._setup_servo()
1184
1185 if not self.servo:
1186 raise error.AutoservRepairMethodNA('Repair Reinstall NA: '
1187 'DUT has no servo support.')
1188
1189 logging.info('Attempting to recovery servo enabled device with '
1190 'firmware_repair.')
1191 self.firmware_install()
1192
1193 logging.info('Firmware repaired. Check if the DUT can boot. If not, '
1194 'reinstall the CrOS using servo.')
1195 try:
Dan Shi3d7a0e12015-10-12 11:55:45 -07001196 self.verify()
1197 except Exception as e:
1198 logging.warn('Failed to verify DUT, error: %s. Will try to repair '
1199 'the DUT with servo_repair_reinstall.', e)
1200 self._servo_repair_reinstall()
1201
1202
Scott Zawalski62bacae2013-03-05 10:40:32 -05001203 def _servo_repair_power(self):
1204 """Attempt to repair DUT using an attached Servo.
1205
J. Richard Barnette13165972016-01-13 10:53:09 -08001206 Attempt to power cycle the DUT via cold_reset.
Scott Zawalski62bacae2013-03-05 10:40:32 -05001207
1208 @raises AutoservRepairMethodNA if the device does not have servo
1209 support.
1210 @raises AutoservRepairFailure if the repair fails for any reason.
1211 """
1212 if not self.servo:
1213 raise error.AutoservRepairMethodNA('Repair Power NA: '
1214 'DUT has no servo support.')
1215
1216 logging.info('Attempting to recover servo enabled device by '
J. Richard Barnette13165972016-01-13 10:53:09 -08001217 'powering cycling with cold reset.')
1218 self.servo.get_power_state_controller().reset()
Scott Zawalski62bacae2013-03-05 10:40:32 -05001219 if self.wait_up(self.BOOT_TIMEOUT):
1220 return
1221
1222 raise error.AutoservRepairFailure('DUT did not boot after long_press.')
Richard Barnette03a0c132012-11-05 12:40:35 -08001223
1224
Richard Barnette82c35912012-11-20 10:09:10 -08001225 def _powercycle_to_repair(self):
1226 """Utilize the RPM Infrastructure to bring the host back up.
1227
1228 If the host is not up/repaired after the first powercycle we utilize
1229 auto fallback to the last good install by powercycling and rebooting the
1230 host 6 times.
Scott Zawalski62bacae2013-03-05 10:40:32 -05001231
1232 @raises AutoservRepairMethodNA if the device does not support remote
1233 power.
1234 @raises AutoservRepairFailure if the repair fails for any reason.
1235
Richard Barnette82c35912012-11-20 10:09:10 -08001236 """
Scott Zawalski62bacae2013-03-05 10:40:32 -05001237 if not self.has_power():
1238 raise error.AutoservRepairMethodNA('Device does not support power.')
1239
Richard Barnette82c35912012-11-20 10:09:10 -08001240 logging.info('Attempting repair via RPM powercycle.')
1241 failed_cycles = 0
1242 self.power_cycle()
1243 while not self.wait_up(timeout=self.BOOT_TIMEOUT):
1244 failed_cycles += 1
1245 if failed_cycles >= self._MAX_POWER_CYCLE_ATTEMPTS:
Scott Zawalski62bacae2013-03-05 10:40:32 -05001246 raise error.AutoservRepairFailure(
1247 'Powercycled host %s %d times; device did not come back'
1248 ' online.' % (self.hostname, failed_cycles))
Richard Barnette82c35912012-11-20 10:09:10 -08001249 self.power_cycle()
1250 if failed_cycles == 0:
1251 logging.info('Powercycling was successful first time.')
1252 else:
1253 logging.info('Powercycling was successful after %d failures.',
1254 failed_cycles)
1255
1256
MK Ryu35d661e2014-09-25 17:44:10 -07001257 def _reboot_repair(self):
1258 """SSH to this host and reboot."""
1259 if not self.is_up(self._CHECK_HOST_UP_TIMEOUT_SECS):
1260 raise error.AutoservRepairMethodNA('DUT unreachable for reboot.')
1261 logging.info('Attempting repair via SSH reboot.')
1262 self.reboot(timeout=self.BOOT_TIMEOUT, wait=True)
1263
1264
Prashanth B4d8184f2014-05-05 12:22:02 -07001265 def check_device(self):
1266 """Check if a device is ssh-able, and if so, clean and verify it.
1267
1268 @raise AutoservSSHTimeout: If the ssh ping times out.
1269 @raise AutoservSshPermissionDeniedError: If ssh ping fails due to
1270 permissions.
1271 @raise AutoservSshPingHostError: For other AutoservRunErrors during
1272 ssh_ping.
1273 @raises AutoservError: As appropriate, during cleanup and verify.
1274 """
1275 self.ssh_ping()
1276 self.cleanup()
1277 self.verify()
1278
1279
Dan Shi90466352015-09-22 15:01:05 -07001280 def confirm_servo(self):
1281 """Confirm servo is initialized and verified.
1282
1283 @raise AutoservError: If servo is not initialized and verified.
1284 """
Tom Wai-Hong Tam244acc22016-01-09 07:04:21 +08001285 if self.servo and self._servo_host.required_by_test:
Dan Shi90466352015-09-22 15:01:05 -07001286 return
1287
1288 # Force to re-create the servo object to make sure servo is verified.
1289 logging.debug('Rebuilding the servo object.')
1290 self.servo = None
1291 self._servo_host = None
1292 self._setup_servo()
1293 if not self.servo:
1294 raise error.AutoservError('Failed to create servo object.')
1295
1296
Dan Shid07ee2e2015-09-24 14:49:25 -07001297 def _is_last_provision_failed(self):
1298 """Checks if the last provision job failed.
1299
1300 @return: True if there exists file /var/tmp/provision_failed, which
1301 indicates the last provision job failed.
1302 False if the file does not exist or the dut can't be reached.
1303 """
1304 try:
1305 result = self.run('test -f %s' % PROVISION_FAILED,
1306 ignore_status=True, timeout=5)
1307 return result.exit_status == 0
1308 except (error.AutoservRunError, error.AutoservSSHTimeout):
1309 # Default to False, for repair to try all repair method if the dut
1310 # can't be reached.
1311 return False
1312
1313
J. Richard Barnettec2d99cf2015-11-18 12:46:15 -08001314 def repair(self):
1315 """Attempt to get the DUT to pass `self.verify()`.
Richard Barnette82c35912012-11-20 10:09:10 -08001316
1317 This overrides the base class function for repair; it does
1318 not call back to the parent class, but instead offers a
1319 simplified implementation based on the capabilities in the
1320 Chrome OS test lab.
1321
Fang Deng5d518f42013-08-02 14:04:32 -07001322 It first verifies and repairs servo if it is a DUT in CrOS
Fang Deng03590af2013-10-07 17:34:20 -07001323 lab and a servo is attached.
Fang Deng5d518f42013-08-02 14:04:32 -07001324
Jakob Juelich82b7d1c2014-09-15 16:10:57 -07001325 This escalates in order through the following procedures and verifies
1326 the status using `self.check_device()` after each of them. This is done
1327 until both the repair and the veryfing step succeed.
1328
MK Ryu35d661e2014-09-25 17:44:10 -07001329 Escalation order of repair procedures from less intrusive to
1330 more intrusive repairs:
1331 1. SSH to the DUT and reboot.
Scott Zawalski62bacae2013-03-05 10:40:32 -05001332 2. If there's a servo for the DUT, try to power the DUT off and
1333 on.
MK Ryu35d661e2014-09-25 17:44:10 -07001334 3. If the DUT can be power-cycled via RPM, try to repair
Richard Barnette82c35912012-11-20 10:09:10 -08001335 by power-cycling.
MK Ryu35d661e2014-09-25 17:44:10 -07001336 4. Try to re-install to a known stable image using
1337 auto-update.
1338 5. If there's a servo for the DUT, try to re-install via
1339 the servo.
Richard Barnette82c35912012-11-20 10:09:10 -08001340
1341 As with the parent method, the last operation performed on
Prashanth B4d8184f2014-05-05 12:22:02 -07001342 the DUT must be to call `self.check_device()`; If that call fails the
1343 exception it raises is passed back to the caller.
J. Richard Barnettefde55fc2013-03-15 17:47:01 -07001344
Scott Zawalski62bacae2013-03-05 10:40:32 -05001345 @raises AutoservRepairTotalFailure if the repair process fails to
1346 fix the DUT.
Fang Deng5d518f42013-08-02 14:04:32 -07001347 @raises ServoHostRepairTotalFailure if the repair process fails to
1348 fix the servo host if one is attached to the DUT.
1349 @raises AutoservSshPermissionDeniedError if it is unable
1350 to ssh to the servo host due to permission error.
1351
Richard Barnette82c35912012-11-20 10:09:10 -08001352 """
Jakob Juelich82b7d1c2014-09-15 16:10:57 -07001353 # Caution: Deleting shards relies on repair to always reboot the DUT.
1354
Nicolas Boichate30c7e12015-11-05 11:12:50 +08001355 # To repair a DUT connected to a moblab, try to create a servo object if
1356 # it was failed to be created earlier as there may be a servo_host host
1357 # attribute for this host.
1358 if utils.is_moblab():
1359 self._setup_servo()
1360
Dan Shi4d478522014-02-14 13:46:32 -08001361 if self._servo_host and not self.servo:
Fang Deng03590af2013-10-07 17:34:20 -07001362 try:
J. Richard Barnette4fc59c42015-12-15 16:58:50 -08001363 self._servo_host.repair()
Fang Deng03590af2013-10-07 17:34:20 -07001364 except Exception as e:
Fang Deng03590af2013-10-07 17:34:20 -07001365 logging.error('Could not create a healthy servo: %s', e)
Dan Shi4d478522014-02-14 13:46:32 -08001366 self.servo = self._servo_host.get_servo()
Fang Deng5d518f42013-08-02 14:04:32 -07001367
MK Ryu35d661e2014-09-25 17:44:10 -07001368 self.try_collect_crashlogs()
1369
Scott Zawalski62bacae2013-03-05 10:40:32 -05001370 # TODO(scottz): This should use something similar to label_decorator,
1371 # but needs to be populated in order so DUTs are repaired with the
1372 # least amount of effort.
Dan Shid07ee2e2015-09-24 14:49:25 -07001373 force_powerwash = self._is_last_provision_failed()
1374 if force_powerwash:
1375 logging.info('Last provision failed, try powerwash first.')
