blob: f1f267403c364e7ee63b25de6e571d35875fd4e9 [file] [log] [blame]
J. Richard Barnette24adbf42012-04-11 15:04:53 -07001# Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
Dale Curtisaa5eedb2011-08-23 16:18:52 -07002# Use of this source code is governed by a BSD-style license that can be
3# found in the LICENSE file.
4
mussa584b4462014-06-20 15:13:28 -07005import ConfigParser
Aviv Keshet74c89a92013-02-04 15:18:30 -08006import functools
Christopher Wiley0ed712b2013-04-09 15:25:12 -07007import httplib
J. Richard Barnette1d78b012012-05-15 13:56:30 -07008import logging
Dan Shi0f466e82013-02-22 15:44:58 -08009import os
Simran Basid5e5e272012-09-24 15:23:59 -070010import re
Christopher Wileyd78249a2013-03-01 13:05:31 -080011import socket
J. Richard Barnette1d78b012012-05-15 13:56:30 -070012import subprocess
J. Richard Barnette134ec2c2012-04-25 12:59:37 -070013import time
J. Richard Barnette1d78b012012-05-15 13:56:30 -070014import xmlrpclib
J. Richard Barnette134ec2c2012-04-25 12:59:37 -070015
mussa584b4462014-06-20 15:13:28 -070016import common
J. Richard Barnette45e93de2012-04-11 17:24:15 -070017from autotest_lib.client.bin import utils
Dan Shi9cb0eec2014-06-03 09:04:50 -070018from autotest_lib.client.common_lib import autotemp
Richard Barnette0c73ffc2012-11-19 15:21:18 -080019from autotest_lib.client.common_lib import error
20from autotest_lib.client.common_lib import global_config
Dan Shi549fb822015-03-24 18:01:11 -070021from autotest_lib.client.common_lib import lsbrelease_utils
J. Richard Barnette45e93de2012-04-11 17:24:15 -070022from autotest_lib.client.common_lib.cros import autoupdater
Richard Barnette03a0c132012-11-05 12:40:35 -080023from autotest_lib.client.common_lib.cros import dev_server
Christopher Wileyd78249a2013-03-01 13:05:31 -080024from autotest_lib.client.common_lib.cros import retry
Gabe Blackb72f4fb2015-01-20 16:47:13 -080025from autotest_lib.client.common_lib.cros.graphite import autotest_es
Gabe Black1e1c41b2015-02-04 23:55:15 -080026from autotest_lib.client.common_lib.cros.graphite import autotest_stats
Hsinyu Chaoe0b08e62015-08-11 10:50:37 +000027from autotest_lib.client.cros import constants as client_constants
J. Richard Barnette84890bd2014-02-21 11:05:47 -080028from autotest_lib.client.cros import cros_ui
Cheng-Yi Chiangf4104ff2014-12-23 19:39:01 +080029from autotest_lib.client.cros.audio import cras_utils
Katherine Threlkeldab83d392015-06-18 16:45:57 -070030from autotest_lib.client.cros.input_playback import input_playback
MK Ryu35d661e2014-09-25 17:44:10 -070031from autotest_lib.server import autoserv_parser
32from autotest_lib.server import autotest
33from autotest_lib.server import constants
34from autotest_lib.server import crashcollect
Dan Shia1ecd5c2013-06-06 11:21:31 -070035from autotest_lib.server import utils as server_utils
Dan Shi9cb0eec2014-06-03 09:04:50 -070036from autotest_lib.server.cros import provision
Scott Zawalski89c44dd2013-02-26 09:28:02 -050037from autotest_lib.server.cros.dynamic_suite import constants as ds_constants
Simran Basi5e6339a2013-03-21 11:34:32 -070038from autotest_lib.server.cros.dynamic_suite import tools, frontend_wrappers
Dan Shi9cb0eec2014-06-03 09:04:50 -070039from autotest_lib.server.cros.faft.config.config import Config as FAFTConfig
Fang Deng96667ca2013-08-01 17:46:18 -070040from autotest_lib.server.hosts import abstract_ssh
Tom Wai-Hong Tamefe1c7f2014-01-02 14:00:11 +080041from autotest_lib.server.hosts import chameleon_host
Fang Deng5d518f42013-08-02 14:04:32 -070042from autotest_lib.server.hosts import servo_host
Simran Basidcff4252012-11-20 16:13:20 -080043from autotest_lib.site_utils.rpm_control_system import rpm_client
Simran Basid5e5e272012-09-24 15:23:59 -070044
45
beeps32a63082013-08-22 14:02:29 -070046try:
47 import jsonrpclib
48except ImportError:
49 jsonrpclib = None
Fang Deng96667ca2013-08-01 17:46:18 -070050
Fang Dengd1c2b732013-08-20 12:59:46 -070051
Dan Shib8540a52015-07-16 14:18:23 -070052CONFIG = global_config.global_config
53
Eric Carusoee673ac2015-08-05 17:03:04 -070054LUCID_SLEEP_BOARDS = ['samus', 'lulu']
55
beepsc87ff602013-07-31 21:53:00 -070056class FactoryImageCheckerException(error.AutoservError):
57 """Exception raised when an image is a factory image."""
