blob: 162a3f13bdf7c19e85269f4734d9562f5da89dd1 [file] [log] [blame]
J. Richard Barnette24adbf42012-04-11 15:04:53 -07001# Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
Dale Curtisaa5eedb2011-08-23 16:18:52 -07002# Use of this source code is governed by a BSD-style license that can be
3# found in the LICENSE file.
4
mussa584b4462014-06-20 15:13:28 -07005import ConfigParser
Aviv Keshet74c89a92013-02-04 15:18:30 -08006import functools
Christopher Wiley0ed712b2013-04-09 15:25:12 -07007import httplib
Darren Krahn495b0982015-09-21 19:12:51 -07008import json
J. Richard Barnette1d78b012012-05-15 13:56:30 -07009import logging
Dan Shi0f466e82013-02-22 15:44:58 -080010import os
Simran Basid5e5e272012-09-24 15:23:59 -070011import re
Christopher Wileyd78249a2013-03-01 13:05:31 -080012import socket
J. Richard Barnette134ec2c2012-04-25 12:59:37 -070013import time
J. Richard Barnette1d78b012012-05-15 13:56:30 -070014import xmlrpclib
J. Richard Barnette134ec2c2012-04-25 12:59:37 -070015
mussa584b4462014-06-20 15:13:28 -070016import common
J. Richard Barnette45e93de2012-04-11 17:24:15 -070017from autotest_lib.client.bin import utils
Dan Shi9cb0eec2014-06-03 09:04:50 -070018from autotest_lib.client.common_lib import autotemp
Richard Barnette0c73ffc2012-11-19 15:21:18 -080019from autotest_lib.client.common_lib import error
20from autotest_lib.client.common_lib import global_config
Dan Shi549fb822015-03-24 18:01:11 -070021from autotest_lib.client.common_lib import lsbrelease_utils
J. Richard Barnette45e93de2012-04-11 17:24:15 -070022from autotest_lib.client.common_lib.cros import autoupdater
Richard Barnette03a0c132012-11-05 12:40:35 -080023from autotest_lib.client.common_lib.cros import dev_server
Christopher Wileyd78249a2013-03-01 13:05:31 -080024from autotest_lib.client.common_lib.cros import retry
Gabe Blackb72f4fb2015-01-20 16:47:13 -080025from autotest_lib.client.common_lib.cros.graphite import autotest_es
Gabe Black1e1c41b2015-02-04 23:55:15 -080026from autotest_lib.client.common_lib.cros.graphite import autotest_stats
Hsinyu Chaoe0b08e62015-08-11 10:50:37 +000027from autotest_lib.client.cros import constants as client_constants
J. Richard Barnette84890bd2014-02-21 11:05:47 -080028from autotest_lib.client.cros import cros_ui
Cheng-Yi Chiangf4104ff2014-12-23 19:39:01 +080029from autotest_lib.client.cros.audio import cras_utils
Katherine Threlkeldab83d392015-06-18 16:45:57 -070030from autotest_lib.client.cros.input_playback import input_playback
MK Ryu35d661e2014-09-25 17:44:10 -070031from autotest_lib.server import autoserv_parser
32from autotest_lib.server import autotest
33from autotest_lib.server import constants
34from autotest_lib.server import crashcollect
Dan Shia1ecd5c2013-06-06 11:21:31 -070035from autotest_lib.server import utils as server_utils
Dan Shi9cb0eec2014-06-03 09:04:50 -070036from autotest_lib.server.cros import provision
Scott Zawalski89c44dd2013-02-26 09:28:02 -050037from autotest_lib.server.cros.dynamic_suite import constants as ds_constants
Simran Basi5e6339a2013-03-21 11:34:32 -070038from autotest_lib.server.cros.dynamic_suite import tools, frontend_wrappers
Dan Shi9cb0eec2014-06-03 09:04:50 -070039from autotest_lib.server.cros.faft.config.config import Config as FAFTConfig
Fang Deng96667ca2013-08-01 17:46:18 -070040from autotest_lib.server.hosts import abstract_ssh
Tom Wai-Hong Tamefe1c7f2014-01-02 14:00:11 +080041from autotest_lib.server.hosts import chameleon_host
Fang Deng5d518f42013-08-02 14:04:32 -070042from autotest_lib.server.hosts import servo_host
Simran Basidcff4252012-11-20 16:13:20 -080043from autotest_lib.site_utils.rpm_control_system import rpm_client
Simran Basid5e5e272012-09-24 15:23:59 -070044
45
beeps32a63082013-08-22 14:02:29 -070046try:
47 import jsonrpclib
48except ImportError:
49 jsonrpclib = None
Fang Deng96667ca2013-08-01 17:46:18 -070050
Fang Dengd1c2b732013-08-20 12:59:46 -070051
Dan Shib8540a52015-07-16 14:18:23 -070052CONFIG = global_config.global_config
53
Eric Carusoee673ac2015-08-05 17:03:04 -070054LUCID_SLEEP_BOARDS = ['samus', 'lulu']
55
beepsc87ff602013-07-31 21:53:00 -070056class FactoryImageCheckerException(error.AutoservError):
57 """Exception raised when an image is a factory image."""
58 pass
59
60
Aviv Keshet74c89a92013-02-04 15:18:30 -080061def add_label_detector(label_function_list, label_list=None, label=None):
62 """Decorator used to group functions together into the provided list.
63 @param label_function_list: List of label detecting functions to add
64 decorated function to.
65 @param label_list: List of detectable labels to add detectable labels to.
66 (Default: None)
67 @param label: Label string that is detectable by this detection function
68 (Default: None)
J. Richard Barnette7214e0b2013-02-06 15:20:49 -080069 """
Simran Basic6f1f7a2012-10-16 10:47:46 -070070 def add_func(func):
Aviv Keshet74c89a92013-02-04 15:18:30 -080071 """
72 @param func: The function to be added as a detector.
73 """
74 label_function_list.append(func)
75 if label and label_list is not None:
76 label_list.append(label)
Simran Basic6f1f7a2012-10-16 10:47:46 -070077 return func
78 return add_func
79
80
Fang Deng0ca40e22013-08-27 17:47:44 -070081class CrosHost(abstract_ssh.AbstractSSHHost):
J. Richard Barnette45e93de2012-04-11 17:24:15 -070082 """Chromium OS specific subclass of Host."""
83
84 _parser = autoserv_parser.autoserv_parser
Scott Zawalski62bacae2013-03-05 10:40:32 -050085 _AFE = frontend_wrappers.RetryingAFE(timeout_min=5, delay_sec=10)
J. Richard Barnette45e93de2012-04-11 17:24:15 -070086
Richard Barnette03a0c132012-11-05 12:40:35 -080087 # Timeout values (in seconds) associated with various Chrome OS
88 # state changes.
J. Richard Barnette134ec2c2012-04-25 12:59:37 -070089 #
Richard Barnette0c73ffc2012-11-19 15:21:18 -080090 # In general, a good rule of thumb is that the timeout can be up
91 # to twice the typical measured value on the slowest platform.
92 # The times here have not necessarily been empirically tested to
93 # meet this criterion.
J. Richard Barnetteeb69d722012-06-18 17:29:44 -070094 #
95 # SLEEP_TIMEOUT: Time to allow for suspend to memory.
Richard Barnette0c73ffc2012-11-19 15:21:18 -080096 # RESUME_TIMEOUT: Time to allow for resume after suspend, plus
97 # time to restart the netwowrk.
J. Richard Barnette84890bd2014-02-21 11:05:47 -080098 # SHUTDOWN_TIMEOUT: Time to allow for shut down.
J. Richard Barnetteeb69d722012-06-18 17:29:44 -070099 # BOOT_TIMEOUT: Time to allow for boot from power off. Among
Richard Barnette0c73ffc2012-11-19 15:21:18 -0800100 # other things, this must account for the 30 second dev-mode
J. Richard Barnetted4649c62013-03-06 17:42:27 -0800101 # screen delay and time to start the network.
J. Richard Barnetteeb69d722012-06-18 17:29:44 -0700102 # USB_BOOT_TIMEOUT: Time to allow for boot from a USB device,
Richard Barnette0c73ffc2012-11-19 15:21:18 -0800103 # including the 30 second dev-mode delay and time to start the
J. Richard Barnetted4649c62013-03-06 17:42:27 -0800104 # network.
beepsf079cfb2013-09-18 17:49:51 -0700105 # INSTALL_TIMEOUT: Time to allow for chromeos-install.
J. Richard Barnette84890bd2014-02-21 11:05:47 -0800106 # POWERWASH_BOOT_TIMEOUT: Time to allow for a reboot that
107 # includes powerwash.
J. Richard Barnetteeb69d722012-06-18 17:29:44 -0700108
109 SLEEP_TIMEOUT = 2
J. Richard Barnetted4649c62013-03-06 17:42:27 -0800110 RESUME_TIMEOUT = 10
Tom Wai-Hong Tamfe005c22014-12-03 09:25:44 +0800111 SHUTDOWN_TIMEOUT = 10
J. Richard Barnettefbcc7122013-07-24 18:24:59 -0700112 BOOT_TIMEOUT = 60
J. Richard Barnette5bab5f52015-08-03 13:14:38 -0700113 USB_BOOT_TIMEOUT = 300
J. Richard Barnette7817b052014-08-28 09:47:29 -0700114 INSTALL_TIMEOUT = 480
Dan Shi2c88eed2013-11-12 10:18:38 -0800115 POWERWASH_BOOT_TIMEOUT = 60
Chris Sosab76e0ee2013-05-22 16:55:41 -0700116
Dan Shica503482015-03-30 17:23:25 -0700117 # Minimum OS version that supports server side packaging. Older builds may
118 # not have server side package built or with Autotest code change to support
119 # server-side packaging.
Dan Shib8540a52015-07-16 14:18:23 -0700120 MIN_VERSION_SUPPORT_SSP = CONFIG.get_config_value(
Dan Shiced09e42015-04-17 16:09:34 -0700121 'AUTOSERV', 'min_version_support_ssp', type=int)
Dan Shica503482015-03-30 17:23:25 -0700122
J. Richard Barnette84890bd2014-02-21 11:05:47 -0800123 # REBOOT_TIMEOUT: How long to wait for a reboot.
124 #
Chris Sosab76e0ee2013-05-22 16:55:41 -0700125 # We have a long timeout to ensure we don't flakily fail due to other
126 # issues. Shorter timeouts are vetted in platform_RebootAfterUpdate.
Simran Basi1160e2c2013-10-04 16:00:24 -0700127 # TODO(sbasi - crbug.com/276094) Restore to 5 mins once the 'host did not
128 # return from reboot' bug is solved.
129 REBOOT_TIMEOUT = 480
Chris Sosab76e0ee2013-05-22 16:55:41 -0700130
Ismail Noorbasha07fdb612013-02-14 14:13:31 -0800131 # _USB_POWER_TIMEOUT: Time to allow for USB to power toggle ON and OFF.
132 # _POWER_CYCLE_TIMEOUT: Time to allow for manual power cycle.
133 _USB_POWER_TIMEOUT = 5
134 _POWER_CYCLE_TIMEOUT = 10
135
beeps32a63082013-08-22 14:02:29 -0700136 _RPC_PROXY_URL = 'http://localhost:%d'
Christopher Wileydd181852013-10-10 19:56:58 -0700137 _RPC_SHUTDOWN_POLLING_PERIOD_SECONDS = 2
Peter Qiu4410db72014-06-05 10:32:41 -0700138 # Set shutdown timeout to account for the time for restarting the UI.
139 _RPC_SHUTDOWN_TIMEOUT_SECONDS = cros_ui.RESTART_UI_TIMEOUT
Richard Barnette0c73ffc2012-11-19 15:21:18 -0800140
Dan Shib8540a52015-07-16 14:18:23 -0700141 _RPM_RECOVERY_BOARDS = CONFIG.get_config_value('CROS',
Richard Barnette82c35912012-11-20 10:09:10 -0800142 'rpm_recovery_boards', type=str).split(',')
143
144 _MAX_POWER_CYCLE_ATTEMPTS = 6
145 _LAB_MACHINE_FILE = '/mnt/stateful_partition/.labmachine'
Fang Dengdeba14f2014-11-14 11:54:09 -0800146 _RPM_HOSTNAME_REGEX = ('chromeos(\d+)(-row(\d+))?-rack(\d+[a-z]*)'
147 '-host(\d+)')
Katherine Threlkeldab83d392015-06-18 16:45:57 -0700148 _LIGHTSENSOR_FILES = [ "in_illuminance0_input",
149 "in_illuminance_input",
150 "in_illuminance0_raw",
151 "in_illuminance_raw",
152 "illuminance0_input"]
Richard Barnette82c35912012-11-20 10:09:10 -0800153 _LIGHTSENSOR_SEARCH_DIR = '/sys/bus/iio/devices'
154 _LABEL_FUNCTIONS = []
Aviv Keshet74c89a92013-02-04 15:18:30 -0800155 _DETECTABLE_LABELS = []
156 label_decorator = functools.partial(add_label_detector, _LABEL_FUNCTIONS,
157 _DETECTABLE_LABELS)
J. Richard Barnette134ec2c2012-04-25 12:59:37 -0700158
J. Richard Barnetteb6de7e32013-02-14 13:28:04 -0800159 # Constants used in ping_wait_up() and ping_wait_down().
160 #
161 # _PING_WAIT_COUNT is the approximate number of polling
162 # cycles to use when waiting for a host state change.
163 #
164 # _PING_STATUS_DOWN and _PING_STATUS_UP are names used
165 # for arguments to the internal _ping_wait_for_status()
166 # method.
167 _PING_WAIT_COUNT = 40
168 _PING_STATUS_DOWN = False
169 _PING_STATUS_UP = True
170
Ismail Noorbasha07fdb612013-02-14 14:13:31 -0800171 # Allowed values for the power_method argument.
172
173 # POWER_CONTROL_RPM: Passed as default arg for power_off/on/cycle() methods.
174 # POWER_CONTROL_SERVO: Used in set_power() and power_cycle() methods.
175 # POWER_CONTROL_MANUAL: Used in set_power() and power_cycle() methods.
176 POWER_CONTROL_RPM = 'RPM'
177 POWER_CONTROL_SERVO = 'servoj10'
178 POWER_CONTROL_MANUAL = 'manual'
179
180 POWER_CONTROL_VALID_ARGS = (POWER_CONTROL_RPM,
181 POWER_CONTROL_SERVO,
182 POWER_CONTROL_MANUAL)
Richard Barnette0c73ffc2012-11-19 15:21:18 -0800183
Simran Basi5e6339a2013-03-21 11:34:32 -0700184 _RPM_OUTLET_CHANGED = 'outlet_changed'
185
Dan Shi9cb0eec2014-06-03 09:04:50 -0700186 # URL pattern to download firmware image.
Dan Shib8540a52015-07-16 14:18:23 -0700187 _FW_IMAGE_URL_PATTERN = CONFIG.get_config_value(
Dan Shi9cb0eec2014-06-03 09:04:50 -0700188 'CROS', 'firmware_url_pattern', type=str)
beeps687243d2013-07-18 15:29:27 -0700189
MK Ryu35d661e2014-09-25 17:44:10 -0700190 # File that has a list of directories to be collected
191 _LOGS_TO_COLLECT_FILE = os.path.join(
192 common.client_dir, 'common_lib', 'logs_to_collect')
193
194 # Prefix of logging message w.r.t. crash collection
195 _CRASHLOGS_PREFIX = 'collect_crashlogs'
196
197 # Time duration waiting for host up/down check
198 _CHECK_HOST_UP_TIMEOUT_SECS = 15
199
200 # A command that interacts with kernel and hardware (e.g., rm, mkdir, etc)
201 # might not be completely done deep through the hardware when the machine
202 # is powered down right after the command returns.
203 # We should wait for a few seconds to make them done. Finger crossed.
204 _SAFE_WAIT_SECS = 10
205
206
J. Richard Barnette964fba02012-10-24 17:34:29 -0700207 @staticmethod
beeps46dadc92013-11-07 14:07:10 -0800208 def check_host(host, timeout=10):
209 """
210 Check if the given host is a chrome-os host.
211
212 @param host: An ssh host representing a device.
213 @param timeout: The timeout for the run command.
214
215 @return: True if the host device is chromeos.
216
beeps46dadc92013-11-07 14:07:10 -0800217 """
218 try:
Simran Basi933c8af2015-04-29 14:05:07 -0700219 result = host.run(
220 'grep -q CHROMEOS /etc/lsb-release && '
221 '! test -f /mnt/stateful_partition/.android_tester && '
222 '! grep -q moblab /etc/lsb-release',
223 ignore_status=True, timeout=timeout)
beeps46dadc92013-11-07 14:07:10 -0800224 except (error.AutoservRunError, error.AutoservSSHTimeout):
225 return False
226 return result.exit_status == 0
227
228
229 @staticmethod
Tom Wai-Hong Tamefe1c7f2014-01-02 14:00:11 +0800230 def _extract_arguments(args_dict, key_subset):
231 """Extract options from `args_dict` and return a subset result.
J. Richard Barnette7214e0b2013-02-06 15:20:49 -0800232
233 Take the provided dictionary of argument options and return
Tom Wai-Hong Tamefe1c7f2014-01-02 14:00:11 +0800234 a subset that represent standard arguments needed to construct
235 a test-assistant object (chameleon or servo) for a host. The
236 intent is to provide standard argument processing from
Christopher Wiley644ef3e2015-05-15 13:14:14 -0700237 CrosHost for tests that require a test-assistant board
Tom Wai-Hong Tamefe1c7f2014-01-02 14:00:11 +0800238 to operate.
239
240 @param args_dict Dictionary from which to extract the arguments.
241 @param key_subset Tuple of keys to extract from the args_dict, e.g.
242 ('servo_host', 'servo_port').
243 """
244 result = {}
245 for arg in key_subset:
246 if arg in args_dict:
247 result[arg] = args_dict[arg]
248 return result
249
250
251 @staticmethod
252 def get_chameleon_arguments(args_dict):
253 """Extract chameleon options from `args_dict` and return the result.
254
255 Recommended usage:
256 ~~~~~~~~
257 args_dict = utils.args_to_dict(args)
258 chameleon_args = hosts.CrosHost.get_chameleon_arguments(args_dict)
259 host = hosts.create_host(machine, chameleon_args=chameleon_args)
260 ~~~~~~~~
261
262 @param args_dict Dictionary from which to extract the chameleon
263 arguments.
264 """
265 return CrosHost._extract_arguments(
266 args_dict, ('chameleon_host', 'chameleon_port'))
267
268
269 @staticmethod
270 def get_servo_arguments(args_dict):
271 """Extract servo options from `args_dict` and return the result.
J. Richard Barnette7214e0b2013-02-06 15:20:49 -0800272
273 Recommended usage:
274 ~~~~~~~~
275 args_dict = utils.args_to_dict(args)
Fang Deng0ca40e22013-08-27 17:47:44 -0700276 servo_args = hosts.CrosHost.get_servo_arguments(args_dict)
J. Richard Barnette7214e0b2013-02-06 15:20:49 -0800277 host = hosts.create_host(machine, servo_args=servo_args)
278 ~~~~~~~~
279
280 @param args_dict Dictionary from which to extract the servo
281 arguments.
282 """
Tom Wai-Hong Tamefe1c7f2014-01-02 14:00:11 +0800283 return CrosHost._extract_arguments(
284 args_dict, ('servo_host', 'servo_port'))
J. Richard Barnette134ec2c2012-04-25 12:59:37 -0700285
J. Richard Barnette964fba02012-10-24 17:34:29 -0700286
Tom Wai-Hong Tamefe1c7f2014-01-02 14:00:11 +0800287 def _initialize(self, hostname, chameleon_args=None, servo_args=None,
Fang Denge545abb2014-12-30 18:43:47 -0800288 try_lab_servo=False, ssh_verbosity_flag='', ssh_options='',
Fang Dengd1c2b732013-08-20 12:59:46 -0700289 *args, **dargs):
Tom Wai-Hong Tamefe1c7f2014-01-02 14:00:11 +0800290 """Initialize superclasses, |self.chameleon|, and |self.servo|.