1376 autotest_stats.Counter(
1377 'repair_force_powerwash.TOTAL').increment()
Tom Wai-Hong Tamb284ce42016-01-15 08:11:38 +08001378 repair_funcs = [self._firmware_repair,
1379 self._install_repair_with_powerwash,
1380 self._servo_repair_reinstall]
Dan Shid07ee2e2015-09-24 14:49:25 -07001381 else:
1382 repair_funcs = [self._reboot_repair,
1383 self._servo_repair_power,
Tom Wai-Hong Tamb284ce42016-01-15 08:11:38 +08001384 self._firmware_repair,
Dan Shid07ee2e2015-09-24 14:49:25 -07001385 self._powercycle_to_repair,
1386 self._install_repair,
1387 self._install_repair_with_powerwash,
Tom Wai-Hong Tamb284ce42016-01-15 08:11:38 +08001388 self._servo_repair_reinstall]
Scott Zawalski62bacae2013-03-05 10:40:32 -05001389 errors = []
Simran Basie6130932013-10-01 14:07:52 -07001390 board = self._get_board_from_afe()
Scott Zawalski62bacae2013-03-05 10:40:32 -05001391 for repair_func in repair_funcs:
1392 try:
1393 repair_func()
MK Ryu35d661e2014-09-25 17:44:10 -07001394 self.try_collect_crashlogs()
Prashanth B4d8184f2014-05-05 12:22:02 -07001395 self.check_device()
Gabe Black1e1c41b2015-02-04 23:55:15 -08001396 autotest_stats.Counter(
Simran Basie6130932013-10-01 14:07:52 -07001397 '%s.SUCCEEDED' % repair_func.__name__).increment()
1398 if board:
Gabe Black1e1c41b2015-02-04 23:55:15 -08001399 autotest_stats.Counter(
Dan Shid07ee2e2015-09-24 14:49:25 -07001400 '%s.%s.SUCCEEDED' % (repair_func.__name__,
Simran Basie6130932013-10-01 14:07:52 -07001401 board)).increment()
Dan Shid07ee2e2015-09-24 14:49:25 -07001402 if force_powerwash:
1403 autotest_stats.Counter(
1404 'repair_force_powerwash.SUCCEEDED').increment()
Scott Zawalski62bacae2013-03-05 10:40:32 -05001405 return
Simran Basie6130932013-10-01 14:07:52 -07001406 except error.AutoservRepairMethodNA as e:
Gabe Black1e1c41b2015-02-04 23:55:15 -08001407 autotest_stats.Counter(
Simran Basie6130932013-10-01 14:07:52 -07001408 '%s.RepairNA' % repair_func.__name__).increment()
1409 if board:
Gabe Black1e1c41b2015-02-04 23:55:15 -08001410 autotest_stats.Counter(
Dan Shid07ee2e2015-09-24 14:49:25 -07001411 '%s.%s.RepairNA' % (repair_func.__name__,
1412 board)).increment()
Ilja H. Friedel04be2bd2014-05-07 21:29:59 -07001413 logging.warning('Repair function NA: %s', e)
Simran Basie6130932013-10-01 14:07:52 -07001414 errors.append(str(e))
Scott Zawalski62bacae2013-03-05 10:40:32 -05001415 except Exception as e:
Gabe Black1e1c41b2015-02-04 23:55:15 -08001416 autotest_stats.Counter(
Simran Basie6130932013-10-01 14:07:52 -07001417 '%s.FAILED' % repair_func.__name__).increment()
1418 if board:
Gabe Black1e1c41b2015-02-04 23:55:15 -08001419 autotest_stats.Counter(
Dan Shid07ee2e2015-09-24 14:49:25 -07001420 '%s.%s.FAILED' % (repair_func.__name__,
1421 board)).increment()
Ilja H. Friedel04be2bd2014-05-07 21:29:59 -07001422 logging.warning('Failed to repair device: %s', e)
Scott Zawalski62bacae2013-03-05 10:40:32 -05001423 errors.append(str(e))
Scott Zawalski89c44dd2013-02-26 09:28:02 -05001424
Dan Shid07ee2e2015-09-24 14:49:25 -07001425 if force_powerwash:
1426 autotest_stats.Counter(
1427 'repair_force_powerwash.FAILED').increment()
Gabe Black1e1c41b2015-02-04 23:55:15 -08001428 autotest_stats.Counter('Full_Repair_Failed').increment()
Simran Basie6130932013-10-01 14:07:52 -07001429 if board:
Gabe Black1e1c41b2015-02-04 23:55:15 -08001430 autotest_stats.Counter(
Dan Shid07ee2e2015-09-24 14:49:25 -07001431 'Full_Repair_Failed.%s' % board).increment()
Scott Zawalski62bacae2013-03-05 10:40:32 -05001432 raise error.AutoservRepairTotalFailure(
1433 'All attempts at repairing the device failed:\n%s' %
1434 '\n'.join(errors))
Richard Barnette82c35912012-11-20 10:09:10 -08001435
1436
MK Ryu35d661e2014-09-25 17:44:10 -07001437 def try_collect_crashlogs(self, check_host_up=True):
1438 """
1439 Check if a host is up and logs need to be collected from the host,
1440 if yes, collect them.
1441
1442 @param check_host_up: Flag for checking host is up. Default is True.
1443 """
1444 try:
1445 crash_job = self._need_crash_logs()
1446 if crash_job:
1447 logging.debug('%s: Job %s was crashed', self._CRASHLOGS_PREFIX,
1448 crash_job)
1449 if not check_host_up or self.is_up(
1450 self._CHECK_HOST_UP_TIMEOUT_SECS):
1451 self._collect_crashlogs(crash_job)
1452 logging.debug('%s: Completed collecting logs for the '
1453 'crashed job %s', self._CRASHLOGS_PREFIX,
1454 crash_job)
1455 except Exception as e:
1456 # Exception should not result in repair failure.
1457 # Therefore, suppress all exceptions here.
1458 logging.error('%s: Failed while trying to collect crash-logs: %s',
1459 self._CRASHLOGS_PREFIX, e)
1460
1461
1462 def _need_crash_logs(self):
1463 """Get the value of need_crash_logs attribute of this host.
1464
1465 @return: Value string of need_crash_logs attribute
1466 None if there is no need_crash_logs attribute
1467 """
1468 attrs = self._AFE.get_host_attribute(constants.CRASHLOGS_HOST_ATTRIBUTE,
1469 hostname=self.hostname)
1470 assert len(attrs) < 2
1471 return attrs[0].value if attrs else None
1472
1473
1474 def _collect_crashlogs(self, job_id):
1475 """Grab logs from the host where a job was crashed.
1476
1477 First, check if PRIOR_LOGS_DIR exists in the host.
1478 If yes, collect them.
1479 Otherwise, check if a lab-machine marker (_LAB_MACHINE_FILE) exists
1480 in the host.
1481 If yes, the host was repaired automatically, and we collect normal
1482 system logs.
1483
1484 @param job_id: Id of the job that was crashed.
1485 """
1486 crashlogs_dir = crashcollect.get_crashinfo_dir(self,
1487 constants.CRASHLOGS_DEST_DIR_PREFIX)
1488 flag_prior_logs = False
1489
1490 if self.path_exists(client_constants.PRIOR_LOGS_DIR):
1491 flag_prior_logs = True
1492 self._collect_prior_logs(crashlogs_dir)
1493 elif self.path_exists(self._LAB_MACHINE_FILE):
1494 self._collect_system_logs(crashlogs_dir)
1495 else:
1496 logging.warning('%s: Host was manually re-installed without '
1497 '--lab_preserve_log option. Skip collecting '
1498 'crash-logs.', self._CRASHLOGS_PREFIX)
1499
1500 # We make crash collection be one-time effort.
1501 # _collect_prior_logs() and _collect_system_logs() will not throw
1502 # any exception, and following codes will be executed even when
1503 # those methods fail.
1504 # _collect_crashlogs() is called only when the host is up (refer
1505 # to try_collect_crashlogs()). We assume _collect_prior_logs() and
1506 # _collect_system_logs() fail rarely when the host is up.
1507 # In addition, it is not clear how many times we should try crash
1508 # collection again while not triggering next repair unnecessarily.
1509 # Threfore, we try crash collection one time.
1510
1511 # Create a marker file as soon as log collection is done.
1512 # Leave the job id to this marker for gs_offloader to consume.
1513 marker_file = os.path.join(crashlogs_dir, constants.CRASHLOGS_MARKER)
1514 with open(marker_file, 'a') as f:
1515 f.write('%s\n' % job_id)
1516
1517 # Remove need_crash_logs attribute
1518 logging.debug('%s: Remove attribute need_crash_logs from host %s',
1519 self._CRASHLOGS_PREFIX, self.hostname)
1520 self._AFE.set_host_attribute(constants.CRASHLOGS_HOST_ATTRIBUTE,
1521 None, hostname=self.hostname)
1522
1523 if flag_prior_logs:
1524 logging.debug('%s: Remove %s from host %s', self._CRASHLOGS_PREFIX,
1525 client_constants.PRIOR_LOGS_DIR, self.hostname)
1526 self.run('rm -rf %s; sync' % client_constants.PRIOR_LOGS_DIR)
1527 # Wait for a few seconds to make sure the prior command is
1528 # done deep through storage.
1529 time.sleep(self._SAFE_WAIT_SECS)
1530
1531
1532 def _collect_prior_logs(self, crashlogs_dir):
1533 """Grab prior logs that were stashed before re-installing a host.
1534
1535 @param crashlogs_dir: Directory path where crash-logs are stored.
1536 """
1537 logging.debug('%s: Found %s, collecting them...',
1538 self._CRASHLOGS_PREFIX, client_constants.PRIOR_LOGS_DIR)
1539 try:
1540 self.collect_logs(client_constants.PRIOR_LOGS_DIR,
1541 crashlogs_dir, False)
1542 logging.debug('%s: %s is collected',
1543 self._CRASHLOGS_PREFIX, client_constants.PRIOR_LOGS_DIR)
1544 except Exception as e:
1545 logging.error('%s: Failed to collect %s: %s',
1546 self._CRASHLOGS_PREFIX, client_constants.PRIOR_LOGS_DIR,
1547 e)
1548
1549
1550 def _collect_system_logs(self, crashlogs_dir):
1551 """Grab normal system logs from a host.
1552
1553 @param crashlogs_dir: Directory path where crash-logs are stored.
1554 """
1555 logging.debug('%s: Found %s, collecting system logs...',
1556 self._CRASHLOGS_PREFIX, self._LAB_MACHINE_FILE)
1557 sources = server_utils.parse_simple_config(self._LOGS_TO_COLLECT_FILE)
1558 for src in sources:
1559 try:
1560 if self.path_exists(src):
1561 logging.debug('%s: Collecting %s...',
1562 self._CRASHLOGS_PREFIX, src)
1563 dest = server_utils.concat_path_except_last(
1564 crashlogs_dir, src)
1565 self.collect_logs(src, dest, False)
1566 logging.debug('%s: %s is collected',
1567 self._CRASHLOGS_PREFIX, src)
1568 except Exception as e:
1569 logging.error('%s: Failed to collect %s: %s',
1570 self._CRASHLOGS_PREFIX, src, e)
1571
1572
J. Richard Barnette1d78b012012-05-15 13:56:30 -07001573 def close(self):
Fang Deng0ca40e22013-08-27 17:47:44 -07001574 super(CrosHost, self).close()
J. Richard Barnette1d78b012012-05-15 13:56:30 -07001575
1576
Dan Shi49ca0932014-11-14 11:22:27 -08001577 def get_power_supply_info(self):
1578 """Get the output of power_supply_info.
1579
1580 power_supply_info outputs the info of each power supply, e.g.,
1581 Device: Line Power
1582 online: no
1583 type: Mains
1584 voltage (V): 0
1585 current (A): 0
1586 Device: Battery
1587 state: Discharging
1588 percentage: 95.9276
1589 technology: Li-ion
1590
1591 Above output shows two devices, Line Power and Battery, with details of
1592 each device listed. This function parses the output into a dictionary,
1593 with key being the device name, and value being a dictionary of details
1594 of the device info.
1595
1596 @return: The dictionary of power_supply_info, e.g.,
1597 {'Line Power': {'online': 'yes', 'type': 'main'},
1598 'Battery': {'vendor': 'xyz', 'percentage': '100'}}
Dan Shie9b765d2014-12-29 16:59:49 -08001599 @raise error.AutoservRunError if power_supply_info tool is not found in
1600 the DUT. Caller should handle this error to avoid false failure
1601 on verification.
Dan Shi49ca0932014-11-14 11:22:27 -08001602 """
1603 result = self.run('power_supply_info').stdout.strip()
1604 info = {}
1605 device_name = None
1606 device_info = {}
1607 for line in result.split('\n'):
1608 pair = [v.strip() for v in line.split(':')]
1609 if len(pair) != 2:
1610 continue
1611 if pair[0] == 'Device':
1612 if device_name:
1613 info[device_name] = device_info
1614 device_name = pair[1]
1615 device_info = {}
1616 else:
1617 device_info[pair[0]] = pair[1]
1618 if device_name and not device_name in info:
1619 info[device_name] = device_info
1620 return info
1621
1622
1623 def get_battery_percentage(self):
1624 """Get the battery percentage.
1625
1626 @return: The percentage of battery level, value range from 0-100. Return
1627 None if the battery info cannot be retrieved.
1628 """
1629 try:
1630 info = self.get_power_supply_info()
1631 logging.info(info)
1632 return float(info['Battery']['percentage'])
Dan Shie9b765d2014-12-29 16:59:49 -08001633 except (KeyError, ValueError, error.AutoservRunError):
Dan Shi49ca0932014-11-14 11:22:27 -08001634 return None
1635
1636
1637 def is_ac_connected(self):
1638 """Check if the dut has power adapter connected and charging.
1639
1640 @return: True if power adapter is connected and charging.
1641 """
1642 try:
1643 info = self.get_power_supply_info()
1644 return info['Line Power']['online'] == 'yes'
Dan Shie9b765d2014-12-29 16:59:49 -08001645 except (KeyError, error.AutoservRunError):
1646 return None
Dan Shi49ca0932014-11-14 11:22:27 -08001647
1648
Simran Basi5e6339a2013-03-21 11:34:32 -07001649 def _cleanup_poweron(self):
1650 """Special cleanup method to make sure hosts always get power back."""
1651 afe = frontend_wrappers.RetryingAFE(timeout_min=5, delay_sec=10)
1652 hosts = afe.get_hosts(hostname=self.hostname)
1653 if not hosts or not (self._RPM_OUTLET_CHANGED in
1654 hosts[0].attributes):
1655 return
1656 logging.debug('This host has recently interacted with the RPM'
1657 ' Infrastructure. Ensuring power is on.')
1658 try:
1659 self.power_on()
Dan Shi7dca56e2014-11-11 17:07:56 -08001660 afe.set_host_attribute(self._RPM_OUTLET_CHANGED, None,
1661 hostname=self.hostname)
Simran Basi5e6339a2013-03-21 11:34:32 -07001662 except rpm_client.RemotePowerException:
Simran Basi5e6339a2013-03-21 11:34:32 -07001663 logging.error('Failed to turn Power On for this host after '
1664 'cleanup through the RPM Infrastructure.')
Gabe Blackb72f4fb2015-01-20 16:47:13 -08001665 autotest_es.post(
Dan Shi7dca56e2014-11-11 17:07:56 -08001666 type_str='RPM_poweron_failure',
1667 metadata={'hostname': self.hostname})
Dan Shi49ca0932014-11-14 11:22:27 -08001668
1669 battery_percentage = self.get_battery_percentage()
Dan Shif01ebe22014-12-05 13:10:57 -08001670 if battery_percentage and battery_percentage < 50:
Dan Shi49ca0932014-11-14 11:22:27 -08001671 raise
1672 elif self.is_ac_connected():
1673 logging.info('The device has power adapter connected and '
1674 'charging. No need to try to turn RPM on '
1675 'again.')
1676 afe.set_host_attribute(self._RPM_OUTLET_CHANGED, None,
1677 hostname=self.hostname)
1678 logging.info('Battery level is now at %s%%. The device may '
1679 'still have enough power to run test, so no '
1680 'exception will be raised.', battery_percentage)
1681
Simran Basi5e6339a2013-03-21 11:34:32 -07001682
beepsc87ff602013-07-31 21:53:00 -07001683 def _is_factory_image(self):
1684 """Checks if the image on the DUT is a factory image.
1685
1686 @return: True if the image on the DUT is a factory image.
1687 False otherwise.
1688 """
1689 result = self.run('[ -f /root/.factory_test ]', ignore_status=True)
1690 return result.exit_status == 0
1691
1692
1693 def _restart_ui(self):
J. Richard Barnette84890bd2014-02-21 11:05:47 -08001694 """Restart the Chrome UI.
beepsc87ff602013-07-31 21:53:00 -07001695
1696 @raises: FactoryImageCheckerException for factory images, since
1697 we cannot attempt to restart ui on them.
1698 error.AutoservRunError for any other type of error that
1699 occurs while restarting ui.
1700 """
1701 if self._is_factory_image():
Dan Shi549fb822015-03-24 18:01:11 -07001702 raise FactoryImageCheckerException('Cannot restart ui on factory '
1703 'images')
beepsc87ff602013-07-31 21:53:00 -07001704
J. Richard Barnette84890bd2014-02-21 11:05:47 -08001705 # TODO(jrbarnette): The command to stop/start the ui job
1706 # should live inside cros_ui, too. However that would seem
1707 # to imply interface changes to the existing start()/restart()
1708 # functions, which is a bridge too far (for now).
J. Richard Barnette6069aa12015-06-08 09:10:24 -07001709 prompt = cros_ui.get_chrome_session_ident(self)
J. Richard Barnette84890bd2014-02-21 11:05:47 -08001710 self.run('stop ui; start ui')
1711 cros_ui.wait_for_chrome_ready(prompt, self)
beepsc87ff602013-07-31 21:53:00 -07001712
1713
Dan Shi549fb822015-03-24 18:01:11 -07001714 def get_release_version(self):
1715 """Get the value of attribute CHROMEOS_RELEASE_VERSION from lsb-release.
1716
1717 @returns The version string in lsb-release, under attribute
1718 CHROMEOS_RELEASE_VERSION.
1719 """
1720 lsb_release_content = self.run(
1721 'cat "%s"' % client_constants.LSB_RELEASE).stdout.strip()
1722 return lsbrelease_utils.get_chromeos_release_version(
1723 lsb_release_content=lsb_release_content)
1724
1725
1726 def verify_cros_version_label(self):
1727 """ Make sure host's cros-version label match the actual image in dut.
1728
1729 Remove any cros-version: label that doesn't match that installed in
1730 the dut.
1731
1732 @param raise_error: Set to True to raise exception if any mismatch found
1733
1734 @raise error.AutoservError: If any mismatch between cros-version label
1735 and the build installed in dut is found.
1736 """
1737 labels = self._AFE.get_labels(
1738 name__startswith=ds_constants.VERSION_PREFIX,
1739 host__hostname=self.hostname)
1740 mismatch_found = False
1741 if labels:
1742 # Get CHROMEOS_RELEASE_VERSION from lsb-release, e.g., 6908.0.0.
1743 # Note that it's different from cros-version label, which has
1744 # builder and branch info, e.g.,
1745 # cros-version:peppy-release/R43-6908.0.0
1746 release_version = self.get_release_version()
1747 host_list = [self.hostname]
1748 for label in labels:
1749 # Remove any cros-version label that does not match
1750 # release_version.
1751 build_version = label.name[len(ds_constants.VERSION_PREFIX):]
1752 if not utils.version_match(build_version, release_version):
1753 logging.warn('cros-version label "%s" does not match '
1754 'release version %s. Removing the label.',
1755 label.name, release_version)
1756 label.remove_hosts(hosts=host_list)
1757 mismatch_found = True
1758 if mismatch_found:
Dan Shi1057bae2015-03-30 11:35:09 -07001759 autotest_es.post(use_http=True,
1760 type_str='cros_version_label_mismatch',
1761 metadata={'hostname': self.hostname})
Dan Shi549fb822015-03-24 18:01:11 -07001762 raise error.AutoservError('The host has wrong cros-version label.')
1763
1764
Darren Krahn0bd18e82015-10-28 23:30:46 +00001765 def verify_tpm_status(self):
1766 """ Verify the host's TPM is in a good state.
1767
1768 @raise error.AutoservError: If state is not good.