J. Richard Barnette67ccb872012-04-19 16:34:56 -0700291
Fang Denge545abb2014-12-30 18:43:47 -0800292 This method will attempt to create the test-assistant object
293 (chameleon/servo) when it is needed by the test. Check
294 the docstring of chameleon_host.create_chameleon_host and
295 servo_host.create_servo_host for how this is determined.
Fang Deng5d518f42013-08-02 14:04:32 -0700296
Fang Denge545abb2014-12-30 18:43:47 -0800297 @param hostname: Hostname of the dut.
298 @param chameleon_args: A dictionary that contains args for creating
299 a ChameleonHost. See chameleon_host for details.
300 @param servo_args: A dictionary that contains args for creating
301 a ServoHost object. See servo_host for details.
302 @param try_lab_servo: Boolean, False indicates that ServoHost should
303 not be created for a device in Cros test lab.
304 See servo_host for details.
305 @param ssh_verbosity_flag: String, to pass to the ssh command to control
306 verbosity.
307 @param ssh_options: String, other ssh options to pass to the ssh
308 command.
J. Richard Barnette67ccb872012-04-19 16:34:56 -0700309 """
Fang Deng0ca40e22013-08-27 17:47:44 -0700310 super(CrosHost, self)._initialize(hostname=hostname,
J. Richard Barnette45e93de2012-04-11 17:24:15 -0700311 *args, **dargs)
J. Richard Barnettef0859852012-08-20 14:55:50 -0700312 # self.env is a dictionary of environment variable settings
313 # to be exported for commands run on the host.
314 # LIBC_FATAL_STDERR_ can be useful for diagnosing certain
315 # errors that might happen.
316 self.env['LIBC_FATAL_STDERR_'] = '1'
beeps32a63082013-08-22 14:02:29 -0700317 self._rpc_proxy_map = {}
Fang Dengd1c2b732013-08-20 12:59:46 -0700318 self._ssh_verbosity_flag = ssh_verbosity_flag
Aviv Keshetc5947fa2013-09-04 14:06:29 -0700319 self._ssh_options = ssh_options
Fang Deng5d518f42013-08-02 14:04:32 -0700320 # TODO(fdeng): We need to simplify the
321 # process of servo and servo_host initialization.
322 # crbug.com/298432
Fang Denge545abb2014-12-30 18:43:47 -0800323 self._servo_host = servo_host.create_servo_host(
324 dut=self.hostname, servo_args=servo_args,
325 try_lab_servo=try_lab_servo)
Tom Wai-Hong Tamefe1c7f2014-01-02 14:00:11 +0800326 # TODO(waihong): Do the simplication on Chameleon too.
Tom Wai-Hong Tam3d6790d2014-04-14 16:15:47 +0800327 self._chameleon_host = chameleon_host.create_chameleon_host(
328 dut=self.hostname, chameleon_args=chameleon_args)
329
Dan Shi4d478522014-02-14 13:46:32 -0800330 if self._servo_host is not None:
331 self.servo = self._servo_host.get_servo()
332 else:
333 self.servo = None
334
Tom Wai-Hong Tam3d6790d2014-04-14 16:15:47 +0800335 if self._chameleon_host:
Tom Wai-Hong Tameaee3402014-01-22 08:52:10 +0800336 self.chameleon = self._chameleon_host.create_chameleon_board()
Tom Wai-Hong Tamefe1c7f2014-01-02 14:00:11 +0800337 else:
Tom Wai-Hong Tam3d6790d2014-04-14 16:15:47 +0800338 self.chameleon = None
Fang Deng5d518f42013-08-02 14:04:32 -0700339
340
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500341 def get_repair_image_name(self):
342 """Generate a image_name from variables in the global config.
343
344 @returns a str of $board-version/$BUILD.
345
346 """
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500347 board = self._get_board_from_afe()
348 if board is None:
349 raise error.AutoservError('DUT has no board attribute, '
350 'cannot be repaired.')
Dan Shi6964fa52014-12-18 11:04:27 -0800351 stable_version = self._AFE.run('get_stable_version', board=board)
Dan Shib8540a52015-07-16 14:18:23 -0700352 build_pattern = CONFIG.get_config_value(
Dan Shi6964fa52014-12-18 11:04:27 -0800353 'CROS', 'stable_build_pattern')
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500354 return build_pattern % (board, stable_version)
355
356
Scott Zawalski62bacae2013-03-05 10:40:32 -0500357 def _host_in_AFE(self):
358 """Check if the host is an object the AFE knows.
359
360 @returns the host object.
361 """
362 return self._AFE.get_hosts(hostname=self.hostname)
363
364
Chris Sosab76e0ee2013-05-22 16:55:41 -0700365 def lookup_job_repo_url(self):
366 """Looks up the job_repo_url for the host.
367
368 @returns job_repo_url from AFE or None if not found.
369
370 @raises KeyError if the host does not have a job_repo_url
371 """
Chris Sosab76e0ee2013-05-22 16:55:41 -0700372 hosts = self._AFE.get_hosts(hostname=self.hostname)
beepsb5efc532013-06-04 11:29:34 -0700373 if hosts and ds_constants.JOB_REPO_URL in hosts[0].attributes:
374 return hosts[0].attributes[ds_constants.JOB_REPO_URL]
J. Richard Barnette85d0aac2015-08-20 10:34:39 -0700375 else:
376 return None
Chris Sosab76e0ee2013-05-22 16:55:41 -0700377
378
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500379 def clear_cros_version_labels_and_job_repo_url(self):
380 """Clear cros_version labels and host attribute job_repo_url."""
Scott Zawalski62bacae2013-03-05 10:40:32 -0500381 if not self._host_in_AFE():
Scott Zawalskieadbf702013-03-14 09:23:06 -0400382 return
383
Scott Zawalski62bacae2013-03-05 10:40:32 -0500384 host_list = [self.hostname]
385 labels = self._AFE.get_labels(
386 name__startswith=ds_constants.VERSION_PREFIX,
387 host__hostname=self.hostname)
Dan Shi0f466e82013-02-22 15:44:58 -0800388
Scott Zawalski62bacae2013-03-05 10:40:32 -0500389 for label in labels:
390 label.remove_hosts(hosts=host_list)
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500391
beepscb6f1e22013-06-28 19:14:10 -0700392 self.update_job_repo_url(None, None)
393
394
395 def update_job_repo_url(self, devserver_url, image_name):
396 """
397 Updates the job_repo_url host attribute and asserts it's value.
398
399 @param devserver_url: The devserver to use in the job_repo_url.
400 @param image_name: The name of the image to use in the job_repo_url.
401
402 @raises AutoservError: If we failed to update the job_repo_url.
403 """
404 repo_url = None
405 if devserver_url and image_name:
406 repo_url = tools.get_package_url(devserver_url, image_name)
407 self._AFE.set_host_attribute(ds_constants.JOB_REPO_URL, repo_url,
Scott Zawalski62bacae2013-03-05 10:40:32 -0500408 hostname=self.hostname)
beepscb6f1e22013-06-28 19:14:10 -0700409 if self.lookup_job_repo_url() != repo_url:
410 raise error.AutoservError('Failed to update job_repo_url with %s, '
411 'host %s' % (repo_url, self.hostname))
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500412
413
Dan Shie9309262013-06-19 22:50:21 -0700414 def add_cros_version_labels_and_job_repo_url(self, image_name):
Scott Zawalskieadbf702013-03-14 09:23:06 -0400415 """Add cros_version labels and host attribute job_repo_url.
416
417 @param image_name: The name of the image e.g.
418 lumpy-release/R27-3837.0.0
Dan Shi7458bf62013-06-10 12:50:16 -0700419
Scott Zawalskieadbf702013-03-14 09:23:06 -0400420 """
Scott Zawalski62bacae2013-03-05 10:40:32 -0500421 if not self._host_in_AFE():
Scott Zawalskieadbf702013-03-14 09:23:06 -0400422 return
Scott Zawalski62bacae2013-03-05 10:40:32 -0500423
Scott Zawalskieadbf702013-03-14 09:23:06 -0400424 cros_label = '%s%s' % (ds_constants.VERSION_PREFIX, image_name)
Dan Shie9309262013-06-19 22:50:21 -0700425 devserver_url = dev_server.ImageServer.resolve(image_name).url()
Scott Zawalski62bacae2013-03-05 10:40:32 -0500426
MK Ryufb5e3a82015-07-01 12:21:20 -0700427 self._AFE.run('label_add_hosts', id=cros_label, hosts=[self.hostname])
beepscb6f1e22013-06-28 19:14:10 -0700428 self.update_job_repo_url(devserver_url, image_name)
429
430
beepsdae65fd2013-07-26 16:24:41 -0700431 def verify_job_repo_url(self, tag=''):
beepscb6f1e22013-06-28 19:14:10 -0700432 """
433 Make sure job_repo_url of this host is valid.
434
joychen03eaad92013-06-26 09:55:21 -0700435 Eg: The job_repo_url "http://lmn.cd.ab.xyx:8080/static/\
beepscb6f1e22013-06-28 19:14:10 -0700436 lumpy-release/R29-4279.0.0/autotest/packages" claims to have the
437 autotest package for lumpy-release/R29-4279.0.0. If this isn't the case,
438 download and extract it. If the devserver embedded in the url is
439 unresponsive, update the job_repo_url of the host after staging it on
440 another devserver.
441
442 @param job_repo_url: A url pointing to the devserver where the autotest
443 package for this build should be staged.
beepsdae65fd2013-07-26 16:24:41 -0700444 @param tag: The tag from the server job, in the format
445 <job_id>-<user>/<hostname>, or <hostless> for a server job.
beepscb6f1e22013-06-28 19:14:10 -0700446
447 @raises DevServerException: If we could not resolve a devserver.
448 @raises AutoservError: If we're unable to save the new job_repo_url as
449 a result of choosing a new devserver because the old one failed to
450 respond to a health check.
beeps0c865032013-07-30 11:37:06 -0700451 @raises urllib2.URLError: If the devserver embedded in job_repo_url
452 doesn't respond within the timeout.
beepscb6f1e22013-06-28 19:14:10 -0700453 """
454 job_repo_url = self.lookup_job_repo_url()
455 if not job_repo_url:
456 logging.warning('No job repo url set on host %s', self.hostname)
457 return
458
459 logging.info('Verifying job repo url %s', job_repo_url)
460 devserver_url, image_name = tools.get_devserver_build_from_package_url(
461 job_repo_url)
462
beeps0c865032013-07-30 11:37:06 -0700463 ds = dev_server.ImageServer(devserver_url)
beepscb6f1e22013-06-28 19:14:10 -0700464
465 logging.info('Staging autotest artifacts for %s on devserver %s',
466 image_name, ds.url())
beeps687243d2013-07-18 15:29:27 -0700467
468 start_time = time.time()
Simran Basi25e7a922014-10-31 11:56:10 -0700469 ds.stage_artifacts(image_name, ['autotest_packages'])
beeps687243d2013-07-18 15:29:27 -0700470 stage_time = time.time() - start_time
471
472 # Record how much of the verification time comes from a devserver
473 # restage. If we're doing things right we should not see multiple
474 # devservers for a given board/build/branch path.
475 try:
J. Richard Barnette3cbd76b2013-11-27 12:11:25 -0800476 board, build_type, branch = server_utils.ParseBuildName(
beeps687243d2013-07-18 15:29:27 -0700477 image_name)[:3]
J. Richard Barnette3cbd76b2013-11-27 12:11:25 -0800478 except server_utils.ParseBuildNameException:
beeps687243d2013-07-18 15:29:27 -0700479 pass
480 else:
beeps0c865032013-07-30 11:37:06 -0700481 devserver = devserver_url[
Chris Sosa65425082013-10-16 13:26:22 -0700482 devserver_url.find('/') + 2:devserver_url.rfind(':')]
beeps687243d2013-07-18 15:29:27 -0700483 stats_key = {
484 'board': board,
485 'build_type': build_type,
486 'branch': branch,
beeps0c865032013-07-30 11:37:06 -0700487 'devserver': devserver.replace('.', '_'),
beeps687243d2013-07-18 15:29:27 -0700488 }
Gabe Black1e1c41b2015-02-04 23:55:15 -0800489 autotest_stats.Gauge('verify_job_repo_url').send(
beeps687243d2013-07-18 15:29:27 -0700490 '%(board)s.%(build_type)s.%(branch)s.%(devserver)s' % stats_key,
491 stage_time)
beepscb6f1e22013-06-28 19:14:10 -0700492
Scott Zawalskieadbf702013-03-14 09:23:06 -0400493
Dan Shicf4d2032015-03-12 15:04:21 -0700494 def stage_server_side_package(self, image=None):
495 """Stage autotest server-side package on devserver.
496
497 @param image: Full path of an OS image to install or a build name.
498
499 @return: A url to the autotest server-side package.
500 """
501 if image:
502 image_name = tools.get_build_from_image(image)
503 if not image_name:
504 raise error.AutoservError(
505 'Failed to parse build name from %s' % image)
506 ds = dev_server.ImageServer.resolve(image_name)
507 else:
508 job_repo_url = self.lookup_job_repo_url()
509 if job_repo_url:
510 devserver_url, image_name = (
511 tools.get_devserver_build_from_package_url(job_repo_url))
512 ds = dev_server.ImageServer(devserver_url)
513 else:
514 labels = self._AFE.get_labels(
515 name__startswith=ds_constants.VERSION_PREFIX,
516 host__hostname=self.hostname)
517 if not labels:
518 raise error.AutoservError(
519 'Failed to stage server-side package. The host has '
520 'no job_report_url attribute or version label.')
521 image_name = labels[0].name[len(ds_constants.VERSION_PREFIX):]
522 ds = dev_server.ImageServer.resolve(image_name)
Dan Shica503482015-03-30 17:23:25 -0700523
524 # Get the OS version of the build, for any build older than
525 # MIN_VERSION_SUPPORT_SSP, server side packaging is not supported.
526 match = re.match('.*/R\d+-(\d+)\.', image_name)
527 if match and int(match.group(1)) < self.MIN_VERSION_SUPPORT_SSP:
528 logging.warn('Build %s is older than %s. Server side packaging is '
529 'disabled.', image_name, self.MIN_VERSION_SUPPORT_SSP)
530 return None
531
Dan Shicf4d2032015-03-12 15:04:21 -0700532 ds.stage_artifacts(image_name, ['autotest_server_package'])
533 return '%s/static/%s/%s' % (ds.url(), image_name,
534 'autotest_server_package.tar.bz2')
535
536
Dan Shi0f466e82013-02-22 15:44:58 -0800537 def _try_stateful_update(self, update_url, force_update, updater):
538 """Try to use stateful update to initialize DUT.
539
540 When DUT is already running the same version that machine_install
541 tries to install, stateful update is a much faster way to clean up
542 the DUT for testing, compared to a full reimage. It is implemeted
543 by calling autoupdater.run_update, but skipping updating root, as
544 updating the kernel is time consuming and not necessary.
545
546 @param update_url: url of the image.
547 @param force_update: Set to True to update the image even if the DUT
548 is running the same version.
549 @param updater: ChromiumOSUpdater instance used to update the DUT.
550 @returns: True if the DUT was updated with stateful update.
551
552 """
J. Richard Barnette3f731032014-04-07 17:42:59 -0700553 # TODO(jrbarnette): Yes, I hate this re.match() test case.
554 # It's better than the alternative: see crbug.com/360944.
555 image_name = autoupdater.url_to_image_name(update_url)
556 release_pattern = r'^.*-release/R[0-9]+-[0-9]+\.[0-9]+\.0$'
557 if not re.match(release_pattern, image_name):
558 return False
Dan Shi0f466e82013-02-22 15:44:58 -0800559 if not updater.check_version():
560 return False
561 if not force_update:
562 logging.info('Canceling stateful update because the new and '
563 'old versions are the same.')
564 return False
565 # Following folders should be rebuilt after stateful update.
566 # A test file is used to confirm each folder gets rebuilt after
567 # the stateful update.
568 folders_to_check = ['/var', '/home', '/mnt/stateful_partition']
569 test_file = '.test_file_to_be_deleted'
570 for folder in folders_to_check:
571 touch_path = os.path.join(folder, test_file)
572 self.run('touch %s' % touch_path)
573
Chris Sosae92399e2015-04-24 11:32:59 -0700574 updater.run_update(update_root=False)
Dan Shi0f466e82013-02-22 15:44:58 -0800575
576 # Reboot to complete stateful update.
Chris Sosab76e0ee2013-05-22 16:55:41 -0700577 self.reboot(timeout=self.REBOOT_TIMEOUT, wait=True)
Dan Shi0f466e82013-02-22 15:44:58 -0800578 check_file_cmd = 'test -f %s; echo $?'
579 for folder in folders_to_check:
580 test_file_path = os.path.join(folder, test_file)
581 result = self.run(check_file_cmd % test_file_path,
582 ignore_status=True)
583 if result.exit_status == 1:
584 return False
585 return True
586
587
J. Richard Barnette7275b612013-06-04 18:13:11 -0700588 def _post_update_processing(self, updater, expected_kernel=None):
Dan Shi0f466e82013-02-22 15:44:58 -0800589 """After the DUT is updated, confirm machine_install succeeded.
590
591 @param updater: ChromiumOSUpdater instance used to update the DUT.
J. Richard Barnette7275b612013-06-04 18:13:11 -0700592 @param expected_kernel: kernel expected to be active after reboot,
593 or `None` to skip rollback checking.
Dan Shi0f466e82013-02-22 15:44:58 -0800594
595 """
J. Richard Barnette7275b612013-06-04 18:13:11 -0700596 # Touch the lab machine file to leave a marker that
597 # distinguishes this image from other test images.
598 # Afterwards, we must re-run the autoreboot script because
599 # it depends on the _LAB_MACHINE_FILE.
Dan Shi0f466e82013-02-22 15:44:58 -0800600 self.run('touch %s' % self._LAB_MACHINE_FILE)
Dan Shi0f466e82013-02-22 15:44:58 -0800601 self.run('start autoreboot')
Chris Sosa65425082013-10-16 13:26:22 -0700602 updater.verify_boot_expectations(
603 expected_kernel, rollback_message=
604 'Build %s failed to boot on %s; system rolled back to previous'
605 'build' % (updater.update_version, self.hostname))
J. Richard Barnette7275b612013-06-04 18:13:11 -0700606 # Check that we've got the build we meant to install.
607 if not updater.check_version_to_confirm_install():
608 raise autoupdater.ChromiumOSError(
609 'Failed to update %s to build %s; found build '
610 '%s instead' % (self.hostname,
Chris Sosa65425082013-10-16 13:26:22 -0700611 updater.update_version,
Dan Shi0942b1d2015-03-31 11:07:00 -0700612 self.get_release_version()))
Dan Shi0f466e82013-02-22 15:44:58 -0800613
Chris Sosae92399e2015-04-24 11:32:59 -0700614 logging.debug('Cleaning up old autotest directories.')
615 try:
616 installed_autodir = autotest.Autotest.get_installed_autodir(self)
617 self.run('rm -rf ' + installed_autodir)
618 except autotest.AutodirNotFoundError:
619 logging.debug('No autotest installed directory found.')
620
Dan Shi0f466e82013-02-22 15:44:58 -0800621
J. Richard Barnettee4af8b92013-05-01 13:16:12 -0700622 def _stage_image_for_update(self, image_name=None):
Chris Sosae92399e2015-04-24 11:32:59 -0700623 """Stage a build on a devserver and return the update_url and devserver.
Scott Zawalskieadbf702013-03-14 09:23:06 -0400624
625 @param image_name: a name like lumpy-release/R27-3837.0.0
Chris Sosae92399e2015-04-24 11:32:59 -0700626 @returns a tuple with an update URL like:
Scott Zawalskieadbf702013-03-14 09:23:06 -0400627 http://172.22.50.205:8082/update/lumpy-release/R27-3837.0.0
Chris Sosae92399e2015-04-24 11:32:59 -0700628 and the devserver instance.
Scott Zawalskieadbf702013-03-14 09:23:06 -0400629 """
J. Richard Barnettee4af8b92013-05-01 13:16:12 -0700630 if not image_name:
631 image_name = self.get_repair_image_name()
Chris Sosae92399e2015-04-24 11:32:59 -0700632
J. Richard Barnettee4af8b92013-05-01 13:16:12 -0700633 logging.info('Staging build for AU: %s', image_name)
Scott Zawalskieadbf702013-03-14 09:23:06 -0400634 devserver = dev_server.ImageServer.resolve(image_name)
635 devserver.trigger_download(image_name, synchronous=False)
Chris Sosae92399e2015-04-24 11:32:59 -0700636 return (tools.image_url_pattern() % (devserver.url(), image_name),
637 devserver)
Scott Zawalskieadbf702013-03-14 09:23:06 -0400638
639
J. Richard Barnettee4af8b92013-05-01 13:16:12 -0700640 def stage_image_for_servo(self, image_name=None):
641 """Stage a build on a devserver and return the update_url.
642
643 @param image_name: a name like lumpy-release/R27-3837.0.0
644 @returns an update URL like:
645 http://172.22.50.205:8082/update/lumpy-release/R27-3837.0.0
646 """
647 if not image_name:
648 image_name = self.get_repair_image_name()
649 logging.info('Staging build for servo install: %s', image_name)
650 devserver = dev_server.ImageServer.resolve(image_name)
651 devserver.stage_artifacts(image_name, ['test_image'])
652 return devserver.get_test_image_url(image_name)
653
654
beepse539be02013-07-31 21:57:39 -0700655 def stage_factory_image_for_servo(self, image_name):
656 """Stage a build on a devserver and return the update_url.
657
658 @param image_name: a name like <baord>/4262.204.0
beeps12c0a3c2013-09-03 11:58:27 -0700659
beepse539be02013-07-31 21:57:39 -0700660 @return: An update URL, eg:
661 http://<devserver>/static/canary-channel/\
662 <board>/4262.204.0/factory_test/chromiumos_factory_image.bin
beeps12c0a3c2013-09-03 11:58:27 -0700663
664 @raises: ValueError if the factory artifact name is missing from
665 the config.
666
beepse539be02013-07-31 21:57:39 -0700667 """
668 if not image_name:
669 logging.error('Need an image_name to stage a factory image.')
670 return
671
Dan Shib8540a52015-07-16 14:18:23 -0700672 factory_artifact = CONFIG.get_config_value(
beeps12c0a3c2013-09-03 11:58:27 -0700673 'CROS', 'factory_artifact', type=str, default='')
674 if not factory_artifact:
675 raise ValueError('Cannot retrieve the factory artifact name from '
676 'autotest config, and hence cannot stage factory '
677 'artifacts.')
678
beepse539be02013-07-31 21:57:39 -0700679 logging.info('Staging build for servo install: %s', image_name)
680 devserver = dev_server.ImageServer.resolve(image_name)
681 devserver.stage_artifacts(
682 image_name,
beeps12c0a3c2013-09-03 11:58:27 -0700683 [factory_artifact],
684 archive_url=None)
beepse539be02013-07-31 21:57:39 -0700685
686 return tools.factory_image_url_pattern() % (devserver.url(), image_name)
687
688
Chris Sosaa3ac2152012-05-23 22:23:13 -0700689 def machine_install(self, update_url=None, force_update=False,
Richard Barnette0b023a72015-04-24 16:07:30 +0000690 local_devserver=False, repair=False,
691 force_full_update=False):
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500692 """Install the DUT.
693
Dan Shi0f466e82013-02-22 15:44:58 -0800694 Use stateful update if the DUT is already running the same build.
695 Stateful update does not update kernel and tends to run much faster
696 than a full reimage. If the DUT is running a different build, or it
697 failed to do a stateful update, full update, including kernel update,
698 will be applied to the DUT.
699
Scott Zawalskieadbf702013-03-14 09:23:06 -0400700 Once a host enters machine_install its cros_version label will be
701 removed as well as its host attribute job_repo_url (used for
702 package install).
703
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500704 @param update_url: The url to use for the update
705 pattern: http://$devserver:###/update/$build
706 If update_url is None and repair is True we will install the
Dan Shi6964fa52014-12-18 11:04:27 -0800707 stable image listed in afe_stable_versions table. If the table
708 is not setup, global_config value under CROS.stable_cros_version
709 will be used instead.
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500710 @param force_update: Force an update even if the version installed
711 is the same. Default:False
Christopher Wiley6a4ff932015-05-15 14:00:47 -0700712 @param local_devserver: Used by test_that to allow people to
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500713 use their local devserver. Default: False
Chris Sosae92399e2015-04-24 11:32:59 -0700714 @param repair: Forces update to repair image. Implies force_update.
Fang Deng3d3b9272014-12-22 12:20:28 -0800715 @param force_full_update: If True, do not attempt to run stateful
716 update, force a full reimage. If False, try stateful update
717 first when the dut is already installed with the same version.
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500718 @raises autoupdater.ChromiumOSError
719
720 """
Chris Sosae92399e2015-04-24 11:32:59 -0700721 devserver = None
Richard Barnette0b023a72015-04-24 16:07:30 +0000722 if repair:
Chris Sosae92399e2015-04-24 11:32:59 -0700723 update_url, devserver = self._stage_image_for_update()
Richard Barnette0b023a72015-04-24 16:07:30 +0000724 force_update = True
Dan Shi0f466e82013-02-22 15:44:58 -0800725
Chris Sosae92399e2015-04-24 11:32:59 -0700726 if not update_url and not self._parser.options.image:
727 raise error.AutoservError(
728 'There is no update URL, nor a method to get one.')
729
730 if not update_url and self._parser.options.image:
731 # This is the base case where we have no given update URL i.e.
732 # dynamic suites logic etc. This is the most flexible case where we
733 # can serve an update from any of our fleet of devservers.
734 requested_build = self._parser.options.image
735 if not requested_build.startswith('http://'):
736 logging.debug('Update will be staged for this installation')
737 update_url, devserver = self._stage_image_for_update(
738 requested_build)
739 else:
740 update_url = requested_build
741
742 logging.debug('Update URL is %s', update_url)
743
Scott Zawalskieadbf702013-03-14 09:23:06 -0400744 # Remove cros-version and job_repo_url host attribute from host.
745 self.clear_cros_version_labels_and_job_repo_url()
Chris Sosae92399e2015-04-24 11:32:59 -0700746
747 update_complete = False
748 updater = autoupdater.ChromiumOSUpdater(
749 update_url, host=self, local_devserver=local_devserver)
Fang Deng3d3b9272014-12-22 12:20:28 -0800750 if not force_full_update:
751 try:
Chris Sosae92399e2015-04-24 11:32:59 -0700752 # If the DUT is already running the same build, try stateful
753 # update first as it's much quicker than a full re-image.
754 update_complete = self._try_stateful_update(
755 update_url, force_update, updater)
Fang Deng3d3b9272014-12-22 12:20:28 -0800756 except Exception as e:
757 logging.exception(e)
J. Richard Barnette45e93de2012-04-11 17:24:15 -0700758
Dan Shi0f466e82013-02-22 15:44:58 -0800759 inactive_kernel = None
Chris Sosae92399e2015-04-24 11:32:59 -0700760 if update_complete or (not force_update and updater.check_version()):
761 logging.info('Install complete without full update')
762 else:
763 logging.info('DUT requires full update.')
764 self.reboot(timeout=self.REBOOT_TIMEOUT, wait=True)
765 num_of_attempts = provision.FLAKY_DEVSERVER_ATTEMPTS
Chris Sosab7612bc2013-03-21 10:32:37 -0700766
Chris Sosae92399e2015-04-24 11:32:59 -0700767 while num_of_attempts > 0:
768 num_of_attempts -= 1
769 try:
770 updater.run_update()
771 except Exception:
772 logging.warn('Autoupdate did not complete.')
773 # Do additional check for the devserver health. Ideally,
774 # the autoupdater.py could raise an exception when it
775 # detected network flake but that would require
776 # instrumenting the update engine and parsing it log.
777 if (num_of_attempts <= 0 or
778 devserver is None or
779 dev_server.DevServer.devserver_healthy(
780 devserver.url())):
781 raise
J. Richard Barnette45e93de2012-04-11 17:24:15 -0700782
Chris Sosae92399e2015-04-24 11:32:59 -0700783 logging.warn('Devserver looks unhealthy. Trying another')
784 update_url, devserver = self._stage_image_for_update(
785 requested_build)
786 logging.debug('New Update URL is %s', update_url)
787 updater = autoupdater.ChromiumOSUpdater(
788 update_url, host=self,
789 local_devserver=local_devserver)
790 else:
791 break
J. Richard Barnette45e93de2012-04-11 17:24:15 -0700792
Chris Sosae92399e2015-04-24 11:32:59 -0700793 # Give it some time in case of IO issues.
794 time.sleep(10)
Dan Shi5699ac22014-12-19 10:55:49 -0800795
Chris Sosae92399e2015-04-24 11:32:59 -0700796 # Figure out active and inactive kernel.
797 active_kernel, inactive_kernel = updater.get_kernel_state()
Simran Basi13fa1ba2013-03-04 10:56:47 -0800798
Chris Sosae92399e2015-04-24 11:32:59 -0700799 # Ensure inactive kernel has higher priority than active.
800 if (updater.get_kernel_priority(inactive_kernel)
801 < updater.get_kernel_priority(active_kernel)):
802 raise autoupdater.ChromiumOSError(
803 'Update failed. The priority of the inactive kernel'
804 ' partition is less than that of the active kernel'
805 ' partition.')
806
807 # Updater has returned successfully; reboot the host.
808 self.reboot(timeout=self.REBOOT_TIMEOUT, wait=True)
809
810 self._post_update_processing(updater, inactive_kernel)
811 self.add_cros_version_labels_and_job_repo_url(
812 autoupdater.url_to_image_name(update_url))
J. Richard Barnette45e93de2012-04-11 17:24:15 -0700813
814
Dan Shi9cb0eec2014-06-03 09:04:50 -0700815 def _clear_fw_version_labels(self):
816 """Clear firmware version labels from the machine."""
817 labels = self._AFE.get_labels(
Dan Shi0723bf52015-06-24 10:52:38 -0700818 name__startswith=provision.FW_RW_VERSION_PREFIX,
Dan Shi9cb0eec2014-06-03 09:04:50 -0700819 host__hostname=self.hostname)
820 for label in labels:
821 label.remove_hosts(hosts=[self.hostname])
822
823
824 def _add_fw_version_label(self, build):
825 """Add firmware version label to the machine.
826
827 @param build: Build of firmware.
828
829 """
830 fw_label = provision.fw_version_to_label(build)
MK Ryu73be9862015-07-06 12:25:00 -0700831 self._AFE.run('label_add_hosts', id=fw_label, hosts=[self.hostname])
Dan Shi9cb0eec2014-06-03 09:04:50 -0700832
833
834 def firmware_install(self, build=None):
835 """Install firmware to the DUT.
836
837 Use stateful update if the DUT is already running the same build.
838 Stateful update does not update kernel and tends to run much faster
839 than a full reimage. If the DUT is running a different build, or it
840 failed to do a stateful update, full update, including kernel update,
841 will be applied to the DUT.
842
843 Once a host enters firmware_install its fw_version label will be
844 removed. After the firmware is updated successfully, a new fw_version
845 label will be added to the host.
846
847 @param build: The build version to which we want to provision the
848 firmware of the machine,
849 e.g. 'link-firmware/R22-2695.1.144'.
850
851 TODO(dshi): After bug 381718 is fixed, update here with corresponding
852 exceptions that could be raised.
853
854 """
855 if not self.servo:
856 raise error.TestError('Host %s does not have servo.' %
857 self.hostname)
858
859 # TODO(fdeng): use host.get_board() after
860 # crbug.com/271834 is fixed.
861 board = self._get_board_from_afe()
862
Chris Sosae92399e2015-04-24 11:32:59 -0700863 # If build is not set, try to install firmware from stable CrOS.
Dan Shi9cb0eec2014-06-03 09:04:50 -0700864 if not build:
865 build = self.get_repair_image_name()
866
867 config = FAFTConfig(board)
868 if config.use_u_boot:
869 ap_image = 'image-%s.bin' % board
870 else: # Depthcharge platform
871 ap_image = 'image.bin'
872 ec_image = 'ec.bin'
873 ds = dev_server.ImageServer.resolve(build)
874 ds.stage_artifacts(build, ['firmware'])
875
876 tmpd = autotemp.tempdir(unique_id='fwimage')
877 try:
878 fwurl = self._FW_IMAGE_URL_PATTERN % (ds.url(), build)
879 local_tarball = os.path.join(tmpd.name, os.path.basename(fwurl))
880 server_utils.system('wget -O %s %s' % (local_tarball, fwurl),
881 timeout=60)
882 server_utils.system('tar xf %s -C %s %s %s' %
883 (local_tarball, tmpd.name, ap_image, ec_image),
884 timeout=60)
885 server_utils.system('tar xf %s --wildcards -C %s "dts/*"' %
886 (local_tarball, tmpd.name),
887 timeout=60, ignore_status=True)
888
889 self._clear_fw_version_labels()
890 logging.info('Will re-program EC now')
891 self.servo.program_ec(os.path.join(tmpd.name, ec_image))
892 logging.info('Will re-program BIOS now')
893 self.servo.program_bios(os.path.join(tmpd.name, ap_image))
894 self.servo.get_power_state_controller().reset()
895 time.sleep(self.servo.BOOT_DELAY)
Dan Shia5fef052015-05-18 23:28:47 -0700896 self._add_fw_version_label(build)
Dan Shi9cb0eec2014-06-03 09:04:50 -0700897 finally:
898 tmpd.clean()
899
900
Dan Shi10e992b2013-08-30 11:02:59 -0700901 def show_update_engine_log(self):
902 """Output update engine log."""
MK Ryu35d661e2014-09-25 17:44:10 -0700903 logging.debug('Dumping %s', client_constants.UPDATE_ENGINE_LOG)
904 self.run('cat %s' % client_constants.UPDATE_ENGINE_LOG)
Dan Shi10e992b2013-08-30 11:02:59 -0700905
906
Richard Barnette82c35912012-11-20 10:09:10 -0800907 def _get_board_from_afe(self):
908 """Retrieve this host's board from its labels in the AFE.
909
910 Looks for a host label of the form "board:<board>", and
911 returns the "<board>" part of the label. `None` is returned
912 if there is not a single, unique label matching the pattern.
913
914 @returns board from label, or `None`.
915 """
Dan Shia1ecd5c2013-06-06 11:21:31 -0700916 return server_utils.get_board_from_afe(self.hostname, self._AFE)
Simran Basi833814b2013-01-29 13:13:43 -0800917
918
919 def get_build(self):
920 """Retrieve the current build for this Host from the AFE.
921
922 Looks through this host's labels in the AFE to determine its build.
923
924 @returns The current build or None if it could not find it or if there
925 were multiple build labels assigned to this host.
926 """
Dan Shia1ecd5c2013-06-06 11:21:31 -0700927 return server_utils.get_build_from_afe(self.hostname, self._AFE)
Richard Barnette82c35912012-11-20 10:09:10 -0800928
929
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500930 def _install_repair(self):
Chris Sosae92399e2015-04-24 11:32:59 -0700931 """Attempt to repair this host using the update-engine.
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500932
933 If the host is up, try installing the DUT with a stable
Dan Shi6964fa52014-12-18 11:04:27 -0800934 "repair" version of Chrome OS as defined in afe_stable_versions table.
935 If the table is not setup, global_config value under
936 CROS.stable_cros_version will be used instead.
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500937
Scott Zawalski62bacae2013-03-05 10:40:32 -0500938 @raises AutoservRepairMethodNA if the DUT is not reachable.
939 @raises ChromiumOSError if the install failed for some reason.
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500940
941 """
942 if not self.is_up():
Scott Zawalski62bacae2013-03-05 10:40:32 -0500943 raise error.AutoservRepairMethodNA('DUT unreachable for install.')
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500944 logging.info('Attempting to reimage machine to repair image.')
945 try:
Richard Barnette0b023a72015-04-24 16:07:30 +0000946 self.machine_install(repair=True)
Fang Dengd0672f32013-03-18 17:18:09 -0700947 except autoupdater.ChromiumOSError as e:
948 logging.exception(e)
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500949 logging.info('Repair via install failed.')
Scott Zawalski62bacae2013-03-05 10:40:32 -0500950 raise
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500951
952
Dan Shi2c88eed2013-11-12 10:18:38 -0800953 def _install_repair_with_powerwash(self):
Dan Shi9cc48452013-11-12 12:39:26 -0800954 """Attempt to powerwash first then repair this host using update-engine.
Dan Shi2c88eed2013-11-12 10:18:38 -0800955
Dan Shi9cc48452013-11-12 12:39:26 -0800956 update-engine may fail due to a bad image. In such case, powerwash
957 may help to cleanup the DUT for update-engine to work again.
Dan Shi2c88eed2013-11-12 10:18:38 -0800958
959 @raises AutoservRepairMethodNA if the DUT is not reachable.
960 @raises ChromiumOSError if the install failed for some reason.
961
962 """
963 if not self.is_up():
964 raise error.AutoservRepairMethodNA('DUT unreachable for install.')
965
966 logging.info('Attempting to powerwash the DUT.')
967 self.run('echo "fast safe" > '
968 '/mnt/stateful_partition/factory_install_reset')
969 self.reboot(timeout=self.POWERWASH_BOOT_TIMEOUT, wait=True)
970 if not self.is_up():
Dan Shi9cc48452013-11-12 12:39:26 -0800971 logging.error('Powerwash failed. DUT did not come back after '
Dan Shi2c88eed2013-11-12 10:18:38 -0800972 'reboot.')
973 raise error.AutoservRepairFailure(
974 'DUT failed to boot from powerwash after %d seconds' %
975 self.POWERWASH_BOOT_TIMEOUT)
976
977 logging.info('Powerwash succeeded.')
978 self._install_repair()
979
980
beepsf079cfb2013-09-18 17:49:51 -0700981 def servo_install(self, image_url=None, usb_boot_timeout=USB_BOOT_TIMEOUT,
982 install_timeout=INSTALL_TIMEOUT):
Scott Zawalski62bacae2013-03-05 10:40:32 -0500983 """
984 Re-install the OS on the DUT by:
985 1) installing a test image on a USB storage device attached to the Servo
986 board,
Richard Barnette03a0c132012-11-05 12:40:35 -0800987 2) booting that image in recovery mode, and then
J. Richard Barnette31b2e312013-04-04 16:05:22 -0700988 3) installing the image with chromeos-install.
989
Scott Zawalski62bacae2013-03-05 10:40:32 -0500990 @param image_url: If specified use as the url to install on the DUT.
991 otherwise boot the currently staged image on the USB stick.
beepsf079cfb2013-09-18 17:49:51 -0700992 @param usb_boot_timeout: The usb_boot_timeout to use during reimage.
993 Factory images need a longer usb_boot_timeout than regular
994 cros images.
995 @param install_timeout: The timeout to use when installing the chromeos
996 image. Factory images need a longer install_timeout.