1769 """
1770 # This cryptohome command emits status information in JSON format. It
1771 # looks something like this:
1772 # {
1773 # "installattrs": {
1774 # "first_install": false,
1775 # "initialized": true,
1776 # "invalid": false,
1777 # "lockbox_index": 536870916,
1778 # "lockbox_nvram_version": 2,
1779 # "secure": true,
1780 # "size": 0,
1781 # "version": 1
1782 # },
1783 # "mounts": [ {
1784 # "enterprise": false,
1785 # "keysets": [ {
1786 # "current": true,
1787 # "index": 0,
1788 # "last_activity": 1330111359,
1789 # "ok": true,
1790 # "scrypt": true,
1791 # "tpm": false
1792 # } ],
1793 # "mounted": true,
1794 # "owner": "dbb3dd34edb181245130e136be51fa08478d3909"
1795 # } ],
1796 # "tpm": {
1797 # "being_owned": false,
1798 # "can_connect": true,
1799 # "can_decrypt": false,
1800 # "can_encrypt": false,
1801 # "can_load_srk": true,
1802 # "can_load_srk_pubkey": true,
1803 # "enabled": true,
1804 # "has_context": true,
1805 # "has_cryptohome_key": false,
1806 # "has_key_handle": false,
1807 # "last_error": 0,
1808 # "owned": true
1809 # }
1810 # }
1811 output = self.run('cryptohome --action=status').stdout.strip()
1812 try:
1813 status = json.loads(output)
1814 except ValueError:
1815 logging.error('TPM_VERIFY: Cryptohome did not return valid status.')
1816 return
1817 try:
1818 tpm = status['tpm']
1819 if (not tpm['enabled'] or not tpm['can_connect'] or
1820 (tpm['owned'] and not tpm['can_load_srk']) or
1821 (tpm['can_load_srk'] and not tpm['can_load_srk_pubkey'])):
1822 logging.error('TPM_VERIFY: The host TPM is in a bad state.')
1823 raise error.AutoservError('The host TPM is in a bad state.')
1824 else:
1825 logging.debug('TPM_VERIFY: The host TPM is in a good state.')
1826 except KeyError:
1827 logging.error('TPM_VERIFY: Cryptohome did not return valid status.')
1828
1829
Tom Wai-Hong Tambea741c2016-01-21 07:20:14 +08001830 def verify_firmware_status(self):
1831 """Verify the host's firmware is in a good state.
1832
1833 @raise error.AutoservError: If state is not good.
1834 """
1835 if self._is_firmware_repair_supported():
Tom Wai-Hong Tam93a29562016-01-23 04:16:53 +08001836 try:
1837 # Read the AP firmware and dump the sections we are interested.
1838 cmd = ('mkdir /tmp/verify_firmware; '
1839 'cd /tmp/verify_firmware; '
1840 'for section in VBLOCK_A VBLOCK_B FW_MAIN_A FW_MAIN_B; '
1841 'do flashrom -r image.bin -i $section:$section; '
1842 'done')
1843 self.run(cmd)
1844
1845 # Verify the firmware blocks A and B.
1846 cmd = ('vbutil_firmware --verify /tmp/verify_firmware/VBLOCK_%c'
1847 ' --signpubkey /usr/share/vboot/devkeys/root_key.vbpubk'
1848 ' --fv /tmp/verify_firmware/FW_MAIN_%c')
1849 for c in ('A', 'B'):
1850 rv = self.run(cmd % (c, c), ignore_status=True)
1851 if rv.exit_status:
1852 raise error.AutoservError(
1853 'Firmware %c is in a bad state.' % c)
1854 finally:
1855 # Remove the tempoary files.
1856 self.run('rm -rf /tmp/verify_firmware')
Tom Wai-Hong Tambea741c2016-01-21 07:20:14 +08001857 else:
1858 logging.info('Do not care about firmware status when the host '
1859 'is not in pools that support firmware repair.')
1860
1861
beepsc87ff602013-07-31 21:53:00 -07001862 def cleanup(self):
MK Ryu35d661e2014-09-25 17:44:10 -07001863 self.run('rm -f %s' % client_constants.CLEANUP_LOGS_PAUSED_FILE)
Scott Zawalskiddbc31e2012-11-15 11:29:01 -05001864 try:
beepsc87ff602013-07-31 21:53:00 -07001865 self._restart_ui()
1866 except (error.AutotestRunError, error.AutoservRunError,
1867 FactoryImageCheckerException):
Ilja H. Friedel04be2bd2014-05-07 21:29:59 -07001868 logging.warning('Unable to restart ui, rebooting device.')
Scott Zawalskiddbc31e2012-11-15 11:29:01 -05001869 # Since restarting the UI fails fall back to normal Autotest
1870 # cleanup routines, i.e. reboot the machine.
Fang Deng0ca40e22013-08-27 17:47:44 -07001871 super(CrosHost, self).cleanup()
Simran Basi5e6339a2013-03-21 11:34:32 -07001872 # Check if the rpm outlet was manipulated.
Simran Basid5e5e272012-09-24 15:23:59 -07001873 if self.has_power():
Simran Basi5e6339a2013-03-21 11:34:32 -07001874 self._cleanup_poweron()
Dan Shi549fb822015-03-24 18:01:11 -07001875 self.verify_cros_version_label()
J. Richard Barnette45e93de2012-04-11 17:24:15 -07001876
1877
Yu-Ju Honga2be94a2012-07-31 09:48:52 -07001878 def reboot(self, **dargs):
1879 """
1880 This function reboots the site host. The more generic
1881 RemoteHost.reboot() performs sync and sleeps for 5
1882 seconds. This is not necessary for Chrome OS devices as the
1883 sync should be finished in a short time during the reboot
1884 command.
1885 """
Tom Wai-Hong Tamf5cd1d42012-08-13 12:04:08 +08001886 if 'reboot_cmd' not in dargs:
Doug Anderson7d5aeb22014-02-27 15:12:17 -08001887 reboot_timeout = dargs.get('reboot_timeout', 10)
J. Richard Barnette9af19632015-09-25 12:18:03 -07001888 dargs['reboot_cmd'] = ('sleep 1; '
1889 'reboot & sleep %d; '
1890 'reboot -f' % reboot_timeout)
Yu-Ju Honga2be94a2012-07-31 09:48:52 -07001891 # Enable fastsync to avoid running extra sync commands before reboot.
Tom Wai-Hong Tamf5cd1d42012-08-13 12:04:08 +08001892 if 'fastsync' not in dargs:
1893 dargs['fastsync'] = True
Michael Liangda8c60a2014-06-03 13:24:51 -07001894
Charlie Mooneya8e6dab2014-05-29 14:37:55 -07001895 # For purposes of logging reboot times:
1896 # Get the board name i.e. 'daisy_spring'
Michael Liangca4f5a62014-07-10 15:45:13 -07001897 board_fullname = self.get_board()
1898
1899 # Strip the prefix and add it to dargs.
1900 dargs['board'] = board_fullname[board_fullname.find(':')+1:]
Fang Deng0ca40e22013-08-27 17:47:44 -07001901 super(CrosHost, self).reboot(**dargs)
Yu-Ju Honga2be94a2012-07-31 09:48:52 -07001902
1903
Gwendal Grignou7a61d2f2014-05-23 11:05:51 -07001904 def suspend(self, **dargs):
1905 """
1906 This function suspends the site host.
1907 """
1908 suspend_time = dargs.get('suspend_time', 60)
1909 dargs['timeout'] = suspend_time
1910 if 'suspend_cmd' not in dargs:
J. Richard Barnette9af19632015-09-25 12:18:03 -07001911 dargs['suspend_cmd'] = ' && '.join([
1912 'echo 0 > /sys/class/rtc/rtc0/wakealarm',
Gwendal Grignou7a61d2f2014-05-23 11:05:51 -07001913 'echo +%d > /sys/class/rtc/rtc0/wakealarm' % suspend_time,
J. Richard Barnette9af19632015-09-25 12:18:03 -07001914 'powerd_dbus_suspend --delay=0'])
Gwendal Grignou7a61d2f2014-05-23 11:05:51 -07001915 super(CrosHost, self).suspend(**dargs)
1916
1917
Simran Basiec564392014-08-25 16:48:09 -07001918 def upstart_status(self, service_name):
1919 """Check the status of an upstart init script.
1920
1921 @param service_name: Service to look up.
1922
1923 @returns True if the service is running, False otherwise.
1924 """
1925 return self.run('status %s | grep start/running' %
1926 service_name).stdout.strip() != ''
1927
1928
J. Richard Barnette45e93de2012-04-11 17:24:15 -07001929 def verify_software(self):
Richard Barnetteb2bc13c2013-01-08 17:32:51 -08001930 """Verify working software on a Chrome OS system.
J. Richard Barnette45e93de2012-04-11 17:24:15 -07001931
Richard Barnetteb2bc13c2013-01-08 17:32:51 -08001932 Tests for the following conditions:
1933 1. All conditions tested by the parent version of this
1934 function.
1935 2. Sufficient space in /mnt/stateful_partition.
Fang Deng6b05f5b2013-03-20 13:42:11 -07001936 3. Sufficient space in /mnt/stateful_partition/encrypted.
1937 4. update_engine answers a simple status request over DBus.
J. Richard Barnette45e93de2012-04-11 17:24:15 -07001938
J. Richard Barnette45e93de2012-04-11 17:24:15 -07001939 """
MK Ryu35d661e2014-09-25 17:44:10 -07001940 # Check if a job was crashed on this host.
1941 # If yes, avoid verification until crash-logs are collected.
1942 if self._need_crash_logs():
1943 raise error.AutoservCrashLogCollectRequired(
1944 'Need to collect crash-logs before verification')
1945
Fang Deng0ca40e22013-08-27 17:47:44 -07001946 super(CrosHost, self).verify_software()
Dan Shib8540a52015-07-16 14:18:23 -07001947 default_kilo_inodes_required = CONFIG.get_config_value(
1948 'SERVER', 'kilo_inodes_required', type=int, default=100)
1949 board = self.get_board().replace(ds_constants.BOARD_PREFIX, '')
1950 kilo_inodes_required = CONFIG.get_config_value(
1951 'SERVER', 'kilo_inodes_required_%s' % board,
1952 type=int, default=default_kilo_inodes_required)
1953 self.check_inodes('/mnt/stateful_partition', kilo_inodes_required)
J. Richard Barnette45e93de2012-04-11 17:24:15 -07001954 self.check_diskspace(
1955 '/mnt/stateful_partition',
Dan Shib8540a52015-07-16 14:18:23 -07001956 CONFIG.get_config_value(
Fang Deng6b05f5b2013-03-20 13:42:11 -07001957 'SERVER', 'gb_diskspace_required', type=float,
1958 default=20.0))
Gaurav Shahe448af82014-06-19 15:18:59 -07001959 encrypted_stateful_path = '/mnt/stateful_partition/encrypted'
1960 # Not all targets build with encrypted stateful support.