Richard Barnette03a0c132012-11-05 12:40:35 -0800997
Scott Zawalski62bacae2013-03-05 10:40:32 -0500998 @raises AutoservError if the image fails to boot.
beepsf079cfb2013-09-18 17:49:51 -0700999
J. Richard Barnette0199cc82014-12-05 17:08:40 -08001000 """
beepsf079cfb2013-09-18 17:49:51 -07001001 usb_boot_timer_key = ('servo_install.usb_boot_timeout_%s'
1002 % usb_boot_timeout)
1003 logging.info('Downloading image to USB, then booting from it. Usb boot '
1004 'timeout = %s', usb_boot_timeout)
Gabe Black1e1c41b2015-02-04 23:55:15 -08001005 timer = autotest_stats.Timer(usb_boot_timer_key)
beepsf079cfb2013-09-18 17:49:51 -07001006 timer.start()
J. Richard Barnette31b2e312013-04-04 16:05:22 -07001007 self.servo.install_recovery_image(image_url)
beepsf079cfb2013-09-18 17:49:51 -07001008 if not self.wait_up(timeout=usb_boot_timeout):
Scott Zawalski62bacae2013-03-05 10:40:32 -05001009 raise error.AutoservRepairFailure(
1010 'DUT failed to boot from USB after %d seconds' %
beepsf079cfb2013-09-18 17:49:51 -07001011 usb_boot_timeout)
1012 timer.stop()
Scott Zawalski62bacae2013-03-05 10:40:32 -05001013
Tom Wai-Hong Tamf6b4f812015-08-08 04:14:59 +08001014 # The new chromeos-tpm-recovery has been merged since R44-7073.0.0.
1015 # In old CrOS images, this command fails. Skip the error.
Tom Wai-Hong Tam27af7332015-07-25 06:09:39 +08001016 logging.info('Resetting the TPM status')
Tom Wai-Hong Tamf6b4f812015-08-08 04:14:59 +08001017 try:
1018 self.run('chromeos-tpm-recovery')
1019 except error.AutoservRunError:
1020 logging.warn('chromeos-tpm-recovery is too old.')
1021
Tom Wai-Hong Tam27af7332015-07-25 06:09:39 +08001022
beepsf079cfb2013-09-18 17:49:51 -07001023 install_timer_key = ('servo_install.install_timeout_%s'
1024 % install_timeout)
Gabe Black1e1c41b2015-02-04 23:55:15 -08001025 timer = autotest_stats.Timer(install_timer_key)
beepsf079cfb2013-09-18 17:49:51 -07001026 timer.start()
1027 logging.info('Installing image through chromeos-install.')
J. Richard Barnette9af19632015-09-25 12:18:03 -07001028 self.run('chromeos-install --yes', timeout=install_timeout)
1029 self.halt()
beepsf079cfb2013-09-18 17:49:51 -07001030 timer.stop()
1031
1032 logging.info('Power cycling DUT through servo.')
J. Richard Barnette0199cc82014-12-05 17:08:40 -08001033 self.servo.get_power_state_controller().power_off()
Fang Dengafb88142013-05-30 17:44:31 -07001034 self.servo.switch_usbkey('off')
J. Richard Barnette0199cc82014-12-05 17:08:40 -08001035 # N.B. The Servo API requires that we use power_on() here
1036 # for two reasons:
1037 # 1) After turning on a DUT in recovery mode, you must turn
1038 # it off and then on with power_on() once more to
1039 # disable recovery mode (this is a Parrot specific
1040 # requirement).
1041 # 2) After power_off(), the only way to turn on is with
1042 # power_on() (this is a Storm specific requirement).
J. Richard Barnettefbcc7122013-07-24 18:24:59 -07001043 self.servo.get_power_state_controller().power_on()
beepsf079cfb2013-09-18 17:49:51 -07001044
1045 logging.info('Waiting for DUT to come back up.')
Richard Barnette03a0c132012-11-05 12:40:35 -08001046 if not self.wait_up(timeout=self.BOOT_TIMEOUT):
1047 raise error.AutoservError('DUT failed to reboot installed '
1048 'test image after %d seconds' %
Scott Zawalski62bacae2013-03-05 10:40:32 -05001049 self.BOOT_TIMEOUT)
1050
1051
Dan Shic1b8bdd2015-09-14 23:11:24 -07001052 def _setup_servo(self):
1053 """Try to force to create servo object if it's not set up yet.
1054 """
1055 if self.servo:
1056 return
1057
1058 try:
1059 # Setting servo_args to {} will force it to create the servo_host
1060 # object if possible.
1061 self._servo_host = servo_host.create_servo_host(
1062 dut=self.hostname, servo_args={})
1063 if self._servo_host:
1064 self.servo = self._servo_host.get_servo()
1065 else:
1066 logging.error('Failed to create servo_host object.')
1067 except Exception as e:
1068 logging.error('Failed to create servo object: %s', e)
1069
1070
J. Richard Barnettee4af8b92013-05-01 13:16:12 -07001071 def _servo_repair_reinstall(self):
Scott Zawalski62bacae2013-03-05 10:40:32 -05001072 """Reinstall the DUT utilizing servo and a test image.
1073
1074 Re-install the OS on the DUT by:
1075 1) installing a test image on a USB storage device attached to the Servo
1076 board,
Tom Wai-Hong Tam27af7332015-07-25 06:09:39 +08001077 2) booting that image in recovery mode,
1078 3) resetting the TPM status, and then
1079 4) installing the image with chromeos-install.
Scott Zawalski62bacae2013-03-05 10:40:32 -05001080
Scott Zawalski62bacae2013-03-05 10:40:32 -05001081 @raises AutoservRepairMethodNA if the device does not have servo
1082 support.
1083
1084 """
Dan Shic1b8bdd2015-09-14 23:11:24 -07001085 # To repair a DUT connected to a moblab, try to create a servo object if
1086 # it was failed to be created earlier as there may be a servo_host host
1087 # attribute for this host.
1088 if utils.is_moblab():
1089 self._setup_servo()
1090
Scott Zawalski62bacae2013-03-05 10:40:32 -05001091 if not self.servo:
1092 raise error.AutoservRepairMethodNA('Repair Reinstall NA: '
1093 'DUT has no servo support.')
1094
1095 logging.info('Attempting to recovery servo enabled device with '
1096 'servo_repair_reinstall')
1097
J. Richard Barnettee4af8b92013-05-01 13:16:12 -07001098 image_url = self.stage_image_for_servo()
Scott Zawalski62bacae2013-03-05 10:40:32 -05001099 self.servo_install(image_url)
1100
1101
1102 def _servo_repair_power(self):
1103 """Attempt to repair DUT using an attached Servo.
1104
1105 Attempt to power on the DUT via power_long_press.
1106
1107 @raises AutoservRepairMethodNA if the device does not have servo
1108 support.
1109 @raises AutoservRepairFailure if the repair fails for any reason.
1110 """
1111 if not self.servo:
1112 raise error.AutoservRepairMethodNA('Repair Power NA: '
1113 'DUT has no servo support.')
1114
1115 logging.info('Attempting to recover servo enabled device by '
1116 'powering it off and on.')
1117 self.servo.get_power_state_controller().power_off()
1118 self.servo.get_power_state_controller().power_on()
1119 if self.wait_up(self.BOOT_TIMEOUT):
1120 return
1121
1122 raise error.AutoservRepairFailure('DUT did not boot after long_press.')
Richard Barnette03a0c132012-11-05 12:40:35 -08001123
1124
Richard Barnette82c35912012-11-20 10:09:10 -08001125 def _powercycle_to_repair(self):
1126 """Utilize the RPM Infrastructure to bring the host back up.
1127
1128 If the host is not up/repaired after the first powercycle we utilize
1129 auto fallback to the last good install by powercycling and rebooting the
1130 host 6 times.
Scott Zawalski62bacae2013-03-05 10:40:32 -05001131
1132 @raises AutoservRepairMethodNA if the device does not support remote
1133 power.
1134 @raises AutoservRepairFailure if the repair fails for any reason.
1135
Richard Barnette82c35912012-11-20 10:09:10 -08001136 """
Scott Zawalski62bacae2013-03-05 10:40:32 -05001137 if not self.has_power():
1138 raise error.AutoservRepairMethodNA('Device does not support power.')
1139
Richard Barnette82c35912012-11-20 10:09:10 -08001140 logging.info('Attempting repair via RPM powercycle.')
1141 failed_cycles = 0
1142 self.power_cycle()
1143 while not self.wait_up(timeout=self.BOOT_TIMEOUT):
1144 failed_cycles += 1
1145 if failed_cycles >= self._MAX_POWER_CYCLE_ATTEMPTS:
Scott Zawalski62bacae2013-03-05 10:40:32 -05001146 raise error.AutoservRepairFailure(
1147 'Powercycled host %s %d times; device did not come back'
1148 ' online.' % (self.hostname, failed_cycles))
Richard Barnette82c35912012-11-20 10:09:10 -08001149 self.power_cycle()
1150 if failed_cycles == 0:
1151 logging.info('Powercycling was successful first time.')
1152 else:
1153 logging.info('Powercycling was successful after %d failures.',
1154 failed_cycles)
1155
1156
MK Ryu35d661e2014-09-25 17:44:10 -07001157 def _reboot_repair(self):
1158 """SSH to this host and reboot."""
1159 if not self.is_up(self._CHECK_HOST_UP_TIMEOUT_SECS):
1160 raise error.AutoservRepairMethodNA('DUT unreachable for reboot.')
1161 logging.info('Attempting repair via SSH reboot.')
1162 self.reboot(timeout=self.BOOT_TIMEOUT, wait=True)
1163
1164
Prashanth B4d8184f2014-05-05 12:22:02 -07001165 def check_device(self):
1166 """Check if a device is ssh-able, and if so, clean and verify it.
1167
1168 @raise AutoservSSHTimeout: If the ssh ping times out.
1169 @raise AutoservSshPermissionDeniedError: If ssh ping fails due to
1170 permissions.
1171 @raise AutoservSshPingHostError: For other AutoservRunErrors during
1172 ssh_ping.
1173 @raises AutoservError: As appropriate, during cleanup and verify.
1174 """
1175 self.ssh_ping()
1176 self.cleanup()
1177 self.verify()
1178
1179
Dan Shi90466352015-09-22 15:01:05 -07001180 def confirm_servo(self):
1181 """Confirm servo is initialized and verified.
1182
1183 @raise AutoservError: If servo is not initialized and verified.
1184 """
1185 if self._servo_host.required_by_test and self.servo:
1186 return
1187
1188 # Force to re-create the servo object to make sure servo is verified.
1189 logging.debug('Rebuilding the servo object.')
1190 self.servo = None
1191 self._servo_host = None
1192 self._setup_servo()
1193 if not self.servo:
1194 raise error.AutoservError('Failed to create servo object.')
1195
1196
Richard Barnette82c35912012-11-20 10:09:10 -08001197 def repair_full(self):
1198 """Repair a host for repair level NO_PROTECTION.
1199
1200 This overrides the base class function for repair; it does
1201 not call back to the parent class, but instead offers a
1202 simplified implementation based on the capabilities in the
1203 Chrome OS test lab.
1204
Fang Deng5d518f42013-08-02 14:04:32 -07001205 It first verifies and repairs servo if it is a DUT in CrOS
Fang Deng03590af2013-10-07 17:34:20 -07001206 lab and a servo is attached.
Fang Deng5d518f42013-08-02 14:04:32 -07001207
Jakob Juelich82b7d1c2014-09-15 16:10:57 -07001208 This escalates in order through the following procedures and verifies
1209 the status using `self.check_device()` after each of them. This is done
1210 until both the repair and the veryfing step succeed.
1211
MK Ryu35d661e2014-09-25 17:44:10 -07001212 Escalation order of repair procedures from less intrusive to
1213 more intrusive repairs:
1214 1. SSH to the DUT and reboot.
Scott Zawalski62bacae2013-03-05 10:40:32 -05001215 2. If there's a servo for the DUT, try to power the DUT off and
1216 on.
MK Ryu35d661e2014-09-25 17:44:10 -07001217 3. If the DUT can be power-cycled via RPM, try to repair
Richard Barnette82c35912012-11-20 10:09:10 -08001218 by power-cycling.
MK Ryu35d661e2014-09-25 17:44:10 -07001219 4. Try to re-install to a known stable image using
1220 auto-update.
1221 5. If there's a servo for the DUT, try to re-install via
1222 the servo.
Richard Barnette82c35912012-11-20 10:09:10 -08001223
1224 As with the parent method, the last operation performed on
Prashanth B4d8184f2014-05-05 12:22:02 -07001225 the DUT must be to call `self.check_device()`; If that call fails the
1226 exception it raises is passed back to the caller.
J. Richard Barnettefde55fc2013-03-15 17:47:01 -07001227
Scott Zawalski62bacae2013-03-05 10:40:32 -05001228 @raises AutoservRepairTotalFailure if the repair process fails to
1229 fix the DUT.
Fang Deng5d518f42013-08-02 14:04:32 -07001230 @raises ServoHostRepairTotalFailure if the repair process fails to
1231 fix the servo host if one is attached to the DUT.
1232 @raises AutoservSshPermissionDeniedError if it is unable
1233 to ssh to the servo host due to permission error.
1234
Richard Barnette82c35912012-11-20 10:09:10 -08001235 """
Jakob Juelich82b7d1c2014-09-15 16:10:57 -07001236 # Caution: Deleting shards relies on repair to always reboot the DUT.
1237
Dan Shi4d478522014-02-14 13:46:32 -08001238 if self._servo_host and not self.servo:
Fang Deng03590af2013-10-07 17:34:20 -07001239 try:
Dan Shi4d478522014-02-14 13:46:32 -08001240 self._servo_host.repair_full()
Fang Deng03590af2013-10-07 17:34:20 -07001241 except Exception as e:
Fang Deng03590af2013-10-07 17:34:20 -07001242 logging.error('Could not create a healthy servo: %s', e)
Dan Shi4d478522014-02-14 13:46:32 -08001243 self.servo = self._servo_host.get_servo()
Fang Deng5d518f42013-08-02 14:04:32 -07001244
MK Ryu35d661e2014-09-25 17:44:10 -07001245 self.try_collect_crashlogs()
1246
Scott Zawalski62bacae2013-03-05 10:40:32 -05001247 # TODO(scottz): This should use something similar to label_decorator,
1248 # but needs to be populated in order so DUTs are repaired with the
1249 # least amount of effort.
MK Ryu35d661e2014-09-25 17:44:10 -07001250 repair_funcs = [self._reboot_repair,
1251 self._servo_repair_power,
1252 self._powercycle_to_repair,
Dan Shi849a1c42014-03-05 11:10:43 -08001253 self._install_repair,
Dan Shi2c88eed2013-11-12 10:18:38 -08001254 self._install_repair_with_powerwash,
MK Ryu35d661e2014-09-25 17:44:10 -07001255 self._servo_repair_reinstall]
Scott Zawalski62bacae2013-03-05 10:40:32 -05001256 errors = []
Simran Basie6130932013-10-01 14:07:52 -07001257 board = self._get_board_from_afe()
Scott Zawalski62bacae2013-03-05 10:40:32 -05001258 for repair_func in repair_funcs:
1259 try:
1260 repair_func()
MK Ryu35d661e2014-09-25 17:44:10 -07001261 self.try_collect_crashlogs()
Prashanth B4d8184f2014-05-05 12:22:02 -07001262 self.check_device()
Gabe Black1e1c41b2015-02-04 23:55:15 -08001263 autotest_stats.Counter(
Simran Basie6130932013-10-01 14:07:52 -07001264 '%s.SUCCEEDED' % repair_func.__name__).increment()
1265 if board:
Gabe Black1e1c41b2015-02-04 23:55:15 -08001266 autotest_stats.Counter(
Dan Shib87c3aa2014-02-12 15:40:31 -08001267 '%s.%s.SUCCEEDED' % (repair_func.__name__,
Simran Basie6130932013-10-01 14:07:52 -07001268 board)).increment()
Scott Zawalski62bacae2013-03-05 10:40:32 -05001269 return
Simran Basie6130932013-10-01 14:07:52 -07001270 except error.AutoservRepairMethodNA as e:
Gabe Black1e1c41b2015-02-04 23:55:15 -08001271 autotest_stats.Counter(
Simran Basie6130932013-10-01 14:07:52 -07001272 '%s.RepairNA' % repair_func.__name__).increment()
1273 if board:
Gabe Black1e1c41b2015-02-04 23:55:15 -08001274 autotest_stats.Counter(
Dan Shib87c3aa2014-02-12 15:40:31 -08001275 '%s.%s.RepairNA' % (repair_func.__name__,
Simran Basie6130932013-10-01 14:07:52 -07001276 board)).increment()
Ilja H. Friedel04be2bd2014-05-07 21:29:59 -07001277 logging.warning('Repair function NA: %s', e)
Simran Basie6130932013-10-01 14:07:52 -07001278 errors.append(str(e))
Scott Zawalski62bacae2013-03-05 10:40:32 -05001279 except Exception as e:
Gabe Black1e1c41b2015-02-04 23:55:15 -08001280 autotest_stats.Counter(
Simran Basie6130932013-10-01 14:07:52 -07001281 '%s.FAILED' % repair_func.__name__).increment()
1282 if board:
Gabe Black1e1c41b2015-02-04 23:55:15 -08001283 autotest_stats.Counter(
Dan Shib87c3aa2014-02-12 15:40:31 -08001284 '%s.%s.FAILED' % (repair_func.__name__,
Simran Basie6130932013-10-01 14:07:52 -07001285 board)).increment()
Ilja H. Friedel04be2bd2014-05-07 21:29:59 -07001286 logging.warning('Failed to repair device: %s', e)
Scott Zawalski62bacae2013-03-05 10:40:32 -05001287 errors.append(str(e))
Scott Zawalski89c44dd2013-02-26 09:28:02 -05001288
Gabe Black1e1c41b2015-02-04 23:55:15 -08001289 autotest_stats.Counter('Full_Repair_Failed').increment()
Simran Basie6130932013-10-01 14:07:52 -07001290 if board:
Gabe Black1e1c41b2015-02-04 23:55:15 -08001291 autotest_stats.Counter(
Simran Basie6130932013-10-01 14:07:52 -07001292 'Full_Repair_Failed.%s' % board).increment()
Scott Zawalski62bacae2013-03-05 10:40:32 -05001293 raise error.AutoservRepairTotalFailure(
1294 'All attempts at repairing the device failed:\n%s' %
1295 '\n'.join(errors))
Richard Barnette82c35912012-11-20 10:09:10 -08001296
1297
MK Ryu35d661e2014-09-25 17:44:10 -07001298 def try_collect_crashlogs(self, check_host_up=True):
1299 """
1300 Check if a host is up and logs need to be collected from the host,
1301 if yes, collect them.
1302
1303 @param check_host_up: Flag for checking host is up. Default is True.
1304 """
1305 try:
1306 crash_job = self._need_crash_logs()
1307 if crash_job:
1308 logging.debug('%s: Job %s was crashed', self._CRASHLOGS_PREFIX,
1309 crash_job)
1310 if not check_host_up or self.is_up(
1311 self._CHECK_HOST_UP_TIMEOUT_SECS):
1312 self._collect_crashlogs(crash_job)
1313 logging.debug('%s: Completed collecting logs for the '
1314 'crashed job %s', self._CRASHLOGS_PREFIX,
1315 crash_job)
1316 except Exception as e:
1317 # Exception should not result in repair failure.
1318 # Therefore, suppress all exceptions here.
1319 logging.error('%s: Failed while trying to collect crash-logs: %s',
1320 self._CRASHLOGS_PREFIX, e)
1321
1322
1323 def _need_crash_logs(self):
1324 """Get the value of need_crash_logs attribute of this host.
1325
1326 @return: Value string of need_crash_logs attribute
1327 None if there is no need_crash_logs attribute
1328 """
1329 attrs = self._AFE.get_host_attribute(constants.CRASHLOGS_HOST_ATTRIBUTE,
1330 hostname=self.hostname)
1331 assert len(attrs) < 2
1332 return attrs[0].value if attrs else None
1333
1334
1335 def _collect_crashlogs(self, job_id):
1336 """Grab logs from the host where a job was crashed.
1337
1338 First, check if PRIOR_LOGS_DIR exists in the host.
1339 If yes, collect them.
1340 Otherwise, check if a lab-machine marker (_LAB_MACHINE_FILE) exists
1341 in the host.
1342 If yes, the host was repaired automatically, and we collect normal
1343 system logs.
1344
1345 @param job_id: Id of the job that was crashed.
1346 """
1347 crashlogs_dir = crashcollect.get_crashinfo_dir(self,
1348 constants.CRASHLOGS_DEST_DIR_PREFIX)
1349 flag_prior_logs = False
1350
1351 if self.path_exists(client_constants.PRIOR_LOGS_DIR):
1352 flag_prior_logs = True
1353 self._collect_prior_logs(crashlogs_dir)
1354 elif self.path_exists(self._LAB_MACHINE_FILE):
1355 self._collect_system_logs(crashlogs_dir)
1356 else:
1357 logging.warning('%s: Host was manually re-installed without '
1358 '--lab_preserve_log option. Skip collecting '
1359 'crash-logs.', self._CRASHLOGS_PREFIX)
1360
1361 # We make crash collection be one-time effort.
1362 # _collect_prior_logs() and _collect_system_logs() will not throw
1363 # any exception, and following codes will be executed even when
1364 # those methods fail.
1365 # _collect_crashlogs() is called only when the host is up (refer
1366 # to try_collect_crashlogs()). We assume _collect_prior_logs() and
1367 # _collect_system_logs() fail rarely when the host is up.
1368 # In addition, it is not clear how many times we should try crash
1369 # collection again while not triggering next repair unnecessarily.
1370 # Threfore, we try crash collection one time.
1371
1372 # Create a marker file as soon as log collection is done.
1373 # Leave the job id to this marker for gs_offloader to consume.
1374 marker_file = os.path.join(crashlogs_dir, constants.CRASHLOGS_MARKER)
1375 with open(marker_file, 'a') as f:
1376 f.write('%s\n' % job_id)
1377
1378 # Remove need_crash_logs attribute
1379 logging.debug('%s: Remove attribute need_crash_logs from host %s',
1380 self._CRASHLOGS_PREFIX, self.hostname)
1381 self._AFE.set_host_attribute(constants.CRASHLOGS_HOST_ATTRIBUTE,
1382 None, hostname=self.hostname)
1383
1384 if flag_prior_logs:
1385 logging.debug('%s: Remove %s from host %s', self._CRASHLOGS_PREFIX,
1386 client_constants.PRIOR_LOGS_DIR, self.hostname)
1387 self.run('rm -rf %s; sync' % client_constants.PRIOR_LOGS_DIR)
1388 # Wait for a few seconds to make sure the prior command is
1389 # done deep through storage.
1390 time.sleep(self._SAFE_WAIT_SECS)
1391
1392
1393 def _collect_prior_logs(self, crashlogs_dir):
1394 """Grab prior logs that were stashed before re-installing a host.
1395
1396 @param crashlogs_dir: Directory path where crash-logs are stored.
1397 """
1398 logging.debug('%s: Found %s, collecting them...',
1399 self._CRASHLOGS_PREFIX, client_constants.PRIOR_LOGS_DIR)
1400 try:
1401 self.collect_logs(client_constants.PRIOR_LOGS_DIR,
1402 crashlogs_dir, False)
1403 logging.debug('%s: %s is collected',
1404 self._CRASHLOGS_PREFIX, client_constants.PRIOR_LOGS_DIR)
1405 except Exception as e:
1406 logging.error('%s: Failed to collect %s: %s',
1407 self._CRASHLOGS_PREFIX, client_constants.PRIOR_LOGS_DIR,
1408 e)
1409
1410
1411 def _collect_system_logs(self, crashlogs_dir):
1412 """Grab normal system logs from a host.
1413
1414 @param crashlogs_dir: Directory path where crash-logs are stored.
1415 """
1416 logging.debug('%s: Found %s, collecting system logs...',
1417 self._CRASHLOGS_PREFIX, self._LAB_MACHINE_FILE)
1418 sources = server_utils.parse_simple_config(self._LOGS_TO_COLLECT_FILE)
1419 for src in sources:
1420 try:
1421 if self.path_exists(src):
1422 logging.debug('%s: Collecting %s...',
1423 self._CRASHLOGS_PREFIX, src)
1424 dest = server_utils.concat_path_except_last(
1425 crashlogs_dir, src)
1426 self.collect_logs(src, dest, False)
1427 logging.debug('%s: %s is collected',
1428 self._CRASHLOGS_PREFIX, src)
1429 except Exception as e:
1430 logging.error('%s: Failed to collect %s: %s',
1431 self._CRASHLOGS_PREFIX, src, e)
1432
1433
J. Richard Barnette1d78b012012-05-15 13:56:30 -07001434 def close(self):
beeps32a63082013-08-22 14:02:29 -07001435 self.rpc_disconnect_all()
Fang Deng0ca40e22013-08-27 17:47:44 -07001436 super(CrosHost, self).close()
J. Richard Barnette1d78b012012-05-15 13:56:30 -07001437
1438
Dan Shi49ca0932014-11-14 11:22:27 -08001439 def get_power_supply_info(self):
1440 """Get the output of power_supply_info.
1441
1442 power_supply_info outputs the info of each power supply, e.g.,
1443 Device: Line Power
1444 online: no
1445 type: Mains
1446 voltage (V): 0
1447 current (A): 0
1448 Device: Battery
1449 state: Discharging
1450 percentage: 95.9276
1451 technology: Li-ion
1452
1453 Above output shows two devices, Line Power and Battery, with details of
1454 each device listed. This function parses the output into a dictionary,
1455 with key being the device name, and value being a dictionary of details
1456 of the device info.
1457
1458 @return: The dictionary of power_supply_info, e.g.,
1459 {'Line Power': {'online': 'yes', 'type': 'main'},
1460 'Battery': {'vendor': 'xyz', 'percentage': '100'}}
Dan Shie9b765d2014-12-29 16:59:49 -08001461 @raise error.AutoservRunError if power_supply_info tool is not found in
1462 the DUT. Caller should handle this error to avoid false failure
1463 on verification.
Dan Shi49ca0932014-11-14 11:22:27 -08001464 """
1465 result = self.run('power_supply_info').stdout.strip()
1466 info = {}
1467 device_name = None
1468 device_info = {}
1469 for line in result.split('\n'):
1470 pair = [v.strip() for v in line.split(':')]
1471 if len(pair) != 2:
1472 continue
1473 if pair[0] == 'Device':
1474 if device_name:
1475 info[device_name] = device_info
1476 device_name = pair[1]
1477 device_info = {}
1478 else:
1479 device_info[pair[0]] = pair[1]
1480 if device_name and not device_name in info:
1481 info[device_name] = device_info
1482 return info
1483
1484
1485 def get_battery_percentage(self):
1486 """Get the battery percentage.
1487
1488 @return: The percentage of battery level, value range from 0-100. Return
1489 None if the battery info cannot be retrieved.
1490 """
1491 try:
1492 info = self.get_power_supply_info()
1493 logging.info(info)
1494 return float(info['Battery']['percentage'])
Dan Shie9b765d2014-12-29 16:59:49 -08001495 except (KeyError, ValueError, error.AutoservRunError):
Dan Shi49ca0932014-11-14 11:22:27 -08001496 return None
1497
1498
1499 def is_ac_connected(self):
1500 """Check if the dut has power adapter connected and charging.
1501
1502 @return: True if power adapter is connected and charging.
1503 """
1504 try:
1505 info = self.get_power_supply_info()
1506 return info['Line Power']['online'] == 'yes'
Dan Shie9b765d2014-12-29 16:59:49 -08001507 except (KeyError, error.AutoservRunError):
1508 return None
Dan Shi49ca0932014-11-14 11:22:27 -08001509
1510
Simran Basi5e6339a2013-03-21 11:34:32 -07001511 def _cleanup_poweron(self):
1512 """Special cleanup method to make sure hosts always get power back."""
1513 afe = frontend_wrappers.RetryingAFE(timeout_min=5, delay_sec=10)
1514 hosts = afe.get_hosts(hostname=self.hostname)
1515 if not hosts or not (self._RPM_OUTLET_CHANGED in
1516 hosts[0].attributes):
1517 return
1518 logging.debug('This host has recently interacted with the RPM'
1519 ' Infrastructure. Ensuring power is on.')
1520 try:
1521 self.power_on()
Dan Shi7dca56e2014-11-11 17:07:56 -08001522 afe.set_host_attribute(self._RPM_OUTLET_CHANGED, None,
1523 hostname=self.hostname)
Simran Basi5e6339a2013-03-21 11:34:32 -07001524 except rpm_client.RemotePowerException:
Simran Basi5e6339a2013-03-21 11:34:32 -07001525 logging.error('Failed to turn Power On for this host after '
1526 'cleanup through the RPM Infrastructure.')
Gabe Blackb72f4fb2015-01-20 16:47:13 -08001527 autotest_es.post(
Dan Shi7dca56e2014-11-11 17:07:56 -08001528 type_str='RPM_poweron_failure',
1529 metadata={'hostname': self.hostname})
Dan Shi49ca0932014-11-14 11:22:27 -08001530
1531 battery_percentage = self.get_battery_percentage()
Dan Shif01ebe22014-12-05 13:10:57 -08001532 if battery_percentage and battery_percentage < 50:
Dan Shi49ca0932014-11-14 11:22:27 -08001533 raise
1534 elif self.is_ac_connected():
1535 logging.info('The device has power adapter connected and '
1536 'charging. No need to try to turn RPM on '
1537 'again.')
1538 afe.set_host_attribute(self._RPM_OUTLET_CHANGED, None,
1539 hostname=self.hostname)
1540 logging.info('Battery level is now at %s%%. The device may '
1541 'still have enough power to run test, so no '
1542 'exception will be raised.', battery_percentage)
1543
Simran Basi5e6339a2013-03-21 11:34:32 -07001544
beepsc87ff602013-07-31 21:53:00 -07001545 def _is_factory_image(self):
1546 """Checks if the image on the DUT is a factory image.
1547
1548 @return: True if the image on the DUT is a factory image.
1549 False otherwise.
1550 """
1551 result = self.run('[ -f /root/.factory_test ]', ignore_status=True)
1552 return result.exit_status == 0
1553
1554
1555 def _restart_ui(self):
J. Richard Barnette84890bd2014-02-21 11:05:47 -08001556 """Restart the Chrome UI.
beepsc87ff602013-07-31 21:53:00 -07001557
1558 @raises: FactoryImageCheckerException for factory images, since
1559 we cannot attempt to restart ui on them.
1560 error.AutoservRunError for any other type of error that
1561 occurs while restarting ui.
1562 """
1563 if self._is_factory_image():
Dan Shi549fb822015-03-24 18:01:11 -07001564 raise FactoryImageCheckerException('Cannot restart ui on factory '
1565 'images')
beepsc87ff602013-07-31 21:53:00 -07001566
J. Richard Barnette84890bd2014-02-21 11:05:47 -08001567 # TODO(jrbarnette): The command to stop/start the ui job
1568 # should live inside cros_ui, too. However that would seem
1569 # to imply interface changes to the existing start()/restart()
1570 # functions, which is a bridge too far (for now).
J. Richard Barnette6069aa12015-06-08 09:10:24 -07001571 prompt = cros_ui.get_chrome_session_ident(self)
J. Richard Barnette84890bd2014-02-21 11:05:47 -08001572 self.run('stop ui; start ui')
1573 cros_ui.wait_for_chrome_ready(prompt, self)
beepsc87ff602013-07-31 21:53:00 -07001574
1575
Dan Shi549fb822015-03-24 18:01:11 -07001576 def get_release_version(self):
1577 """Get the value of attribute CHROMEOS_RELEASE_VERSION from lsb-release.
1578
1579 @returns The version string in lsb-release, under attribute
1580 CHROMEOS_RELEASE_VERSION.
1581 """
1582 lsb_release_content = self.run(
1583 'cat "%s"' % client_constants.LSB_RELEASE).stdout.strip()
1584 return lsbrelease_utils.get_chromeos_release_version(
1585 lsb_release_content=lsb_release_content)
1586
1587
1588 def verify_cros_version_label(self):
1589 """ Make sure host's cros-version label match the actual image in dut.
1590
1591 Remove any cros-version: label that doesn't match that installed in
1592 the dut.
1593
1594 @param raise_error: Set to True to raise exception if any mismatch found
1595
1596 @raise error.AutoservError: If any mismatch between cros-version label
1597 and the build installed in dut is found.
1598 """
1599 labels = self._AFE.get_labels(
1600 name__startswith=ds_constants.VERSION_PREFIX,
1601 host__hostname=self.hostname)
1602 mismatch_found = False
1603 if labels:
1604 # Get CHROMEOS_RELEASE_VERSION from lsb-release, e.g., 6908.0.0.
1605 # Note that it's different from cros-version label, which has
1606 # builder and branch info, e.g.,
1607 # cros-version:peppy-release/R43-6908.0.0
1608 release_version = self.get_release_version()
1609 host_list = [self.hostname]
1610 for label in labels:
1611 # Remove any cros-version label that does not match
1612 # release_version.
1613 build_version = label.name[len(ds_constants.VERSION_PREFIX):]
1614 if not utils.version_match(build_version, release_version):
1615 logging.warn('cros-version label "%s" does not match '
1616 'release version %s. Removing the label.',
1617 label.name, release_version)
1618 label.remove_hosts(hosts=host_list)
1619 mismatch_found = True
1620 if mismatch_found:
Dan Shi1057bae2015-03-30 11:35:09 -07001621 autotest_es.post(use_http=True,
1622 type_str='cros_version_label_mismatch',
1623 metadata={'hostname': self.hostname})
Dan Shi549fb822015-03-24 18:01:11 -07001624 raise error.AutoservError('The host has wrong cros-version label.')
1625
1626
Darren Krahn495b0982015-09-21 19:12:51 -07001627 def verify_tpm_status(self):
1628 """ Verify the host's TPM is in a good state.
1629
1630 @raise error.AutoservError: If state is not good.
1631 """
1632 # This cryptohome command emits status information in JSON format. It
1633 # looks something like this:
1634 # {
1635 # "installattrs": {
1636 # "first_install": false,
1637 # "initialized": true,
1638 # "invalid": false,
1639 # "lockbox_index": 536870916,
1640 # "lockbox_nvram_version": 2,
1641 # "secure": true,
1642 # "size": 0,
1643 # "version": 1
1644 # },
1645 # "mounts": [ {
1646 # "enterprise": false,
1647 # "keysets": [ {
1648 # "current": true,
1649 # "index": 0,
1650 # "last_activity": 1330111359,
1651 # "ok": true,
1652 # "scrypt": true,
1653 # "tpm": false
1654 # } ],
1655 # "mounted": true,
1656 # "owner": "dbb3dd34edb181245130e136be51fa08478d3909"
1657 # } ],
1658 # "tpm": {
1659 # "being_owned": false,
1660 # "can_connect": true,
1661 # "can_decrypt": false,
1662 # "can_encrypt": false,
1663 # "can_load_srk": true,
1664 # "can_load_srk_pubkey": true,
1665 # "enabled": true,
1666 # "has_context": true,
1667 # "has_cryptohome_key": false,
1668 # "has_key_handle": false,
1669 # "last_error": 0,
1670 # "owned": true
1671 # }
1672 # }
1673 output = self.run('cryptohome --action=status').stdout.strip()
1674 try:
1675 status = json.loads(output)
1676 except ValueError:
1677 logging.error('TPM_VERIFY: Cryptohome did not return valid status.')
1678 return
1679 try:
1680 tpm = status['tpm']
1681 if (not tpm['enabled'] or not tpm['can_connect'] or
1682 (tpm['owned'] and not tpm['can_load_srk']) or
1683 (tpm['can_load_srk'] and not tpm['can_load_srk_pubkey'])):
1684 logging.error('TPM_VERIFY: The host TPM is in a bad state.')
1685 raise error.AutoservError('The host TPM is in a bad state.')
1686 else:
1687 logging.debug('TPM_VERIFY: The host TPM is in a good state.')
1688 except KeyError:
1689 logging.error('TPM_VERIFY: Cryptohome did not return valid status.')
1690
1691
beepsc87ff602013-07-31 21:53:00 -07001692 def cleanup(self):
MK Ryu35d661e2014-09-25 17:44:10 -07001693 self.run('rm -f %s' % client_constants.CLEANUP_LOGS_PAUSED_FILE)
Scott Zawalskiddbc31e2012-11-15 11:29:01 -05001694 try:
beepsc87ff602013-07-31 21:53:00 -07001695 self._restart_ui()
1696 except (error.AutotestRunError, error.AutoservRunError,
1697 FactoryImageCheckerException):
Ilja H. Friedel04be2bd2014-05-07 21:29:59 -07001698 logging.warning('Unable to restart ui, rebooting device.')
Scott Zawalskiddbc31e2012-11-15 11:29:01 -05001699 # Since restarting the UI fails fall back to normal Autotest
1700 # cleanup routines, i.e. reboot the machine.
Fang Deng0ca40e22013-08-27 17:47:44 -07001701 super(CrosHost, self).cleanup()
Simran Basi5e6339a2013-03-21 11:34:32 -07001702 # Check if the rpm outlet was manipulated.
Simran Basid5e5e272012-09-24 15:23:59 -07001703 if self.has_power():
Simran Basi5e6339a2013-03-21 11:34:32 -07001704 self._cleanup_poweron()
Dan Shi549fb822015-03-24 18:01:11 -07001705 self.verify_cros_version_label()
J. Richard Barnette45e93de2012-04-11 17:24:15 -07001706
1707
Yu-Ju Honga2be94a2012-07-31 09:48:52 -07001708 def reboot(self, **dargs):
1709 """
1710 This function reboots the site host. The more generic
1711 RemoteHost.reboot() performs sync and sleeps for 5
1712 seconds. This is not necessary for Chrome OS devices as the
1713 sync should be finished in a short time during the reboot
1714 command.
1715 """
Tom Wai-Hong Tamf5cd1d42012-08-13 12:04:08 +08001716 if 'reboot_cmd' not in dargs:
Doug Anderson7d5aeb22014-02-27 15:12:17 -08001717 reboot_timeout = dargs.get('reboot_timeout', 10)
J. Richard Barnette9af19632015-09-25 12:18:03 -07001718 dargs['reboot_cmd'] = ('sleep 1; '
1719 'reboot & sleep %d; '
1720 'reboot -f' % reboot_timeout)
Yu-Ju Honga2be94a2012-07-31 09:48:52 -07001721 # Enable fastsync to avoid running extra sync commands before reboot.
Tom Wai-Hong Tamf5cd1d42012-08-13 12:04:08 +08001722 if 'fastsync' not in dargs:
1723 dargs['fastsync'] = True
Michael Liangda8c60a2014-06-03 13:24:51 -07001724
Charlie Mooneya8e6dab2014-05-29 14:37:55 -07001725 # For purposes of logging reboot times:
1726 # Get the board name i.e. 'daisy_spring'
Michael Liangca4f5a62014-07-10 15:45:13 -07001727 board_fullname = self.get_board()
1728
1729 # Strip the prefix and add it to dargs.
1730 dargs['board'] = board_fullname[board_fullname.find(':')+1:]
Fang Deng0ca40e22013-08-27 17:47:44 -07001731 super(CrosHost, self).reboot(**dargs)
Yu-Ju Honga2be94a2012-07-31 09:48:52 -07001732
1733
Gwendal Grignou7a61d2f2014-05-23 11:05:51 -07001734 def suspend(self, **dargs):
1735 """
1736 This function suspends the site host.
1737 """
1738 suspend_time = dargs.get('suspend_time', 60)
1739 dargs['timeout'] = suspend_time
1740 if 'suspend_cmd' not in dargs:
J. Richard Barnette9af19632015-09-25 12:18:03 -07001741 dargs['suspend_cmd'] = ' && '.join([
1742 'echo 0 > /sys/class/rtc/rtc0/wakealarm',
Gwendal Grignou7a61d2f2014-05-23 11:05:51 -07001743 'echo +%d > /sys/class/rtc/rtc0/wakealarm' % suspend_time,
J. Richard Barnette9af19632015-09-25 12:18:03 -07001744 'powerd_dbus_suspend --delay=0'])
Gwendal Grignou7a61d2f2014-05-23 11:05:51 -07001745 super(CrosHost, self).suspend(**dargs)
1746
1747
Simran Basiec564392014-08-25 16:48:09 -07001748 def upstart_status(self, service_name):
1749 """Check the status of an upstart init script.