1961 if self.path_exists(encrypted_stateful_path):
1962 self.check_diskspace(
1963 encrypted_stateful_path,
Dan Shib8540a52015-07-16 14:18:23 -07001964 CONFIG.get_config_value(
Gaurav Shahe448af82014-06-19 15:18:59 -07001965 'SERVER', 'gb_encrypted_diskspace_required', type=float,
1966 default=0.1))
beepsc87ff602013-07-31 21:53:00 -07001967
Simran Basiec564392014-08-25 16:48:09 -07001968 if not self.upstart_status('system-services'):
Prashanth B5d0a0512014-04-25 12:26:08 -07001969 raise error.AutoservError('Chrome failed to reach login. '
1970 'System services not running.')
1971
beepsc87ff602013-07-31 21:53:00 -07001972 # Factory images don't run update engine,
1973 # goofy controls dbus on these DUTs.
1974 if not self._is_factory_image():
1975 self.run('update_engine_client --status')
Scott Zawalskifbca4a92013-03-04 15:56:42 -05001976 # Makes sure python is present, loads and can use built in functions.
1977 # We have seen cases where importing cPickle fails with undefined
1978 # symbols in cPickle.so.
1979 self.run('python -c "import cPickle"')
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07001980
Dan Shi549fb822015-03-24 18:01:11 -07001981 self.verify_cros_version_label()
1982
Darren Krahn0bd18e82015-10-28 23:30:46 +00001983 self.verify_tpm_status()
1984
Tom Wai-Hong Tambea741c2016-01-21 07:20:14 +08001985 self.verify_firmware_status()
1986
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07001987
Dan Shi49ca0932014-11-14 11:22:27 -08001988 def verify_hardware(self):
1989 """Verify hardware system of a Chrome OS system.
1990
1991 Check following hardware conditions:
1992 1. Battery level.
1993 2. Is power adapter connected.
1994 """
1995 logging.info('Battery percentage: %s', self.get_battery_percentage())
Dan Shie9b765d2014-12-29 16:59:49 -08001996 if self.is_ac_connected() is None:
1997 logging.info('Can not determine if the device has power adapter '
1998 'connected.')
1999 else:
2000 logging.info('Device %s power adapter connected and charging.',
2001 'has' if self.is_ac_connected() else 'does not have')
Dan Shi49ca0932014-11-14 11:22:27 -08002002
2003
Fang Deng96667ca2013-08-01 17:46:18 -07002004 def make_ssh_command(self, user='root', port=22, opts='', hosts_file=None,
2005 connect_timeout=None, alive_interval=None):
2006 """Override default make_ssh_command to use options tuned for Chrome OS.
2007
2008 Tuning changes:
2009 - ConnectTimeout=30; maximum of 30 seconds allowed for an SSH
2010 connection failure. Consistency with remote_access.sh.
2011
Samuel Tan2ce155b2015-06-23 18:24:38 -07002012 - ServerAliveInterval=900; which causes SSH to ping connection every
2013 900 seconds. In conjunction with ServerAliveCountMax ensures
2014 that if the connection dies, Autotest will bail out.
Fang Deng96667ca2013-08-01 17:46:18 -07002015 Originally tried 60 secs, but saw frequent job ABORTS where
Samuel Tan2ce155b2015-06-23 18:24:38 -07002016 the test completed successfully. Later increased from 180 seconds to
2017 900 seconds to account for tests where the DUT is suspended for
2018 longer periods of time.
Fang Deng96667ca2013-08-01 17:46:18 -07002019
2020 - ServerAliveCountMax=3; consistency with remote_access.sh.
2021
2022 - ConnectAttempts=4; reduce flakiness in connection errors;
2023 consistency with remote_access.sh.
2024
2025 - UserKnownHostsFile=/dev/null; we don't care about the keys.
2026 Host keys change with every new installation, don't waste
2027 memory/space saving them.
2028
2029 - SSH protocol forced to 2; needed for ServerAliveInterval.
2030
2031 @param user User name to use for the ssh connection.
2032 @param port Port on the target host to use for ssh connection.
2033 @param opts Additional options to the ssh command.
2034 @param hosts_file Ignored.
2035 @param connect_timeout Ignored.
2036 @param alive_interval Ignored.
2037 """
Aviv Keshetc5947fa2013-09-04 14:06:29 -07002038 base_command = ('/usr/bin/ssh -a -x %s %s %s'
2039 ' -o StrictHostKeyChecking=no'
Fang Deng96667ca2013-08-01 17:46:18 -07002040 ' -o UserKnownHostsFile=/dev/null -o BatchMode=yes'
Samuel Tan2ce155b2015-06-23 18:24:38 -07002041 ' -o ConnectTimeout=30 -o ServerAliveInterval=900'
Fang Deng96667ca2013-08-01 17:46:18 -07002042 ' -o ServerAliveCountMax=3 -o ConnectionAttempts=4'
2043 ' -o Protocol=2 -l %s -p %d')
Aviv Keshetc5947fa2013-09-04 14:06:29 -07002044 return base_command % (self._ssh_verbosity_flag, self._ssh_options,
2045 opts, user, port)
Jason Abeleb6f924f2013-11-13 16:01:54 -08002046 def syslog(self, message, tag='autotest'):
2047 """Logs a message to syslog on host.
2048
2049 @param message String message to log into syslog
2050 @param tag String tag prefix for syslog
2051
2052 """
2053 self.run('logger -t "%s" "%s"' % (tag, message))
2054
2055
J. Richard Barnetteb6de7e32013-02-14 13:28:04 -08002056 def _ping_check_status(self, status):
2057 """Ping the host once, and return whether it has a given status.
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002058
J. Richard Barnetteb6de7e32013-02-14 13:28:04 -08002059 @param status Check the ping status against this value.
2060 @return True iff `status` and the result of ping are the same
2061 (i.e. both True or both False).
2062
2063 """
2064 ping_val = utils.ping(self.hostname, tries=1, deadline=1)
2065 return not (status ^ (ping_val == 0))
2066
2067 def _ping_wait_for_status(self, status, timeout):
2068 """Wait for the host to have a given status (UP or DOWN).
2069
2070 Status is checked by polling. Polling will not last longer
2071 than the number of seconds in `timeout`. The polling
2072 interval will be long enough that only approximately
2073 _PING_WAIT_COUNT polling cycles will be executed, subject
2074 to a maximum interval of about one minute.
2075
2076 @param status Waiting will stop immediately if `ping` of the
2077 host returns this status.
2078 @param timeout Poll for at most this many seconds.
2079 @return True iff the host status from `ping` matched the
2080 requested status at the time of return.
2081
2082 """
2083 # _ping_check_status() takes about 1 second, hence the
2084 # "- 1" in the formula below.
2085 poll_interval = min(int(timeout / self._PING_WAIT_COUNT), 60) - 1
2086 end_time = time.time() + timeout
2087 while time.time() <= end_time:
2088 if self._ping_check_status(status):
2089 return True
2090 if poll_interval > 0:
2091 time.sleep(poll_interval)
2092
2093 # The last thing we did was sleep(poll_interval), so it may
2094 # have been too long since the last `ping`. Check one more
2095 # time, just to be sure.
2096 return self._ping_check_status(status)
2097
2098 def ping_wait_up(self, timeout):
2099 """Wait for the host to respond to `ping`.
2100
2101 N.B. This method is not a reliable substitute for
2102 `wait_up()`, because a host that responds to ping will not
2103 necessarily respond to ssh. This method should only be used
2104 if the target DUT can be considered functional even if it
2105 can't be reached via ssh.
2106
2107 @param timeout Minimum time to allow before declaring the
2108 host to be non-responsive.
2109 @return True iff the host answered to ping before the timeout.
2110
2111 """
2112 return self._ping_wait_for_status(self._PING_STATUS_UP, timeout)
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002113
Andrew Bresticker678c0c72013-01-22 10:44:09 -08002114 def ping_wait_down(self, timeout):
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002115 """Wait until the host no longer responds to `ping`.
2116
J. Richard Barnetteb6de7e32013-02-14 13:28:04 -08002117 This function can be used as a slightly faster version of
2118 `wait_down()`, by avoiding potentially long ssh timeouts.
2119
2120 @param timeout Minimum time to allow for the host to become
2121 non-responsive.
2122 @return True iff the host quit answering ping before the
2123 timeout.
2124
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002125 """
J. Richard Barnetteb6de7e32013-02-14 13:28:04 -08002126 return self._ping_wait_for_status(self._PING_STATUS_DOWN, timeout)
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002127
Tom Wai-Hong Tamfced4f62014-04-17 10:56:30 +08002128 def test_wait_for_sleep(self, sleep_timeout=None):
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002129 """Wait for the client to enter low-power sleep mode.
2130
2131 The test for "is asleep" can't distinguish a system that is
2132 powered off; to confirm that the unit was asleep, it is
2133 necessary to force resume, and then call
2134 `test_wait_for_resume()`.
2135
2136 This function is expected to be called from a test as part
2137 of a sequence like the following:
2138
2139 ~~~~~~~~
2140 boot_id = host.get_boot_id()
2141 # trigger sleep on the host
2142 host.test_wait_for_sleep()
2143 # trigger resume on the host
2144 host.test_wait_for_resume(boot_id)
2145 ~~~~~~~~
2146
Tom Wai-Hong Tamfced4f62014-04-17 10:56:30 +08002147 @param sleep_timeout time limit in seconds to allow the host sleep.
2148
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002149 @exception TestFail The host did not go to sleep within
2150 the allowed time.
2151 """
Tom Wai-Hong Tamfced4f62014-04-17 10:56:30 +08002152 if sleep_timeout is None:
2153 sleep_timeout = self.SLEEP_TIMEOUT
2154
2155 if not self.ping_wait_down(timeout=sleep_timeout):
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002156 raise error.TestFail(
Tom Wai-Hong Tamfced4f62014-04-17 10:56:30 +08002157 'client failed to sleep after %d seconds' % sleep_timeout)
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002158
2159
Tom Wai-Hong Tamfced4f62014-04-17 10:56:30 +08002160 def test_wait_for_resume(self, old_boot_id, resume_timeout=None):
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002161 """Wait for the client to resume from low-power sleep mode.