1750
1751 @param service_name: Service to look up.
1752
1753 @returns True if the service is running, False otherwise.
1754 """
1755 return self.run('status %s | grep start/running' %
1756 service_name).stdout.strip() != ''
1757
1758
J. Richard Barnette45e93de2012-04-11 17:24:15 -07001759 def verify_software(self):
Richard Barnetteb2bc13c2013-01-08 17:32:51 -08001760 """Verify working software on a Chrome OS system.
J. Richard Barnette45e93de2012-04-11 17:24:15 -07001761
Richard Barnetteb2bc13c2013-01-08 17:32:51 -08001762 Tests for the following conditions:
1763 1. All conditions tested by the parent version of this
1764 function.
1765 2. Sufficient space in /mnt/stateful_partition.
Fang Deng6b05f5b2013-03-20 13:42:11 -07001766 3. Sufficient space in /mnt/stateful_partition/encrypted.
1767 4. update_engine answers a simple status request over DBus.
J. Richard Barnette45e93de2012-04-11 17:24:15 -07001768
J. Richard Barnette45e93de2012-04-11 17:24:15 -07001769 """
MK Ryu35d661e2014-09-25 17:44:10 -07001770 # Check if a job was crashed on this host.
1771 # If yes, avoid verification until crash-logs are collected.
1772 if self._need_crash_logs():
1773 raise error.AutoservCrashLogCollectRequired(
1774 'Need to collect crash-logs before verification')
1775
Fang Deng0ca40e22013-08-27 17:47:44 -07001776 super(CrosHost, self).verify_software()
Dan Shib8540a52015-07-16 14:18:23 -07001777 default_kilo_inodes_required = CONFIG.get_config_value(
1778 'SERVER', 'kilo_inodes_required', type=int, default=100)
1779 board = self.get_board().replace(ds_constants.BOARD_PREFIX, '')
1780 kilo_inodes_required = CONFIG.get_config_value(
1781 'SERVER', 'kilo_inodes_required_%s' % board,
1782 type=int, default=default_kilo_inodes_required)
1783 self.check_inodes('/mnt/stateful_partition', kilo_inodes_required)
J. Richard Barnette45e93de2012-04-11 17:24:15 -07001784 self.check_diskspace(
1785 '/mnt/stateful_partition',
Dan Shib8540a52015-07-16 14:18:23 -07001786 CONFIG.get_config_value(
Fang Deng6b05f5b2013-03-20 13:42:11 -07001787 'SERVER', 'gb_diskspace_required', type=float,
1788 default=20.0))
Gaurav Shahe448af82014-06-19 15:18:59 -07001789 encrypted_stateful_path = '/mnt/stateful_partition/encrypted'
1790 # Not all targets build with encrypted stateful support.
1791 if self.path_exists(encrypted_stateful_path):
1792 self.check_diskspace(
1793 encrypted_stateful_path,
Dan Shib8540a52015-07-16 14:18:23 -07001794 CONFIG.get_config_value(
Gaurav Shahe448af82014-06-19 15:18:59 -07001795 'SERVER', 'gb_encrypted_diskspace_required', type=float,
1796 default=0.1))
beepsc87ff602013-07-31 21:53:00 -07001797
Simran Basiec564392014-08-25 16:48:09 -07001798 if not self.upstart_status('system-services'):
Prashanth B5d0a0512014-04-25 12:26:08 -07001799 raise error.AutoservError('Chrome failed to reach login. '
1800 'System services not running.')
1801
beepsc87ff602013-07-31 21:53:00 -07001802 # Factory images don't run update engine,
1803 # goofy controls dbus on these DUTs.
1804 if not self._is_factory_image():
1805 self.run('update_engine_client --status')
Scott Zawalskifbca4a92013-03-04 15:56:42 -05001806 # Makes sure python is present, loads and can use built in functions.
1807 # We have seen cases where importing cPickle fails with undefined
1808 # symbols in cPickle.so.
1809 self.run('python -c "import cPickle"')
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07001810
Dan Shi549fb822015-03-24 18:01:11 -07001811 self.verify_cros_version_label()
1812
Darren Krahn495b0982015-09-21 19:12:51 -07001813 self.verify_tpm_status()
1814
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07001815
Dan Shi49ca0932014-11-14 11:22:27 -08001816 def verify_hardware(self):
1817 """Verify hardware system of a Chrome OS system.
1818
1819 Check following hardware conditions:
1820 1. Battery level.
1821 2. Is power adapter connected.
1822 """
1823 logging.info('Battery percentage: %s', self.get_battery_percentage())
Dan Shie9b765d2014-12-29 16:59:49 -08001824 if self.is_ac_connected() is None:
1825 logging.info('Can not determine if the device has power adapter '
1826 'connected.')
1827 else:
1828 logging.info('Device %s power adapter connected and charging.',
1829 'has' if self.is_ac_connected() else 'does not have')
Dan Shi49ca0932014-11-14 11:22:27 -08001830
1831
Fang Deng96667ca2013-08-01 17:46:18 -07001832 def make_ssh_command(self, user='root', port=22, opts='', hosts_file=None,
1833 connect_timeout=None, alive_interval=None):
1834 """Override default make_ssh_command to use options tuned for Chrome OS.
1835
1836 Tuning changes:
1837 - ConnectTimeout=30; maximum of 30 seconds allowed for an SSH
1838 connection failure. Consistency with remote_access.sh.
1839
Samuel Tan2ce155b2015-06-23 18:24:38 -07001840 - ServerAliveInterval=900; which causes SSH to ping connection every
1841 900 seconds. In conjunction with ServerAliveCountMax ensures
1842 that if the connection dies, Autotest will bail out.
Fang Deng96667ca2013-08-01 17:46:18 -07001843 Originally tried 60 secs, but saw frequent job ABORTS where
Samuel Tan2ce155b2015-06-23 18:24:38 -07001844 the test completed successfully. Later increased from 180 seconds to
1845 900 seconds to account for tests where the DUT is suspended for
1846 longer periods of time.
Fang Deng96667ca2013-08-01 17:46:18 -07001847
1848 - ServerAliveCountMax=3; consistency with remote_access.sh.
1849
1850 - ConnectAttempts=4; reduce flakiness in connection errors;
1851 consistency with remote_access.sh.
1852
1853 - UserKnownHostsFile=/dev/null; we don't care about the keys.
1854 Host keys change with every new installation, don't waste
1855 memory/space saving them.
1856
1857 - SSH protocol forced to 2; needed for ServerAliveInterval.
1858
1859 @param user User name to use for the ssh connection.
1860 @param port Port on the target host to use for ssh connection.
1861 @param opts Additional options to the ssh command.
1862 @param hosts_file Ignored.
1863 @param connect_timeout Ignored.
1864 @param alive_interval Ignored.
1865 """
Aviv Keshetc5947fa2013-09-04 14:06:29 -07001866 base_command = ('/usr/bin/ssh -a -x %s %s %s'
1867 ' -o StrictHostKeyChecking=no'
Fang Deng96667ca2013-08-01 17:46:18 -07001868 ' -o UserKnownHostsFile=/dev/null -o BatchMode=yes'
Samuel Tan2ce155b2015-06-23 18:24:38 -07001869 ' -o ConnectTimeout=30 -o ServerAliveInterval=900'
Fang Deng96667ca2013-08-01 17:46:18 -07001870 ' -o ServerAliveCountMax=3 -o ConnectionAttempts=4'
1871 ' -o Protocol=2 -l %s -p %d')
Aviv Keshetc5947fa2013-09-04 14:06:29 -07001872 return base_command % (self._ssh_verbosity_flag, self._ssh_options,
1873 opts, user, port)
Fang Deng96667ca2013-08-01 17:46:18 -07001874
1875
Christopher Wileydd181852013-10-10 19:56:58 -07001876 def _setup_rpc(self, port, command_name, remote_pid=None):
beeps32a63082013-08-22 14:02:29 -07001877 """Sets up a tunnel process and performs rpc connection book keeping.
1878
Cheng-Yi Chianga155e7e2015-08-20 20:42:04 +08001879 Chrome OS on the target closes down most external ports for security.
1880 We could open the port, but doing that would conflict with security
1881 tests that check that only expected ports are open. So, to get to
1882 the port on the target we use an ssh tunnel.
1883
beeps32a63082013-08-22 14:02:29 -07001884 This method assumes that xmlrpc and jsonrpc never conflict, since
1885 we can only either have an xmlrpc or a jsonrpc server listening on
1886 a remote port. As such, it enforces a single proxy->remote port
1887 policy, i.e if one starts a jsonrpc proxy/server from port A->B,
1888 and then tries to start an xmlrpc proxy forwarded to the same port,
1889 the xmlrpc proxy will override the jsonrpc tunnel process, however:
1890
1891 1. None of the methods on the xmlrpc proxy will work because
1892 the server listening on B is jsonrpc.
1893
1894 2. The xmlrpc client cannot initiate a termination of the JsonRPC
1895 server, as the only use case currently is goofy, which is tied to
1896 the factory image. It is much easier to handle a failed xmlrpc
1897 call on the client than it is to terminate goofy in this scenario,
1898 as doing the latter might leave the DUT in a hard to recover state.
1899
1900 With the current implementation newer rpc proxy connections will
1901 terminate the tunnel processes of older rpc connections tunneling
1902 to the same remote port. If methods are invoked on the client
1903 after this has happened they will fail with connection closed errors.
1904
1905 @param port: The remote forwarding port.
1906 @param command_name: The name of the remote process, to terminate
1907 using pkill.
1908
1909 @return A url that we can use to initiate the rpc connection.
1910 """
1911 self.rpc_disconnect(port)
1912 local_port = utils.get_unused_port()
1913 tunnel_proc = self._create_ssh_tunnel(port, local_port)
Christopher Wileydd181852013-10-10 19:56:58 -07001914 self._rpc_proxy_map[port] = (command_name, tunnel_proc, remote_pid)
beeps32a63082013-08-22 14:02:29 -07001915 return self._RPC_PROXY_URL % local_port
1916
1917
Christopher Wileyd78249a2013-03-01 13:05:31 -08001918 def xmlrpc_connect(self, command, port, command_name=None,
Yusuf Mohsinallyfff89d62013-11-18 16:34:07 -08001919 ready_test_name=None, timeout_seconds=10,
1920 logfile='/dev/null'):
J. Richard Barnette1d78b012012-05-15 13:56:30 -07001921 """Connect to an XMLRPC server on the host.
1922
1923 The `command` argument should be a simple shell command that
1924 starts an XMLRPC server on the given `port`. The command
1925 must not daemonize, and must terminate cleanly on SIGTERM.
1926 The command is started in the background on the host, and a
1927 local XMLRPC client for the server is created and returned
1928 to the caller.
1929
1930 Note that the process of creating an XMLRPC client makes no
1931 attempt to connect to the remote server; the caller is
1932 responsible for determining whether the server is running
1933 correctly, and is ready to serve requests.
1934
Christopher Wileyd78249a2013-03-01 13:05:31 -08001935 Optionally, the caller can pass ready_test_name, a string
1936 containing the name of a method to call on the proxy. This
1937 method should take no parameters and return successfully only
1938 when the server is ready to process client requests. When
1939 ready_test_name is set, xmlrpc_connect will block until the
1940 proxy is ready, and throw a TestError if the server isn't
1941 ready by timeout_seconds.
1942
beeps32a63082013-08-22 14:02:29 -07001943 If a server is already running on the remote port, this
1944 method will kill it and disconnect the tunnel process
1945 associated with the connection before establishing a new one,
1946 by consulting the rpc_proxy_map in rpc_disconnect.
1947
J. Richard Barnette1d78b012012-05-15 13:56:30 -07001948 @param command Shell command to start the server.
1949 @param port Port number on which the server is expected to
1950 be serving.
J. Richard Barnette7214e0b2013-02-06 15:20:49 -08001951 @param command_name String to use as input to `pkill` to
1952 terminate the XMLRPC server on the host.
Christopher Wileyd78249a2013-03-01 13:05:31 -08001953 @param ready_test_name String containing the name of a
1954 method defined on the XMLRPC server.
1955 @param timeout_seconds Number of seconds to wait
1956 for the server to become 'ready.' Will throw a
1957 TestFail error if server is not ready in time.
Yusuf Mohsinallyfff89d62013-11-18 16:34:07 -08001958 @param logfile Logfile to send output when running
1959 'command' argument.
Yusuf Mohsinally8d19e3c2013-11-21 14:25:45 -08001960
J. Richard Barnette1d78b012012-05-15 13:56:30 -07001961 """
Christopher Wileyc14f06a2013-10-16 13:55:39 -07001962 # Clean up any existing state. If the caller is willing
1963 # to believe their server is down, we ought to clean up
1964 # any tunnels we might have sitting around.
1965 self.rpc_disconnect(port)
J. Richard Barnette1d78b012012-05-15 13:56:30 -07001966 # Start the server on the host. Redirection in the command
1967 # below is necessary, because 'ssh' won't terminate until
1968 # background child processes close stdin, stdout, and
1969 # stderr.
J. Richard Barnette9af19632015-09-25 12:18:03 -07001970 remote_cmd = '%s >%s 2>&1' % (command, logfile)
1971 remote_pid = self.run_background(remote_cmd)
J. Richard Barnette1d78b012012-05-15 13:56:30 -07001972 logging.debug('Started XMLRPC server on host %s, pid = %s',
1973 self.hostname, remote_pid)
1974
Christopher Wileydd181852013-10-10 19:56:58 -07001975 # Tunnel through SSH to be able to reach that remote port.
1976 rpc_url = self._setup_rpc(port, command_name, remote_pid=remote_pid)
Christopher Wileyd78249a2013-03-01 13:05:31 -08001977 proxy = xmlrpclib.ServerProxy(rpc_url, allow_none=True)
Christopher Wileydd181852013-10-10 19:56:58 -07001978
Christopher Wileyd78249a2013-03-01 13:05:31 -08001979 if ready_test_name is not None:
J. Richard Barnette13eb7c02013-03-07 12:06:29 -08001980 # retry.retry logs each attempt; calculate delay_sec to
1981 # keep log spam to a dull roar.
Christopher Wiley0ed712b2013-04-09 15:25:12 -07001982 @retry.retry((socket.error,
1983 xmlrpclib.ProtocolError,
1984 httplib.BadStatusLine),
Chris Sosa65425082013-10-16 13:26:22 -07001985 timeout_min=timeout_seconds / 60.0,
1986 delay_sec=min(max(timeout_seconds / 20.0, 0.1), 1))
Christopher Wileyd78249a2013-03-01 13:05:31 -08001987 def ready_test():
1988 """ Call proxy.ready_test_name(). """
1989 getattr(proxy, ready_test_name)()
1990 successful = False
1991 try:
1992 logging.info('Waiting %d seconds for XMLRPC server '
1993 'to start.', timeout_seconds)
1994 ready_test()
1995 successful = True
Christopher Wileyd78249a2013-03-01 13:05:31 -08001996 finally:
1997 if not successful:
1998 logging.error('Failed to start XMLRPC server.')
beeps32a63082013-08-22 14:02:29 -07001999 self.rpc_disconnect(port)
Christopher Wileyd78249a2013-03-01 13:05:31 -08002000 logging.info('XMLRPC server started successfully.')
2001 return proxy
J. Richard Barnette1d78b012012-05-15 13:56:30 -07002002
J. Richard Barnette1d78b012012-05-15 13:56:30 -07002003
Jason Abeleb6f924f2013-11-13 16:01:54 -08002004 def syslog(self, message, tag='autotest'):
2005 """Logs a message to syslog on host.
2006
2007 @param message String message to log into syslog
2008 @param tag String tag prefix for syslog
2009
2010 """
2011 self.run('logger -t "%s" "%s"' % (tag, message))
2012
2013
beeps32a63082013-08-22 14:02:29 -07002014 def jsonrpc_connect(self, port):
2015 """Creates a jsonrpc proxy connection through an ssh tunnel.
2016
2017 This method exists to facilitate communication with goofy (which is
2018 the default system manager on all factory images) and as such, leaves
2019 most of the rpc server sanity checking to the caller. Unlike
2020 xmlrpc_connect, this method does not facilitate the creation of a remote
2021 jsonrpc server, as the only clients of this code are factory tests,
2022 for which the goofy system manager is built in to the image and starts
2023 when the target boots.
2024
2025 One can theoretically create multiple jsonrpc proxies all forwarded
2026 to the same remote port, provided the remote port has an rpc server
2027 listening. However, in doing so we stand the risk of leaking an
2028 existing tunnel process, so we always disconnect any older tunnels
2029 we might have through rpc_disconnect.
2030
2031 @param port: port on the remote host that is serving this proxy.
2032
2033 @return: The client proxy.
2034 """
2035 if not jsonrpclib:
2036 logging.warning('Jsonrpclib could not be imported. Check that '
2037 'site-packages contains jsonrpclib.')
2038 return None
2039
2040 proxy = jsonrpclib.jsonrpc.ServerProxy(self._setup_rpc(port, None))
2041
2042 logging.info('Established a jsonrpc connection through port %s.', port)
2043 return proxy
2044
2045
2046 def rpc_disconnect(self, port):
2047 """Disconnect from an RPC server on the host.
2048
2049 Terminates the remote RPC server previously started for
J. Richard Barnette1d78b012012-05-15 13:56:30 -07002050 the given `port`. Also closes the local ssh tunnel created
2051 for the connection to the host. This function does not
beeps32a63082013-08-22 14:02:29 -07002052 directly alter the state of a previously returned RPC
J. Richard Barnette1d78b012012-05-15 13:56:30 -07002053 client object; however disconnection will cause all
2054 subsequent calls to methods on the object to fail.
2055
2056 This function does nothing if requested to disconnect a port
beeps32a63082013-08-22 14:02:29 -07002057 that was not previously connected via _setup_rpc.
J. Richard Barnette1d78b012012-05-15 13:56:30 -07002058
2059 @param port Port number passed to a previous call to
beeps32a63082013-08-22 14:02:29 -07002060 `_setup_rpc()`.
J. Richard Barnette1d78b012012-05-15 13:56:30 -07002061 """
beeps32a63082013-08-22 14:02:29 -07002062 if port not in self._rpc_proxy_map:
J. Richard Barnette1d78b012012-05-15 13:56:30 -07002063 return
Christopher Wileydd181852013-10-10 19:56:58 -07002064 remote_name, tunnel_proc, remote_pid = self._rpc_proxy_map[port]
J. Richard Barnette1d78b012012-05-15 13:56:30 -07002065 if remote_name:
2066 # We use 'pkill' to find our target process rather than
2067 # a PID, because the host may have rebooted since
2068 # connecting, and we don't want to kill an innocent
2069 # process with the same PID.
2070 #
2071 # 'pkill' helpfully exits with status 1 if no target
2072 # process is found, for which run() will throw an
Simran Basid5e5e272012-09-24 15:23:59 -07002073 # exception. We don't want that, so we the ignore
J. Richard Barnette1d78b012012-05-15 13:56:30 -07002074 # status.
2075 self.run("pkill -f '%s'" % remote_name, ignore_status=True)
Christopher Wileydd181852013-10-10 19:56:58 -07002076 if remote_pid:
2077 logging.info('Waiting for RPC server "%s" shutdown',
2078 remote_name)
2079 start_time = time.time()
2080 while (time.time() - start_time <
2081 self._RPC_SHUTDOWN_TIMEOUT_SECONDS):
2082 running_processes = self.run(
2083 "pgrep -f '%s'" % remote_name,
2084 ignore_status=True).stdout.split()
2085 if not remote_pid in running_processes:
2086 logging.info('Shut down RPC server.')