2162
2163 The `old_boot_id` parameter should be the value from
2164 `get_boot_id()` obtained prior to entering sleep mode. A
2165 `TestFail` exception is raised if the boot id changes.
2166
2167 See @ref test_wait_for_sleep for more on this function's
2168 usage.
2169
J. Richard Barnette7214e0b2013-02-06 15:20:49 -08002170 @param old_boot_id A boot id value obtained before the
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002171 target host went to sleep.
Tom Wai-Hong Tamfced4f62014-04-17 10:56:30 +08002172 @param resume_timeout time limit in seconds to allow the host up.
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002173
2174 @exception TestFail The host did not respond within the
2175 allowed time.
2176 @exception TestFail The host responded, but the boot id test
2177 indicated a reboot rather than a sleep
2178 cycle.
2179 """
Tom Wai-Hong Tamfced4f62014-04-17 10:56:30 +08002180 if resume_timeout is None:
2181 resume_timeout = self.RESUME_TIMEOUT
2182
2183 if not self.wait_up(timeout=resume_timeout):
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002184 raise error.TestFail(
2185 'client failed to resume from sleep after %d seconds' %
Tom Wai-Hong Tamfced4f62014-04-17 10:56:30 +08002186 resume_timeout)
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002187 else:
2188 new_boot_id = self.get_boot_id()
2189 if new_boot_id != old_boot_id:
Tom Wai-Hong Tam01792682015-01-06 08:00:46 +08002190 logging.error('client rebooted (old boot %s, new boot %s)',
2191 old_boot_id, new_boot_id)
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002192 raise error.TestFail(
Tom Wai-Hong Tam01792682015-01-06 08:00:46 +08002193 'client rebooted, but sleep was expected')
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002194
2195
Tom Wai-Hong Tamfe005c22014-12-03 09:25:44 +08002196 def test_wait_for_shutdown(self, shutdown_timeout=None):
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002197 """Wait for the client to shut down.
2198
2199 The test for "has shut down" can't distinguish a system that
2200 is merely asleep; to confirm that the unit was down, it is
2201 necessary to force boot, and then call test_wait_for_boot().
2202
2203 This function is expected to be called from a test as part
2204 of a sequence like the following:
2205
2206 ~~~~~~~~
2207 boot_id = host.get_boot_id()
2208 # trigger shutdown on the host
2209 host.test_wait_for_shutdown()
2210 # trigger boot on the host
2211 host.test_wait_for_boot(boot_id)
2212 ~~~~~~~~
2213
Tom Wai-Hong Tamfe005c22014-12-03 09:25:44 +08002214 @param shutdown_timeout time limit in seconds to allow the host down.
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002215 @exception TestFail The host did not shut down within the
2216 allowed time.
2217 """
Tom Wai-Hong Tamfe005c22014-12-03 09:25:44 +08002218 if shutdown_timeout is None:
2219 shutdown_timeout = self.SHUTDOWN_TIMEOUT
2220
2221 if not self.ping_wait_down(timeout=shutdown_timeout):
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002222 raise error.TestFail(
2223 'client failed to shut down after %d seconds' %
Tom Wai-Hong Tamfe005c22014-12-03 09:25:44 +08002224 shutdown_timeout)
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002225
2226
2227 def test_wait_for_boot(self, old_boot_id=None):
2228 """Wait for the client to boot from cold power.
2229
2230 The `old_boot_id` parameter should be the value from
2231 `get_boot_id()` obtained prior to shutting down. A
2232 `TestFail` exception is raised if the boot id does not
2233 change. The boot id test is omitted if `old_boot_id` is not
2234 specified.
2235
2236 See @ref test_wait_for_shutdown for more on this function's
2237 usage.
2238
J. Richard Barnette7214e0b2013-02-06 15:20:49 -08002239 @param old_boot_id A boot id value obtained before the
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002240 shut down.
2241
2242 @exception TestFail The host did not respond within the
2243 allowed time.
2244 @exception TestFail The host responded, but the boot id test
2245 indicated that there was no reboot.
2246 """
J. Richard Barnetteeb69d722012-06-18 17:29:44 -07002247 if not self.wait_up(timeout=self.REBOOT_TIMEOUT):
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002248 raise error.TestFail(
2249 'client failed to reboot after %d seconds' %
J. Richard Barnetteeb69d722012-06-18 17:29:44 -07002250 self.REBOOT_TIMEOUT)
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002251 elif old_boot_id:
2252 if self.get_boot_id() == old_boot_id:
Tom Wai-Hong Tam01792682015-01-06 08:00:46 +08002253 logging.error('client not rebooted (boot %s)',
2254 old_boot_id)
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002255 raise error.TestFail(
Tom Wai-Hong Tam01792682015-01-06 08:00:46 +08002256 'client is back up, but did not reboot')
Simran Basid5e5e272012-09-24 15:23:59 -07002257
2258
2259 @staticmethod
2260 def check_for_rpm_support(hostname):
2261 """For a given hostname, return whether or not it is powered by an RPM.
2262
Simran Basi1df55112013-09-06 11:25:09 -07002263 @param hostname: hostname to check for rpm support.
2264
Simran Basid5e5e272012-09-24 15:23:59 -07002265 @return None if this host does not follows the defined naming format
2266 for RPM powered DUT's in the lab. If it does follow the format,
2267 it returns a regular expression MatchObject instead.
2268 """
Fang Dengbaff9082015-01-06 13:46:15 -08002269 return re.match(CrosHost._RPM_HOSTNAME_REGEX, hostname)
Simran Basid5e5e272012-09-24 15:23:59 -07002270
2271
2272 def has_power(self):
2273 """For this host, return whether or not it is powered by an RPM.
2274
2275 @return True if this host is in the CROS lab and follows the defined
2276 naming format.
2277 """
Fang Deng0ca40e22013-08-27 17:47:44 -07002278 return CrosHost.check_for_rpm_support(self.hostname)
Simran Basid5e5e272012-09-24 15:23:59 -07002279
2280
Ismail Noorbasha07fdb612013-02-14 14:13:31 -08002281 def _set_power(self, state, power_method):
2282 """Sets the power to the host via RPM, Servo or manual.
2283
2284 @param state Specifies which power state to set to DUT
2285 @param power_method Specifies which method of power control to
2286 use. By default "RPM" will be used. Valid values
2287 are the strings "RPM", "manual", "servoj10".
2288
2289 """
2290 ACCEPTABLE_STATES = ['ON', 'OFF']
2291
2292 if state.upper() not in ACCEPTABLE_STATES:
2293 raise error.TestError('State must be one of: %s.'
2294 % (ACCEPTABLE_STATES,))
2295
2296 if power_method == self.POWER_CONTROL_SERVO:
2297 logging.info('Setting servo port J10 to %s', state)
2298 self.servo.set('prtctl3_pwren', state.lower())
2299 time.sleep(self._USB_POWER_TIMEOUT)
2300 elif power_method == self.POWER_CONTROL_MANUAL:
2301 logging.info('You have %d seconds to set the AC power to %s.',
2302 self._POWER_CYCLE_TIMEOUT, state)
2303 time.sleep(self._POWER_CYCLE_TIMEOUT)
2304 else:
2305 if not self.has_power():
2306 raise error.TestFail('DUT does not have RPM connected.')
Simran Basi5e6339a2013-03-21 11:34:32 -07002307 afe = frontend_wrappers.RetryingAFE(timeout_min=5, delay_sec=10)
2308 afe.set_host_attribute(self._RPM_OUTLET_CHANGED, True,
2309 hostname=self.hostname)
Simran Basi1df55112013-09-06 11:25:09 -07002310 rpm_client.set_power(self.hostname, state.upper(), timeout_mins=5)
Simran Basid5e5e272012-09-24 15:23:59 -07002311
2312
Ismail Noorbasha07fdb612013-02-14 14:13:31 -08002313 def power_off(self, power_method=POWER_CONTROL_RPM):
2314 """Turn off power to this host via RPM, Servo or manual.
2315
2316 @param power_method Specifies which method of power control to
2317 use. By default "RPM" will be used. Valid values
2318 are the strings "RPM", "manual", "servoj10".
2319
2320 """
2321 self._set_power('OFF', power_method)
Simran Basid5e5e272012-09-24 15:23:59 -07002322
2323
Ismail Noorbasha07fdb612013-02-14 14:13:31 -08002324 def power_on(self, power_method=POWER_CONTROL_RPM):
2325 """Turn on power to this host via RPM, Servo or manual.
2326
2327 @param power_method Specifies which method of power control to
2328 use. By default "RPM" will be used. Valid values
2329 are the strings "RPM", "manual", "servoj10".
2330
2331 """
2332 self._set_power('ON', power_method)
2333
2334
2335 def power_cycle(self, power_method=POWER_CONTROL_RPM):
2336 """Cycle power to this host by turning it OFF, then ON.
2337
2338 @param power_method Specifies which method of power control to
2339 use. By default "RPM" will be used. Valid values
2340 are the strings "RPM", "manual", "servoj10".
2341
2342 """
2343 if power_method in (self.POWER_CONTROL_SERVO,
2344 self.POWER_CONTROL_MANUAL):
2345 self.power_off(power_method=power_method)
2346 time.sleep(self._POWER_CYCLE_TIMEOUT)
2347 self.power_on(power_method=power_method)
2348 else:
2349 rpm_client.set_power(self.hostname, 'CYCLE')
Simran Basic6f1f7a2012-10-16 10:47:46 -07002350
2351
2352 def get_platform(self):
2353 """Determine the correct platform label for this host.
2354
2355 @returns a string representing this host's platform.
2356 """
2357 crossystem = utils.Crossystem(self)
2358 crossystem.init()
2359 # Extract fwid value and use the leading part as the platform id.
2360 # fwid generally follow the format of {platform}.{firmware version}
2361 # Example: Alex.X.YYY.Z or Google_Alex.X.YYY.Z
2362 platform = crossystem.fwid().split('.')[0].lower()
2363 # Newer platforms start with 'Google_' while the older ones do not.
2364 return platform.replace('google_', '')
2365
2366
Hung-ying Tyanb1328032014-04-01 14:18:54 +08002367 def get_architecture(self):
2368 """Determine the correct architecture label for this host.
2369
2370 @returns a string representing this host's architecture.
2371 """
2372 crossystem = utils.Crossystem(self)
2373 crossystem.init()
2374 return crossystem.arch()
2375
2376
Luis Lozano40b7d0d2014-01-17 15:12:06 -08002377 def get_chrome_version(self):
2378 """Gets the Chrome version number and milestone as strings.
2379
2380 Invokes "chrome --version" to get the version number and milestone.
2381
2382 @return A tuple (chrome_ver, milestone) where "chrome_ver" is the
2383 current Chrome version number as a string (in the form "W.X.Y.Z")
2384 and "milestone" is the first component of the version number
2385 (the "W" from "W.X.Y.Z"). If the version number cannot be parsed
2386 in the "W.X.Y.Z" format, the "chrome_ver" will be the full output
2387 of "chrome --version" and the milestone will be the empty string.
2388
2389 """
MK Ryu35d661e2014-09-25 17:44:10 -07002390 version_string = self.run(client_constants.CHROME_VERSION_COMMAND).stdout
Luis Lozano40b7d0d2014-01-17 15:12:06 -08002391 return utils.parse_chrome_version(version_string)
2392
Aviv Keshet74c89a92013-02-04 15:18:30 -08002393 @label_decorator()
Simran Basic6f1f7a2012-10-16 10:47:46 -07002394 def get_board(self):
2395 """Determine the correct board label for this host.
2396
2397 @returns a string representing this host's board.
2398 """
2399 release_info = utils.parse_cmd_output('cat /etc/lsb-release',
2400 run_method=self.run)
2401 board = release_info['CHROMEOS_RELEASE_BOARD']
2402 # Devices in the lab generally have the correct board name but our own
2403 # development devices have {board_name}-signed-{key_type}. The board
2404 # name may also begin with 'x86-' which we need to keep.
Simran Basi833814b2013-01-29 13:13:43 -08002405 board_format_string = ds_constants.BOARD_PREFIX + '%s'
Simran Basic6f1f7a2012-10-16 10:47:46 -07002406 if 'x86' not in board:
Simran Basi833814b2013-01-29 13:13:43 -08002407 return board_format_string % board.split('-')[0]
2408 return board_format_string % '-'.join(board.split('-')[0:2])
Simran Basic6f1f7a2012-10-16 10:47:46 -07002409
2410
Aviv Keshet74c89a92013-02-04 15:18:30 -08002411 @label_decorator('lightsensor')
Simran Basic6f1f7a2012-10-16 10:47:46 -07002412 def has_lightsensor(self):
2413 """Determine the correct board label for this host.
2414
2415 @returns the string 'lightsensor' if this host has a lightsensor or
2416 None if it does not.
2417 """
2418 search_cmd = "find -L %s -maxdepth 4 | egrep '%s'" % (
Richard Barnette82c35912012-11-20 10:09:10 -08002419 self._LIGHTSENSOR_SEARCH_DIR, '|'.join(self._LIGHTSENSOR_FILES))
Simran Basic6f1f7a2012-10-16 10:47:46 -07002420 try:
2421 # Run the search cmd following the symlinks. Stderr_tee is set to
2422 # None as there can be a symlink loop, but the command will still
2423 # execute correctly with a few messages printed to stderr.
2424 self.run(search_cmd, stdout_tee=None, stderr_tee=None)
2425 return 'lightsensor'
2426 except error.AutoservRunError:
2427 # egrep exited with a return code of 1 meaning none of the possible
2428 # lightsensor files existed.
2429 return None
2430
2431
Aviv Keshet74c89a92013-02-04 15:18:30 -08002432 @label_decorator('bluetooth')
Simran Basic6f1f7a2012-10-16 10:47:46 -07002433 def has_bluetooth(self):
2434 """Determine the correct board label for this host.
2435
2436 @returns the string 'bluetooth' if this host has bluetooth or
2437 None if it does not.
2438 """
2439 try:
2440 self.run('test -d /sys/class/bluetooth/hci0')
2441 # test exited with a return code of 0.
2442 return 'bluetooth'
2443 except error.AutoservRunError:
2444 # test exited with a return code 1 meaning the directory did not
2445 # exist.
2446 return None
2447
2448
Bill Richardson4f595f52014-02-13 16:20:26 -08002449 @label_decorator('ec')
2450 def get_ec(self):
2451 """
2452 Determine the type of EC on this host.
2453
2454 @returns a string representing this host's embedded controller type.
2455 At present, it only returns "ec:cros", for Chrome OS ECs. Other types
2456 of EC (or none) don't return any strings, since no tests depend on
2457 those.
2458 """
2459 cmd = 'mosys ec info'
2460 # The output should look like these, so that the last field should
2461 # match our EC version scheme:
2462 #
2463 # stm | stm32f100 | snow_v1.3.139-375eb9f
2464 # ti | Unknown-10de | peppy_v1.5.114-5d52788
2465 #
2466 # Non-Chrome OS ECs will look like these:
2467 #
2468 # ENE | KB932 | 00BE107A00
2469 # ite | it8518 | 3.08
2470 #
2471 # And some systems don't have ECs at all (Lumpy, for example).
2472 regexp = r'^.*\|\s*(\S+_v\d+\.\d+\.\d+-[0-9a-f]+)\s*$'
2473
2474 ecinfo = self.run(command=cmd, ignore_status=True)
2475 if ecinfo.exit_status == 0:
2476 res = re.search(regexp, ecinfo.stdout)
2477 if res:
2478 logging.info("EC version is %s", res.groups()[0])
2479 return 'ec:cros'
2480 logging.info("%s got: %s", cmd, ecinfo.stdout)
2481 # Has an EC, but it's not a Chrome OS EC
2482 return None
2483 logging.info("%s exited with status %d", cmd, ecinfo.exit_status)
2484 # No EC present
2485 return None
2486
2487
Alec Berg31b932b2014-04-04 16:09:11 -07002488 @label_decorator('accels')
2489 def get_accels(self):
2490 """
2491 Determine the type of accelerometers on this host.
2492
2493 @returns a string representing this host's accelerometer type.
2494 At present, it only returns "accel:cros-ec", for accelerometers
2495 attached to a Chrome OS EC, or none, if no accelerometers.
2496 """
2497 # Check to make sure we have ectool
2498 rv = self.run('which ectool', ignore_status=True)
2499 if rv.exit_status:
2500 logging.info("No ectool cmd found, assuming no EC accelerometers")
2501 return None
2502
2503 # Check that the EC supports the motionsense command
2504 rv = self.run('ectool motionsense', ignore_status=True)
2505 if rv.exit_status:
2506 logging.info("EC does not support motionsense command "
2507 "assuming no EC accelerometers")
2508 return None
2509
2510 # Check that EC motion sensors are active
2511 active = self.run('ectool motionsense active').stdout.split('\n')
2512 if active[0] == "0":
2513 logging.info("Motion sense inactive, assuming no EC accelerometers")
2514 return None
2515
2516 logging.info("EC accelerometers found")
2517 return 'accel:cros-ec'
2518
2519
Tom Wai-Hong Tam3d6790d2014-04-14 16:15:47 +08002520 @label_decorator('chameleon')
2521 def has_chameleon(self):
2522 """Determine if a Chameleon connected to this host.
2523
Tom Wai-Hong Tambadbb332014-10-10 02:59:41 +08002524 @returns a list containing two strings ('chameleon' and
2525 'chameleon:' + label, e.g. 'chameleon:hdmi') if this host
2526 has a Chameleon or None if it has not.
Tom Wai-Hong Tam3d6790d2014-04-14 16:15:47 +08002527 """
2528 if self._chameleon_host:
Tom Wai-Hong Tambadbb332014-10-10 02:59:41 +08002529 return ['chameleon', 'chameleon:' + self.chameleon.get_label()]
Tom Wai-Hong Tam3d6790d2014-04-14 16:15:47 +08002530 else:
2531 return None
2532
2533
Cheng-Yi Chiangf4104ff2014-12-23 19:39:01 +08002534 @label_decorator('audio_loopback_dongle')
2535 def has_loopback_dongle(self):
2536 """Determine if an audio loopback dongle is plugged to this host.
2537
2538 @returns 'audio_loopback_dongle' when there is an audio loopback dongle
2539 plugged to this host.
2540 None when there is no audio loopback dongle
2541 plugged to this host.
2542 """
Cheng-Yi Chiang8de78112015-05-27 14:47:08 +08002543 nodes_info = self.run(command=cras_utils.get_cras_nodes_cmd(),
2544 ignore_status=True).stdout
2545 if (cras_utils.node_type_is_plugged('HEADPHONE', nodes_info) and
2546 cras_utils.node_type_is_plugged('MIC', nodes_info)):
Cheng-Yi Chiangf4104ff2014-12-23 19:39:01 +08002547 return 'audio_loopback_dongle'
2548 else:
2549 return None
2550
2551
Derek Basehorec71ff622014-07-07 15:18:40 -07002552 @label_decorator('power_supply')
2553 def get_power_supply(self):
2554 """
2555 Determine what type of power supply the host has
2556
2557 @returns a string representing this host's power supply.
2558 'power:battery' when the device has a battery intended for
2559 extended use
2560 'power:AC_primary' when the device has a battery not intended
2561 for extended use (for moving the machine, etc)
2562 'power:AC_only' when the device has no battery at all.
2563 """
2564 psu = self.run(command='mosys psu type', ignore_status=True)
2565 if psu.exit_status:
2566 # The psu command for mosys is not included for all platforms. The
2567 # assumption is that the device will have a battery if the command
2568 # is not found.
2569 return 'power:battery'
2570
2571 psu_str = psu.stdout.strip()
2572 if psu_str == 'unknown':
2573 return None
2574
2575 return 'power:%s' % psu_str
2576
2577
Puthikorn Voravootivatfa011242014-03-14 18:45:11 -07002578 @label_decorator('storage')
2579 def get_storage(self):
2580 """
2581 Determine the type of boot device for this host.
2582
2583 Determine if the internal device is SCSI or dw_mmc device.
2584 Then check that it is SSD or HDD or eMMC or something else.
2585
2586 @returns a string representing this host's internal device type.