2087 break
2088 time.sleep(self._RPC_SHUTDOWN_POLLING_PERIOD_SECONDS)
2089 else:
2090 raise error.TestError('Failed to shutdown RPC server %s' %
2091 remote_name)
J. Richard Barnette1d78b012012-05-15 13:56:30 -07002092
2093 if tunnel_proc.poll() is None:
2094 tunnel_proc.terminate()
2095 logging.debug('Terminated tunnel, pid %d', tunnel_proc.pid)
2096 else:
2097 logging.debug('Tunnel pid %d terminated early, status %d',
2098 tunnel_proc.pid, tunnel_proc.returncode)
beeps32a63082013-08-22 14:02:29 -07002099 del self._rpc_proxy_map[port]
J. Richard Barnette1d78b012012-05-15 13:56:30 -07002100
2101
beeps32a63082013-08-22 14:02:29 -07002102 def rpc_disconnect_all(self):
2103 """Disconnect all known RPC proxy ports."""
2104 for port in self._rpc_proxy_map.keys():
2105 self.rpc_disconnect(port)
J. Richard Barnette1d78b012012-05-15 13:56:30 -07002106
2107
Ilja H. Friedel1232e8a2014-06-17 21:30:48 -07002108 def poor_mans_rpc(self, fun):
2109 """
2110 Calls a function from client utils on the host and returns a string.
2111
2112 @param fun function in client utils namespace.
2113 @return output string from calling fun.
2114 """
Simran Basi263a9d32014-08-19 11:16:51 -07002115 script = 'cd %s/bin; ' % autotest.Autotest.get_installed_autodir(self)
Ilja H. Friedel1232e8a2014-06-17 21:30:48 -07002116 script += 'python -c "import common; import utils;'
2117 script += 'print utils.%s"' % fun
2118 return script
2119
2120
J. Richard Barnetteb6de7e32013-02-14 13:28:04 -08002121 def _ping_check_status(self, status):
2122 """Ping the host once, and return whether it has a given status.
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002123
J. Richard Barnetteb6de7e32013-02-14 13:28:04 -08002124 @param status Check the ping status against this value.
2125 @return True iff `status` and the result of ping are the same
2126 (i.e. both True or both False).
2127
2128 """
2129 ping_val = utils.ping(self.hostname, tries=1, deadline=1)
2130 return not (status ^ (ping_val == 0))
2131
2132 def _ping_wait_for_status(self, status, timeout):
2133 """Wait for the host to have a given status (UP or DOWN).
2134
2135 Status is checked by polling. Polling will not last longer
2136 than the number of seconds in `timeout`. The polling
2137 interval will be long enough that only approximately
2138 _PING_WAIT_COUNT polling cycles will be executed, subject
2139 to a maximum interval of about one minute.
2140
2141 @param status Waiting will stop immediately if `ping` of the
2142 host returns this status.
2143 @param timeout Poll for at most this many seconds.
2144 @return True iff the host status from `ping` matched the
2145 requested status at the time of return.
2146
2147 """
2148 # _ping_check_status() takes about 1 second, hence the
2149 # "- 1" in the formula below.
2150 poll_interval = min(int(timeout / self._PING_WAIT_COUNT), 60) - 1
2151 end_time = time.time() + timeout
2152 while time.time() <= end_time:
2153 if self._ping_check_status(status):
2154 return True
2155 if poll_interval > 0:
2156 time.sleep(poll_interval)
2157
2158 # The last thing we did was sleep(poll_interval), so it may
2159 # have been too long since the last `ping`. Check one more
2160 # time, just to be sure.
2161 return self._ping_check_status(status)
2162
2163 def ping_wait_up(self, timeout):
2164 """Wait for the host to respond to `ping`.
2165
2166 N.B. This method is not a reliable substitute for
2167 `wait_up()`, because a host that responds to ping will not
2168 necessarily respond to ssh. This method should only be used
2169 if the target DUT can be considered functional even if it
2170 can't be reached via ssh.
2171
2172 @param timeout Minimum time to allow before declaring the
2173 host to be non-responsive.
2174 @return True iff the host answered to ping before the timeout.
2175
2176 """
2177 return self._ping_wait_for_status(self._PING_STATUS_UP, timeout)
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002178
Andrew Bresticker678c0c72013-01-22 10:44:09 -08002179 def ping_wait_down(self, timeout):
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002180 """Wait until the host no longer responds to `ping`.
2181
J. Richard Barnetteb6de7e32013-02-14 13:28:04 -08002182 This function can be used as a slightly faster version of
2183 `wait_down()`, by avoiding potentially long ssh timeouts.
2184
2185 @param timeout Minimum time to allow for the host to become
2186 non-responsive.
2187 @return True iff the host quit answering ping before the
2188 timeout.
2189
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002190 """
J. Richard Barnetteb6de7e32013-02-14 13:28:04 -08002191 return self._ping_wait_for_status(self._PING_STATUS_DOWN, timeout)
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002192
Tom Wai-Hong Tamfced4f62014-04-17 10:56:30 +08002193 def test_wait_for_sleep(self, sleep_timeout=None):
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002194 """Wait for the client to enter low-power sleep mode.
2195
2196 The test for "is asleep" can't distinguish a system that is
2197 powered off; to confirm that the unit was asleep, it is
2198 necessary to force resume, and then call
2199 `test_wait_for_resume()`.
2200
2201 This function is expected to be called from a test as part
2202 of a sequence like the following:
2203
2204 ~~~~~~~~
2205 boot_id = host.get_boot_id()
2206 # trigger sleep on the host
2207 host.test_wait_for_sleep()
2208 # trigger resume on the host
2209 host.test_wait_for_resume(boot_id)
2210 ~~~~~~~~
2211
Tom Wai-Hong Tamfced4f62014-04-17 10:56:30 +08002212 @param sleep_timeout time limit in seconds to allow the host sleep.
2213
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002214 @exception TestFail The host did not go to sleep within
2215 the allowed time.
2216 """
Tom Wai-Hong Tamfced4f62014-04-17 10:56:30 +08002217 if sleep_timeout is None:
2218 sleep_timeout = self.SLEEP_TIMEOUT
2219
2220 if not self.ping_wait_down(timeout=sleep_timeout):
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002221 raise error.TestFail(
Tom Wai-Hong Tamfced4f62014-04-17 10:56:30 +08002222 'client failed to sleep after %d seconds' % sleep_timeout)
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002223
2224
Tom Wai-Hong Tamfced4f62014-04-17 10:56:30 +08002225 def test_wait_for_resume(self, old_boot_id, resume_timeout=None):
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002226 """Wait for the client to resume from low-power sleep mode.
2227
2228 The `old_boot_id` parameter should be the value from
2229 `get_boot_id()` obtained prior to entering sleep mode. A
2230 `TestFail` exception is raised if the boot id changes.
2231
2232 See @ref test_wait_for_sleep for more on this function's
2233 usage.
2234
J. Richard Barnette7214e0b2013-02-06 15:20:49 -08002235 @param old_boot_id A boot id value obtained before the
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002236 target host went to sleep.
Tom Wai-Hong Tamfced4f62014-04-17 10:56:30 +08002237 @param resume_timeout time limit in seconds to allow the host up.
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002238
2239 @exception TestFail The host did not respond within the
2240 allowed time.
2241 @exception TestFail The host responded, but the boot id test
2242 indicated a reboot rather than a sleep
2243 cycle.
2244 """
Tom Wai-Hong Tamfced4f62014-04-17 10:56:30 +08002245 if resume_timeout is None:
2246 resume_timeout = self.RESUME_TIMEOUT
2247
2248 if not self.wait_up(timeout=resume_timeout):
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002249 raise error.TestFail(
2250 'client failed to resume from sleep after %d seconds' %
Tom Wai-Hong Tamfced4f62014-04-17 10:56:30 +08002251 resume_timeout)
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002252 else:
2253 new_boot_id = self.get_boot_id()
2254 if new_boot_id != old_boot_id:
Tom Wai-Hong Tam01792682015-01-06 08:00:46 +08002255 logging.error('client rebooted (old boot %s, new boot %s)',
2256 old_boot_id, new_boot_id)
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002257 raise error.TestFail(
Tom Wai-Hong Tam01792682015-01-06 08:00:46 +08002258 'client rebooted, but sleep was expected')
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002259
2260
Tom Wai-Hong Tamfe005c22014-12-03 09:25:44 +08002261 def test_wait_for_shutdown(self, shutdown_timeout=None):
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002262 """Wait for the client to shut down.
2263
2264 The test for "has shut down" can't distinguish a system that
2265 is merely asleep; to confirm that the unit was down, it is
2266 necessary to force boot, and then call test_wait_for_boot().
2267
2268 This function is expected to be called from a test as part
2269 of a sequence like the following:
2270
2271 ~~~~~~~~
2272 boot_id = host.get_boot_id()
2273 # trigger shutdown on the host
2274 host.test_wait_for_shutdown()
2275 # trigger boot on the host
2276 host.test_wait_for_boot(boot_id)
2277 ~~~~~~~~
2278
Tom Wai-Hong Tamfe005c22014-12-03 09:25:44 +08002279 @param shutdown_timeout time limit in seconds to allow the host down.
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002280 @exception TestFail The host did not shut down within the
2281 allowed time.
2282 """
Tom Wai-Hong Tamfe005c22014-12-03 09:25:44 +08002283 if shutdown_timeout is None:
2284 shutdown_timeout = self.SHUTDOWN_TIMEOUT
2285
2286 if not self.ping_wait_down(timeout=shutdown_timeout):
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002287 raise error.TestFail(
2288 'client failed to shut down after %d seconds' %
Tom Wai-Hong Tamfe005c22014-12-03 09:25:44 +08002289 shutdown_timeout)
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002290
2291
2292 def test_wait_for_boot(self, old_boot_id=None):
2293 """Wait for the client to boot from cold power.
2294
2295 The `old_boot_id` parameter should be the value from
2296 `get_boot_id()` obtained prior to shutting down. A
2297 `TestFail` exception is raised if the boot id does not
2298 change. The boot id test is omitted if `old_boot_id` is not
2299 specified.
2300
2301 See @ref test_wait_for_shutdown for more on this function's
2302 usage.
2303
J. Richard Barnette7214e0b2013-02-06 15:20:49 -08002304 @param old_boot_id A boot id value obtained before the
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002305 shut down.
2306
2307 @exception TestFail The host did not respond within the
2308 allowed time.
2309 @exception TestFail The host responded, but the boot id test
2310 indicated that there was no reboot.
2311 """
J. Richard Barnetteeb69d722012-06-18 17:29:44 -07002312 if not self.wait_up(timeout=self.REBOOT_TIMEOUT):
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002313 raise error.TestFail(
2314 'client failed to reboot after %d seconds' %
J. Richard Barnetteeb69d722012-06-18 17:29:44 -07002315 self.REBOOT_TIMEOUT)
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002316 elif old_boot_id:
2317 if self.get_boot_id() == old_boot_id:
Tom Wai-Hong Tam01792682015-01-06 08:00:46 +08002318 logging.error('client not rebooted (boot %s)',
2319 old_boot_id)
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002320 raise error.TestFail(
Tom Wai-Hong Tam01792682015-01-06 08:00:46 +08002321 'client is back up, but did not reboot')
Simran Basid5e5e272012-09-24 15:23:59 -07002322
2323
2324 @staticmethod
2325 def check_for_rpm_support(hostname):
2326 """For a given hostname, return whether or not it is powered by an RPM.
2327
Simran Basi1df55112013-09-06 11:25:09 -07002328 @param hostname: hostname to check for rpm support.
2329
Simran Basid5e5e272012-09-24 15:23:59 -07002330 @return None if this host does not follows the defined naming format
2331 for RPM powered DUT's in the lab. If it does follow the format,
2332 it returns a regular expression MatchObject instead.
2333 """
Fang Dengbaff9082015-01-06 13:46:15 -08002334 return re.match(CrosHost._RPM_HOSTNAME_REGEX, hostname)
Simran Basid5e5e272012-09-24 15:23:59 -07002335
2336
2337 def has_power(self):
2338 """For this host, return whether or not it is powered by an RPM.
2339
2340 @return True if this host is in the CROS lab and follows the defined
2341 naming format.
2342 """
Fang Deng0ca40e22013-08-27 17:47:44 -07002343 return CrosHost.check_for_rpm_support(self.hostname)
Simran Basid5e5e272012-09-24 15:23:59 -07002344
2345
Ismail Noorbasha07fdb612013-02-14 14:13:31 -08002346 def _set_power(self, state, power_method):
2347 """Sets the power to the host via RPM, Servo or manual.
2348
2349 @param state Specifies which power state to set to DUT
2350 @param power_method Specifies which method of power control to
2351 use. By default "RPM" will be used. Valid values
2352 are the strings "RPM", "manual", "servoj10".
2353
2354 """
2355 ACCEPTABLE_STATES = ['ON', 'OFF']
2356
2357 if state.upper() not in ACCEPTABLE_STATES:
2358 raise error.TestError('State must be one of: %s.'
2359 % (ACCEPTABLE_STATES,))
2360
2361 if power_method == self.POWER_CONTROL_SERVO:
2362 logging.info('Setting servo port J10 to %s', state)
2363 self.servo.set('prtctl3_pwren', state.lower())
2364 time.sleep(self._USB_POWER_TIMEOUT)
2365 elif power_method == self.POWER_CONTROL_MANUAL:
2366 logging.info('You have %d seconds to set the AC power to %s.',
2367 self._POWER_CYCLE_TIMEOUT, state)
2368 time.sleep(self._POWER_CYCLE_TIMEOUT)
2369 else:
2370 if not self.has_power():
2371 raise error.TestFail('DUT does not have RPM connected.')
Simran Basi5e6339a2013-03-21 11:34:32 -07002372 afe = frontend_wrappers.RetryingAFE(timeout_min=5, delay_sec=10)
2373 afe.set_host_attribute(self._RPM_OUTLET_CHANGED, True,
2374 hostname=self.hostname)
Simran Basi1df55112013-09-06 11:25:09 -07002375 rpm_client.set_power(self.hostname, state.upper(), timeout_mins=5)
Simran Basid5e5e272012-09-24 15:23:59 -07002376
2377
Ismail Noorbasha07fdb612013-02-14 14:13:31 -08002378 def power_off(self, power_method=POWER_CONTROL_RPM):
2379 """Turn off power to this host via RPM, Servo or manual.
2380
2381 @param power_method Specifies which method of power control to
2382 use. By default "RPM" will be used. Valid values
2383 are the strings "RPM", "manual", "servoj10".
2384
2385 """
2386 self._set_power('OFF', power_method)
Simran Basid5e5e272012-09-24 15:23:59 -07002387
2388
Ismail Noorbasha07fdb612013-02-14 14:13:31 -08002389 def power_on(self, power_method=POWER_CONTROL_RPM):
2390 """Turn on power to this host via RPM, Servo or manual.
2391
2392 @param power_method Specifies which method of power control to
2393 use. By default "RPM" will be used. Valid values
2394 are the strings "RPM", "manual", "servoj10".
2395
2396 """
2397 self._set_power('ON', power_method)
2398
2399
2400 def power_cycle(self, power_method=POWER_CONTROL_RPM):
2401 """Cycle power to this host by turning it OFF, then ON.
2402
2403 @param power_method Specifies which method of power control to
2404 use. By default "RPM" will be used. Valid values
2405 are the strings "RPM", "manual", "servoj10".
2406
2407 """
2408 if power_method in (self.POWER_CONTROL_SERVO,
2409 self.POWER_CONTROL_MANUAL):
2410 self.power_off(power_method=power_method)
2411 time.sleep(self._POWER_CYCLE_TIMEOUT)
2412 self.power_on(power_method=power_method)
2413 else:
2414 rpm_client.set_power(self.hostname, 'CYCLE')
Simran Basic6f1f7a2012-10-16 10:47:46 -07002415
2416
2417 def get_platform(self):
2418 """Determine the correct platform label for this host.
2419
2420 @returns a string representing this host's platform.
2421 """
2422 crossystem = utils.Crossystem(self)
2423 crossystem.init()
2424 # Extract fwid value and use the leading part as the platform id.
2425 # fwid generally follow the format of {platform}.{firmware version}
2426 # Example: Alex.X.YYY.Z or Google_Alex.X.YYY.Z
2427 platform = crossystem.fwid().split('.')[0].lower()
2428 # Newer platforms start with 'Google_' while the older ones do not.
2429 return platform.replace('google_', '')
2430
2431
Hung-ying Tyanb1328032014-04-01 14:18:54 +08002432 def get_architecture(self):
2433 """Determine the correct architecture label for this host.
2434
2435 @returns a string representing this host's architecture.
2436 """
2437 crossystem = utils.Crossystem(self)
2438 crossystem.init()
2439 return crossystem.arch()
2440
2441
Luis Lozano40b7d0d2014-01-17 15:12:06 -08002442 def get_chrome_version(self):
2443 """Gets the Chrome version number and milestone as strings.
2444
2445 Invokes "chrome --version" to get the version number and milestone.
2446
2447 @return A tuple (chrome_ver, milestone) where "chrome_ver" is the
2448 current Chrome version number as a string (in the form "W.X.Y.Z")
2449 and "milestone" is the first component of the version number
2450 (the "W" from "W.X.Y.Z"). If the version number cannot be parsed
2451 in the "W.X.Y.Z" format, the "chrome_ver" will be the full output
2452 of "chrome --version" and the milestone will be the empty string.
2453
2454 """
MK Ryu35d661e2014-09-25 17:44:10 -07002455 version_string = self.run(client_constants.CHROME_VERSION_COMMAND).stdout
Luis Lozano40b7d0d2014-01-17 15:12:06 -08002456 return utils.parse_chrome_version(version_string)
2457
Aviv Keshet74c89a92013-02-04 15:18:30 -08002458 @label_decorator()
Simran Basic6f1f7a2012-10-16 10:47:46 -07002459 def get_board(self):
2460 """Determine the correct board label for this host.
2461
2462 @returns a string representing this host's board.
2463 """
2464 release_info = utils.parse_cmd_output('cat /etc/lsb-release',
2465 run_method=self.run)
2466 board = release_info['CHROMEOS_RELEASE_BOARD']
2467 # Devices in the lab generally have the correct board name but our own
2468 # development devices have {board_name}-signed-{key_type}. The board
2469 # name may also begin with 'x86-' which we need to keep.
Simran Basi833814b2013-01-29 13:13:43 -08002470 board_format_string = ds_constants.BOARD_PREFIX + '%s'
Simran Basic6f1f7a2012-10-16 10:47:46 -07002471 if 'x86' not in board:
Simran Basi833814b2013-01-29 13:13:43 -08002472 return board_format_string % board.split('-')[0]
2473 return board_format_string % '-'.join(board.split('-')[0:2])
Simran Basic6f1f7a2012-10-16 10:47:46 -07002474
2475
Ilja H. Friedel1232e8a2014-06-17 21:30:48 -07002476 @label_decorator('board_freq_mem')
2477 def get_board_with_frequency_and_memory(self):
2478 """
2479 Determines the board name with frequency and memory.
2480
2481 @returns a more detailed string representing the board. Examples are
2482 butterfly_1.1GHz_2GB, link_1.8GHz_4GB, x86-zgb_1.7GHz_2GB
2483 """
2484 board = self.run(self.poor_mans_rpc(
2485 'get_board_with_frequency_and_memory()')).stdout
2486 return 'board_freq_mem:%s' % str.strip(board)
2487
2488
Aviv Keshet74c89a92013-02-04 15:18:30 -08002489 @label_decorator('lightsensor')
Simran Basic6f1f7a2012-10-16 10:47:46 -07002490 def has_lightsensor(self):
2491 """Determine the correct board label for this host.