2587 'storage:ssd' when internal device is solid state drive
2588 'storage:hdd' when internal device is hard disk drive
2589 'storage:mmc' when internal device is mmc drive
2590 None When internal device is something else or
2591 when we are unable to determine the type
2592 """
2593 # The output should be /dev/mmcblk* for SD/eMMC or /dev/sd* for scsi
2594 rootdev_cmd = ' '.join(['. /usr/sbin/write_gpt.sh;',
2595 '. /usr/share/misc/chromeos-common.sh;',
2596 'load_base_vars;',
2597 'get_fixed_dst_drive'])
Puthikorn Voravootivat03c51682014-04-24 13:52:12 -07002598 rootdev = self.run(command=rootdev_cmd, ignore_status=True)
2599 if rootdev.exit_status:
2600 logging.info("Fail to run %s", rootdev_cmd)
2601 return None
Puthikorn Voravootivatfa011242014-03-14 18:45:11 -07002602 rootdev_str = rootdev.stdout.strip()
2603
2604 if not rootdev_str:
2605 return None
2606
2607 rootdev_base = os.path.basename(rootdev_str)
2608
2609 mmc_pattern = '/dev/mmcblk[0-9]'
2610 if re.match(mmc_pattern, rootdev_str):
2611 # Use type to determine if the internal device is eMMC or somthing
2612 # else. We can assume that MMC is always an internal device.
2613 type_cmd = 'cat /sys/block/%s/device/type' % rootdev_base
Puthikorn Voravootivat03c51682014-04-24 13:52:12 -07002614 type = self.run(command=type_cmd, ignore_status=True)
2615 if type.exit_status:
2616 logging.info("Fail to run %s", type_cmd)
2617 return None
Puthikorn Voravootivatfa011242014-03-14 18:45:11 -07002618 type_str = type.stdout.strip()
2619
2620 if type_str == 'MMC':
2621 return 'storage:mmc'
2622
2623 scsi_pattern = '/dev/sd[a-z]+'
2624 if re.match(scsi_pattern, rootdev.stdout):
2625 # Read symlink for /sys/block/sd* to determine if the internal
2626 # device is connected via ata or usb.
2627 link_cmd = 'readlink /sys/block/%s' % rootdev_base
Puthikorn Voravootivat03c51682014-04-24 13:52:12 -07002628 link = self.run(command=link_cmd, ignore_status=True)
2629 if link.exit_status:
2630 logging.info("Fail to run %s", link_cmd)
2631 return None
Puthikorn Voravootivatfa011242014-03-14 18:45:11 -07002632 link_str = link.stdout.strip()
2633 if 'usb' in link_str:
2634 return None
2635
2636 # Read rotation to determine if the internal device is ssd or hdd.
2637 rotate_cmd = str('cat /sys/block/%s/queue/rotational'
2638 % rootdev_base)
Puthikorn Voravootivat03c51682014-04-24 13:52:12 -07002639 rotate = self.run(command=rotate_cmd, ignore_status=True)
2640 if rotate.exit_status:
2641 logging.info("Fail to run %s", rotate_cmd)
2642 return None
Puthikorn Voravootivatfa011242014-03-14 18:45:11 -07002643 rotate_str = rotate.stdout.strip()
2644
2645 rotate_dict = {'0':'storage:ssd', '1':'storage:hdd'}
2646 return rotate_dict.get(rotate_str)
2647
2648 # All other internal device / error case will always fall here
2649 return None
2650
2651
Dan Shi4e9a2aa2014-03-24 14:28:42 -07002652 @label_decorator('servo')
2653 def get_servo(self):
2654 """Determine if the host has a servo attached.
2655
2656 If the host has a working servo attached, it should have a servo label.
2657
2658 @return: string 'servo' if the host has servo attached. Otherwise,
2659 returns None.
2660 """
2661 return 'servo' if self._servo_host else None
2662
2663
Dan Shi5beba472014-05-28 22:46:07 -07002664 @label_decorator('video_labels')
2665 def get_video_labels(self):
2666 """Run /usr/local/bin/avtest_label_detect to get a list of video labels.
2667
2668 Sample output of avtest_label_detect:
2669 Detected label: hw_video_acc_vp8
2670 Detected label: webcam
2671
2672 @return: A list of labels detected by tool avtest_label_detect.
2673 """
2674 try:
2675 result = self.run('/usr/local/bin/avtest_label_detect').stdout
2676 return re.findall('^Detected label: (\w+)$', result, re.M)
2677 except error.AutoservRunError:
2678 # The tool is not installed.
2679 return []
2680
2681
mussa584b4462014-06-20 15:13:28 -07002682 @label_decorator('video_glitch_detection')
2683 def is_video_glitch_detection_supported(self):
2684 """ Determine if a board under test is supported for video glitch
2685 detection tests.
2686
2687 @return: 'video_glitch_detection' if board is supported, None otherwise.
2688 """
Mussa5b589052015-10-26 17:55:26 -07002689 board = self.get_board().replace(ds_constants.BOARD_PREFIX, '')
mussa584b4462014-06-20 15:13:28 -07002690
Mussa5b589052015-10-26 17:55:26 -07002691 if board in video_test_constants.SUPPORTED_BOARDS:
2692 return 'video_glitch_detection'
mussa584b4462014-06-20 15:13:28 -07002693
Mussa5b589052015-10-26 17:55:26 -07002694 return None
mussa584b4462014-06-20 15:13:28 -07002695
mussa584b4462014-06-20 15:13:28 -07002696
Katherine Threlkeld7b97a9f2014-06-24 13:47:14 -07002697 @label_decorator('touch_labels')
2698 def get_touch(self):
2699 """
2700 Determine whether board under test has a touchpad or touchscreen.
2701
2702 @return: A list of some combination of 'touchscreen' and 'touchpad',
2703 depending on what is present on the device.
Katherine Threlkeldab83d392015-06-18 16:45:57 -07002704
Katherine Threlkeld7b97a9f2014-06-24 13:47:14 -07002705 """
2706 labels = []
Katherine Threlkeldab83d392015-06-18 16:45:57 -07002707 looking_for = ['touchpad', 'touchscreen']
2708 player = input_playback.InputPlayback()
2709 input_events = self.run('ls /dev/input/event*').stdout.strip().split()
2710 filename = '/tmp/touch_labels'
2711 for event in input_events:
2712 self.run('evtest %s > %s' % (event, filename), timeout=1,
2713 ignore_timeout=True)
2714 properties = self.run('cat %s' % filename).stdout
2715 input_type = player._determine_input_type(properties)
2716 if input_type in looking_for:
2717 labels.append(input_type)
2718 looking_for.remove(input_type)
2719 if len(looking_for) == 0:
2720 break
2721 self.run('rm %s' % filename)
2722
Katherine Threlkeld7b97a9f2014-06-24 13:47:14 -07002723 return labels
2724
Hung-ying Tyana39b0542015-06-30 10:36:42 +08002725
2726 @label_decorator('internal_display')
2727 def has_internal_display(self):
2728 """Determine if the device under test is equipped with an internal
2729 display.
2730
2731 @return: 'internal_display' if one is present; None otherwise.
2732 """
2733 from autotest_lib.client.cros.graphics import graphics_utils
2734 from autotest_lib.client.common_lib import utils as common_utils
2735
2736 def __system_output(cmd):
2737 return self.run(cmd).stdout
2738
2739 def __read_file(remote_path):
2740 return self.run('cat %s' % remote_path).stdout
2741
2742 # Hijack the necessary client functions so that we can take advantage
2743 # of the client lib here.
2744 # FIXME: find a less hacky way than this
2745 original_system_output = utils.system_output
2746 original_read_file = common_utils.read_file
2747 utils.system_output = __system_output
2748 common_utils.read_file = __read_file
2749 try:
2750 return ('internal_display' if graphics_utils.has_internal_display()
2751 else None)
2752 finally:
2753 utils.system_output = original_system_output
2754 common_utils.read_file = original_read_file
2755
2756
Eric Carusoee673ac2015-08-05 17:03:04 -07002757 @label_decorator('lucidsleep')
2758 def has_lucid_sleep_support(self):
2759 """Determine if the device under test has support for lucid sleep.
2760
2761 @return 'lucidsleep' if this board supports lucid sleep; None otherwise
2762 """
2763 board = self.get_board().replace(ds_constants.BOARD_PREFIX, '')
2764 return 'lucidsleep' if board in LUCID_SLEEP_BOARDS else None
2765
2766
Dan Shi85276d42014-04-08 22:11:45 -07002767 def is_boot_from_usb(self):
2768 """Check if DUT is boot from USB.
2769
2770 @return: True if DUT is boot from usb.
2771 """
2772 device = self.run('rootdev -s -d').stdout.strip()
2773 removable = int(self.run('cat /sys/block/%s/removable' %
2774 os.path.basename(device)).stdout.strip())
2775 return removable == 1
Helen Zhang17dae2b2014-11-11 09:25:52 -08002776
2777
2778 def read_from_meminfo(self, key):
Dan Shi49ca0932014-11-14 11:22:27 -08002779 """Return the memory info from /proc/meminfo
Helen Zhang17dae2b2014-11-11 09:25:52 -08002780
2781 @param key: meminfo requested
2782
2783 @return the memory value as a string
2784
2785 """
Helen Zhang17dae2b2014-11-11 09:25:52 -08002786 meminfo = self.run('grep %s /proc/meminfo' % key).stdout.strip()
2787 logging.debug('%s', meminfo)
2788 return int(re.search(r'\d+', meminfo).group(0))
Rohit Makasana8a4923c2015-08-13 17:04:26 -07002789
2790
2791 def get_board_type(self):
2792 """
2793 Get the DUT's device type from /etc/lsb-release.
Danny Chan471a8d12015-08-18 14:57:41 -07002794 DEVICETYPE can be one of CHROMEBOX, CHROMEBASE, CHROMEBOOK or more.
2795
2796 @return value of DEVICETYPE param from lsb-release.
Rohit Makasana8a4923c2015-08-13 17:04:26 -07002797 """
Danny Chan471a8d12015-08-18 14:57:41 -07002798 device_type = self.run('grep DEVICETYPE /etc/lsb-release',
2799 ignore_status=True).stdout
2800 if device_type:
Kalin Stoyanov524310b2015-08-21 16:24:04 -07002801 return device_type.split('=')[-1].strip()
Danny Chan471a8d12015-08-18 14:57:41 -07002802 return ''
Gilad Arnolda76bef02015-09-29 13:55:15 -07002803
2804
2805 def get_os_type(self):
2806 return 'cros'
Simran Basia5522a32015-10-06 11:01:24 -07002807
2808
2809 def enable_adb_testing(self):
2810 """Mark this host as an adb tester."""
Dan Shia2872172015-10-31 01:16:51 -07002811 self.run('touch %s' % constants.ANDROID_TESTER_FILEFLAG)