2492
2493 @returns the string 'lightsensor' if this host has a lightsensor or
2494 None if it does not.
2495 """
2496 search_cmd = "find -L %s -maxdepth 4 | egrep '%s'" % (
Richard Barnette82c35912012-11-20 10:09:10 -08002497 self._LIGHTSENSOR_SEARCH_DIR, '|'.join(self._LIGHTSENSOR_FILES))
Simran Basic6f1f7a2012-10-16 10:47:46 -07002498 try:
2499 # Run the search cmd following the symlinks. Stderr_tee is set to
2500 # None as there can be a symlink loop, but the command will still
2501 # execute correctly with a few messages printed to stderr.
2502 self.run(search_cmd, stdout_tee=None, stderr_tee=None)
2503 return 'lightsensor'
2504 except error.AutoservRunError:
2505 # egrep exited with a return code of 1 meaning none of the possible
2506 # lightsensor files existed.
2507 return None
2508
2509
Aviv Keshet74c89a92013-02-04 15:18:30 -08002510 @label_decorator('bluetooth')
Simran Basic6f1f7a2012-10-16 10:47:46 -07002511 def has_bluetooth(self):
2512 """Determine the correct board label for this host.
2513
2514 @returns the string 'bluetooth' if this host has bluetooth or
2515 None if it does not.
2516 """
2517 try:
2518 self.run('test -d /sys/class/bluetooth/hci0')
2519 # test exited with a return code of 0.
2520 return 'bluetooth'
2521 except error.AutoservRunError:
2522 # test exited with a return code 1 meaning the directory did not
2523 # exist.
2524 return None
2525
2526
Ilja H. Friedel1232e8a2014-06-17 21:30:48 -07002527 @label_decorator('gpu_family')
2528 def get_gpu_family(self):
2529 """
2530 Determine GPU family.
2531
2532 @returns a string representing the gpu family. Examples are mali, tegra,
2533 pinetrail, sandybridge, ivybridge, haswell and baytrail.
2534 """
2535 gpu_family = self.run(self.poor_mans_rpc('get_gpu_family()')).stdout
2536 return 'gpu_family:%s' % str.strip(gpu_family)
2537
2538
Ilja Friedel0ce0b602013-08-15 18:45:27 -07002539 @label_decorator('graphics')
2540 def get_graphics(self):
2541 """
2542 Determine the correct board label for this host.
2543
2544 @returns a string representing this host's graphics. For now ARM boards
2545 return graphics:gles while all other boards return graphics:gl. This
2546 may change over time, but for robustness reasons this should avoid
2547 executing code in actual graphics libraries (which may not be ready and
2548 is tested by graphics_GLAPICheck).
2549 """
2550 uname = self.run('uname -a').stdout.lower()
2551 if 'arm' in uname:
2552 return 'graphics:gles'
2553 return 'graphics:gl'
2554
2555
Bill Richardson4f595f52014-02-13 16:20:26 -08002556 @label_decorator('ec')
2557 def get_ec(self):
2558 """
2559 Determine the type of EC on this host.
2560
2561 @returns a string representing this host's embedded controller type.
2562 At present, it only returns "ec:cros", for Chrome OS ECs. Other types
2563 of EC (or none) don't return any strings, since no tests depend on
2564 those.
2565 """
2566 cmd = 'mosys ec info'
2567 # The output should look like these, so that the last field should
2568 # match our EC version scheme:
2569 #
2570 # stm | stm32f100 | snow_v1.3.139-375eb9f
2571 # ti | Unknown-10de | peppy_v1.5.114-5d52788
2572 #
2573 # Non-Chrome OS ECs will look like these:
2574 #
2575 # ENE | KB932 | 00BE107A00
2576 # ite | it8518 | 3.08
2577 #
2578 # And some systems don't have ECs at all (Lumpy, for example).
2579 regexp = r'^.*\|\s*(\S+_v\d+\.\d+\.\d+-[0-9a-f]+)\s*$'
2580
2581 ecinfo = self.run(command=cmd, ignore_status=True)
2582 if ecinfo.exit_status == 0:
2583 res = re.search(regexp, ecinfo.stdout)
2584 if res:
2585 logging.info("EC version is %s", res.groups()[0])
2586 return 'ec:cros'
2587 logging.info("%s got: %s", cmd, ecinfo.stdout)
2588 # Has an EC, but it's not a Chrome OS EC
2589 return None
2590 logging.info("%s exited with status %d", cmd, ecinfo.exit_status)
2591 # No EC present
2592 return None
2593
2594
Alec Berg31b932b2014-04-04 16:09:11 -07002595 @label_decorator('accels')
2596 def get_accels(self):
2597 """
2598 Determine the type of accelerometers on this host.
2599
2600 @returns a string representing this host's accelerometer type.
2601 At present, it only returns "accel:cros-ec", for accelerometers
2602 attached to a Chrome OS EC, or none, if no accelerometers.
2603 """
2604 # Check to make sure we have ectool
2605 rv = self.run('which ectool', ignore_status=True)
2606 if rv.exit_status:
2607 logging.info("No ectool cmd found, assuming no EC accelerometers")
2608 return None
2609
2610 # Check that the EC supports the motionsense command
2611 rv = self.run('ectool motionsense', ignore_status=True)
2612 if rv.exit_status:
2613 logging.info("EC does not support motionsense command "
2614 "assuming no EC accelerometers")
2615 return None
2616
2617 # Check that EC motion sensors are active
2618 active = self.run('ectool motionsense active').stdout.split('\n')
2619 if active[0] == "0":
2620 logging.info("Motion sense inactive, assuming no EC accelerometers")
2621 return None
2622
2623 logging.info("EC accelerometers found")
2624 return 'accel:cros-ec'
2625
2626
Tom Wai-Hong Tam3d6790d2014-04-14 16:15:47 +08002627 @label_decorator('chameleon')
2628 def has_chameleon(self):
2629 """Determine if a Chameleon connected to this host.
2630
Tom Wai-Hong Tambadbb332014-10-10 02:59:41 +08002631 @returns a list containing two strings ('chameleon' and
2632 'chameleon:' + label, e.g. 'chameleon:hdmi') if this host
2633 has a Chameleon or None if it has not.
Tom Wai-Hong Tam3d6790d2014-04-14 16:15:47 +08002634 """
2635 if self._chameleon_host:
Tom Wai-Hong Tambadbb332014-10-10 02:59:41 +08002636 return ['chameleon', 'chameleon:' + self.chameleon.get_label()]
Tom Wai-Hong Tam3d6790d2014-04-14 16:15:47 +08002637 else:
2638 return None
2639
2640
Cheng-Yi Chiangf4104ff2014-12-23 19:39:01 +08002641 @label_decorator('audio_loopback_dongle')
2642 def has_loopback_dongle(self):
2643 """Determine if an audio loopback dongle is plugged to this host.
2644
2645 @returns 'audio_loopback_dongle' when there is an audio loopback dongle
2646 plugged to this host.
2647 None when there is no audio loopback dongle
2648 plugged to this host.
2649 """
Cheng-Yi Chiang8de78112015-05-27 14:47:08 +08002650 nodes_info = self.run(command=cras_utils.get_cras_nodes_cmd(),
2651 ignore_status=True).stdout
2652 if (cras_utils.node_type_is_plugged('HEADPHONE', nodes_info) and
2653 cras_utils.node_type_is_plugged('MIC', nodes_info)):
Cheng-Yi Chiangf4104ff2014-12-23 19:39:01 +08002654 return 'audio_loopback_dongle'
2655 else:
2656 return None
2657
2658
Derek Basehorec71ff622014-07-07 15:18:40 -07002659 @label_decorator('power_supply')
2660 def get_power_supply(self):
2661 """
2662 Determine what type of power supply the host has
2663
2664 @returns a string representing this host's power supply.
2665 'power:battery' when the device has a battery intended for
2666 extended use
2667 'power:AC_primary' when the device has a battery not intended
2668 for extended use (for moving the machine, etc)
2669 'power:AC_only' when the device has no battery at all.
2670 """
2671 psu = self.run(command='mosys psu type', ignore_status=True)
2672 if psu.exit_status:
2673 # The psu command for mosys is not included for all platforms. The
2674 # assumption is that the device will have a battery if the command
2675 # is not found.
2676 return 'power:battery'
2677
2678 psu_str = psu.stdout.strip()
2679 if psu_str == 'unknown':
2680 return None
2681
2682 return 'power:%s' % psu_str
2683
2684
Puthikorn Voravootivatfa011242014-03-14 18:45:11 -07002685 @label_decorator('storage')
2686 def get_storage(self):
2687 """
2688 Determine the type of boot device for this host.
2689
2690 Determine if the internal device is SCSI or dw_mmc device.
2691 Then check that it is SSD or HDD or eMMC or something else.
2692
2693 @returns a string representing this host's internal device type.
2694 'storage:ssd' when internal device is solid state drive
2695 'storage:hdd' when internal device is hard disk drive
2696 'storage:mmc' when internal device is mmc drive
2697 None When internal device is something else or
2698 when we are unable to determine the type
2699 """
2700 # The output should be /dev/mmcblk* for SD/eMMC or /dev/sd* for scsi
2701 rootdev_cmd = ' '.join(['. /usr/sbin/write_gpt.sh;',
2702 '. /usr/share/misc/chromeos-common.sh;',
2703 'load_base_vars;',
2704 'get_fixed_dst_drive'])
Puthikorn Voravootivat03c51682014-04-24 13:52:12 -07002705 rootdev = self.run(command=rootdev_cmd, ignore_status=True)
2706 if rootdev.exit_status:
2707 logging.info("Fail to run %s", rootdev_cmd)
2708 return None
Puthikorn Voravootivatfa011242014-03-14 18:45:11 -07002709 rootdev_str = rootdev.stdout.strip()
2710
2711 if not rootdev_str:
2712 return None
2713
2714 rootdev_base = os.path.basename(rootdev_str)
2715
2716 mmc_pattern = '/dev/mmcblk[0-9]'
2717 if re.match(mmc_pattern, rootdev_str):
2718 # Use type to determine if the internal device is eMMC or somthing
2719 # else. We can assume that MMC is always an internal device.
2720 type_cmd = 'cat /sys/block/%s/device/type' % rootdev_base
Puthikorn Voravootivat03c51682014-04-24 13:52:12 -07002721 type = self.run(command=type_cmd, ignore_status=True)
2722 if type.exit_status:
2723 logging.info("Fail to run %s", type_cmd)
2724 return None
Puthikorn Voravootivatfa011242014-03-14 18:45:11 -07002725 type_str = type.stdout.strip()
2726
2727 if type_str == 'MMC':
2728 return 'storage:mmc'
2729
2730 scsi_pattern = '/dev/sd[a-z]+'
2731 if re.match(scsi_pattern, rootdev.stdout):
2732 # Read symlink for /sys/block/sd* to determine if the internal
2733 # device is connected via ata or usb.
2734 link_cmd = 'readlink /sys/block/%s' % rootdev_base
Puthikorn Voravootivat03c51682014-04-24 13:52:12 -07002735 link = self.run(command=link_cmd, ignore_status=True)
2736 if link.exit_status:
2737 logging.info("Fail to run %s", link_cmd)
2738 return None
Puthikorn Voravootivatfa011242014-03-14 18:45:11 -07002739 link_str = link.stdout.strip()
2740 if 'usb' in link_str:
2741 return None
2742
2743 # Read rotation to determine if the internal device is ssd or hdd.
2744 rotate_cmd = str('cat /sys/block/%s/queue/rotational'
2745 % rootdev_base)
Puthikorn Voravootivat03c51682014-04-24 13:52:12 -07002746 rotate = self.run(command=rotate_cmd, ignore_status=True)
2747 if rotate.exit_status:
2748 logging.info("Fail to run %s", rotate_cmd)
2749 return None
Puthikorn Voravootivatfa011242014-03-14 18:45:11 -07002750 rotate_str = rotate.stdout.strip()
2751
2752 rotate_dict = {'0':'storage:ssd', '1':'storage:hdd'}
2753 return rotate_dict.get(rotate_str)
2754
2755 # All other internal device / error case will always fall here
2756 return None
2757
2758
Dan Shi4e9a2aa2014-03-24 14:28:42 -07002759 @label_decorator('servo')
2760 def get_servo(self):
2761 """Determine if the host has a servo attached.
2762
2763 If the host has a working servo attached, it should have a servo label.
2764
2765 @return: string 'servo' if the host has servo attached. Otherwise,
2766 returns None.
2767 """
2768 return 'servo' if self._servo_host else None
2769
2770
Dan Shi5beba472014-05-28 22:46:07 -07002771 @label_decorator('video_labels')
2772 def get_video_labels(self):
2773 """Run /usr/local/bin/avtest_label_detect to get a list of video labels.
2774
2775 Sample output of avtest_label_detect:
2776 Detected label: hw_video_acc_vp8
2777 Detected label: webcam
2778
2779 @return: A list of labels detected by tool avtest_label_detect.
2780 """
2781 try:
2782 result = self.run('/usr/local/bin/avtest_label_detect').stdout
2783 return re.findall('^Detected label: (\w+)$', result, re.M)
2784 except error.AutoservRunError:
2785 # The tool is not installed.
2786 return []
2787
2788
mussa584b4462014-06-20 15:13:28 -07002789 @label_decorator('video_glitch_detection')
2790 def is_video_glitch_detection_supported(self):
2791 """ Determine if a board under test is supported for video glitch
2792 detection tests.
2793
2794 @return: 'video_glitch_detection' if board is supported, None otherwise.
2795 """
2796 parser = ConfigParser.SafeConfigParser()
2797 filename = os.path.join(
2798 common.autotest_dir, 'client/cros/video/device_spec.conf')
2799
2800 dut = self.get_board().replace(ds_constants.BOARD_PREFIX, '')
2801
2802 try:
2803 parser.read(filename)
mussa584b4462014-06-20 15:13:28 -07002804 supported_boards = parser.sections()
2805
Mussa83c84d62014-10-02 12:11:28 -07002806 return 'video_glitch_detection' if dut in supported_boards else None
mussa584b4462014-06-20 15:13:28 -07002807
2808 except ConfigParser.error:
2809 # something went wrong while parsing the conf file
2810 return None
2811
Katherine Threlkeld7b97a9f2014-06-24 13:47:14 -07002812 @label_decorator('touch_labels')
2813 def get_touch(self):
2814 """
2815 Determine whether board under test has a touchpad or touchscreen.
2816
2817 @return: A list of some combination of 'touchscreen' and 'touchpad',
2818 depending on what is present on the device.
Katherine Threlkeldab83d392015-06-18 16:45:57 -07002819
Katherine Threlkeld7b97a9f2014-06-24 13:47:14 -07002820 """
2821 labels = []
Katherine Threlkeldab83d392015-06-18 16:45:57 -07002822 looking_for = ['touchpad', 'touchscreen']
2823 player = input_playback.InputPlayback()
2824 input_events = self.run('ls /dev/input/event*').stdout.strip().split()
2825 filename = '/tmp/touch_labels'
2826 for event in input_events:
2827 self.run('evtest %s > %s' % (event, filename), timeout=1,
2828 ignore_timeout=True)
2829 properties = self.run('cat %s' % filename).stdout
2830 input_type = player._determine_input_type(properties)
2831 if input_type in looking_for:
2832 labels.append(input_type)
2833 looking_for.remove(input_type)
2834 if len(looking_for) == 0:
2835 break
2836 self.run('rm %s' % filename)
2837
Katherine Threlkeld7b97a9f2014-06-24 13:47:14 -07002838 return labels
2839
Hung-ying Tyana39b0542015-06-30 10:36:42 +08002840
2841 @label_decorator('internal_display')
2842 def has_internal_display(self):
2843 """Determine if the device under test is equipped with an internal
2844 display.
2845
2846 @return: 'internal_display' if one is present; None otherwise.
2847 """
2848 from autotest_lib.client.cros.graphics import graphics_utils
2849 from autotest_lib.client.common_lib import utils as common_utils
2850
2851 def __system_output(cmd):
2852 return self.run(cmd).stdout
2853
2854 def __read_file(remote_path):
2855 return self.run('cat %s' % remote_path).stdout
2856
2857 # Hijack the necessary client functions so that we can take advantage
2858 # of the client lib here.
2859 # FIXME: find a less hacky way than this
2860 original_system_output = utils.system_output
2861 original_read_file = common_utils.read_file
2862 utils.system_output = __system_output
2863 common_utils.read_file = __read_file
2864 try:
2865 return ('internal_display' if graphics_utils.has_internal_display()
2866 else None)
2867 finally:
2868 utils.system_output = original_system_output
2869 common_utils.read_file = original_read_file
2870
2871
Eric Carusoee673ac2015-08-05 17:03:04 -07002872 @label_decorator('lucidsleep')
2873 def has_lucid_sleep_support(self):
2874 """Determine if the device under test has support for lucid sleep.
2875
2876 @return 'lucidsleep' if this board supports lucid sleep; None otherwise
2877 """
2878 board = self.get_board().replace(ds_constants.BOARD_PREFIX, '')
2879 return 'lucidsleep' if board in LUCID_SLEEP_BOARDS else None
2880
2881
Simran Basic6f1f7a2012-10-16 10:47:46 -07002882 def get_labels(self):
2883 """Return a list of labels for this given host.
2884
2885 This is the main way to retrieve all the automatic labels for a host
2886 as it will run through all the currently implemented label functions.
2887 """
2888 labels = []
Richard Barnette82c35912012-11-20 10:09:10 -08002889 for label_function in self._LABEL_FUNCTIONS:
J. Richard Barnetteb869b222014-09-03 17:55:44 -07002890 try:
2891 label = label_function(self)
2892 except Exception as e:
2893 logging.error('Label function %s failed; ignoring it.',
2894 label_function.__name__)
2895 logging.exception(e)
2896 label = None
Simran Basic6f1f7a2012-10-16 10:47:46 -07002897 if label:
Dan Shi5beba472014-05-28 22:46:07 -07002898 if type(label) is str:
2899 labels.append(label)
2900 elif type(label) is list:
2901 labels.extend(label)
Simran Basic6f1f7a2012-10-16 10:47:46 -07002902 return labels
Dan Shi85276d42014-04-08 22:11:45 -07002903
2904
2905 def is_boot_from_usb(self):
2906 """Check if DUT is boot from USB.
2907
2908 @return: True if DUT is boot from usb.
2909 """
2910 device = self.run('rootdev -s -d').stdout.strip()
2911 removable = int(self.run('cat /sys/block/%s/removable' %
2912 os.path.basename(device)).stdout.strip())
2913 return removable == 1
Helen Zhang17dae2b2014-11-11 09:25:52 -08002914
2915
2916 def read_from_meminfo(self, key):
Dan Shi49ca0932014-11-14 11:22:27 -08002917 """Return the memory info from /proc/meminfo
Helen Zhang17dae2b2014-11-11 09:25:52 -08002918
2919 @param key: meminfo requested
2920
2921 @return the memory value as a string
2922
2923 """
Helen Zhang17dae2b2014-11-11 09:25:52 -08002924 meminfo = self.run('grep %s /proc/meminfo' % key).stdout.strip()
2925 logging.debug('%s', meminfo)
2926 return int(re.search(r'\d+', meminfo).group(0))
Rohit Makasana8a4923c2015-08-13 17:04:26 -07002927
2928
2929 def get_board_type(self):
2930 """
2931 Get the DUT's device type from /etc/lsb-release.
Danny Chan471a8d12015-08-18 14:57:41 -07002932 DEVICETYPE can be one of CHROMEBOX, CHROMEBASE, CHROMEBOOK or more.
2933
2934 @return value of DEVICETYPE param from lsb-release.
Rohit Makasana8a4923c2015-08-13 17:04:26 -07002935 """
Danny Chan471a8d12015-08-18 14:57:41 -07002936 device_type = self.run('grep DEVICETYPE /etc/lsb-release',
2937 ignore_status=True).stdout
2938 if device_type:
Kalin Stoyanov524310b2015-08-21 16:24:04 -07002939 return device_type.split('=')[-1].strip()
Danny Chan471a8d12015-08-18 14:57:41 -07002940 return ''