58 pass
59
60
Aviv Keshet74c89a92013-02-04 15:18:30 -080061def add_label_detector(label_function_list, label_list=None, label=None):
62 """Decorator used to group functions together into the provided list.
63 @param label_function_list: List of label detecting functions to add
64 decorated function to.
65 @param label_list: List of detectable labels to add detectable labels to.
66 (Default: None)
67 @param label: Label string that is detectable by this detection function
68 (Default: None)
J. Richard Barnette7214e0b2013-02-06 15:20:49 -080069 """
Simran Basic6f1f7a2012-10-16 10:47:46 -070070 def add_func(func):
Aviv Keshet74c89a92013-02-04 15:18:30 -080071 """
72 @param func: The function to be added as a detector.
73 """
74 label_function_list.append(func)
75 if label and label_list is not None:
76 label_list.append(label)
Simran Basic6f1f7a2012-10-16 10:47:46 -070077 return func
78 return add_func
79
80
Fang Deng0ca40e22013-08-27 17:47:44 -070081class CrosHost(abstract_ssh.AbstractSSHHost):
J. Richard Barnette45e93de2012-04-11 17:24:15 -070082 """Chromium OS specific subclass of Host."""
83
84 _parser = autoserv_parser.autoserv_parser
Scott Zawalski62bacae2013-03-05 10:40:32 -050085 _AFE = frontend_wrappers.RetryingAFE(timeout_min=5, delay_sec=10)
J. Richard Barnette45e93de2012-04-11 17:24:15 -070086
Richard Barnette03a0c132012-11-05 12:40:35 -080087 # Timeout values (in seconds) associated with various Chrome OS
88 # state changes.
J. Richard Barnette134ec2c2012-04-25 12:59:37 -070089 #
Richard Barnette0c73ffc2012-11-19 15:21:18 -080090 # In general, a good rule of thumb is that the timeout can be up
91 # to twice the typical measured value on the slowest platform.
92 # The times here have not necessarily been empirically tested to
93 # meet this criterion.
J. Richard Barnetteeb69d722012-06-18 17:29:44 -070094 #
95 # SLEEP_TIMEOUT: Time to allow for suspend to memory.
Richard Barnette0c73ffc2012-11-19 15:21:18 -080096 # RESUME_TIMEOUT: Time to allow for resume after suspend, plus
97 # time to restart the netwowrk.
J. Richard Barnette84890bd2014-02-21 11:05:47 -080098 # SHUTDOWN_TIMEOUT: Time to allow for shut down.
J. Richard Barnetteeb69d722012-06-18 17:29:44 -070099 # BOOT_TIMEOUT: Time to allow for boot from power off. Among
Richard Barnette0c73ffc2012-11-19 15:21:18 -0800100 # other things, this must account for the 30 second dev-mode
J. Richard Barnetted4649c62013-03-06 17:42:27 -0800101 # screen delay and time to start the network.
J. Richard Barnetteeb69d722012-06-18 17:29:44 -0700102 # USB_BOOT_TIMEOUT: Time to allow for boot from a USB device,
Richard Barnette0c73ffc2012-11-19 15:21:18 -0800103 # including the 30 second dev-mode delay and time to start the
J. Richard Barnetted4649c62013-03-06 17:42:27 -0800104 # network.
beepsf079cfb2013-09-18 17:49:51 -0700105 # INSTALL_TIMEOUT: Time to allow for chromeos-install.
J. Richard Barnette84890bd2014-02-21 11:05:47 -0800106 # POWERWASH_BOOT_TIMEOUT: Time to allow for a reboot that
107 # includes powerwash.
J. Richard Barnetteeb69d722012-06-18 17:29:44 -0700108
109 SLEEP_TIMEOUT = 2
J. Richard Barnetted4649c62013-03-06 17:42:27 -0800110 RESUME_TIMEOUT = 10
Tom Wai-Hong Tamfe005c22014-12-03 09:25:44 +0800111 SHUTDOWN_TIMEOUT = 10
J. Richard Barnettefbcc7122013-07-24 18:24:59 -0700112 BOOT_TIMEOUT = 60
J. Richard Barnette5bab5f52015-08-03 13:14:38 -0700113 USB_BOOT_TIMEOUT = 300
J. Richard Barnette7817b052014-08-28 09:47:29 -0700114 INSTALL_TIMEOUT = 480
Dan Shi2c88eed2013-11-12 10:18:38 -0800115 POWERWASH_BOOT_TIMEOUT = 60
Chris Sosab76e0ee2013-05-22 16:55:41 -0700116
Dan Shica503482015-03-30 17:23:25 -0700117 # Minimum OS version that supports server side packaging. Older builds may
118 # not have server side package built or with Autotest code change to support
119 # server-side packaging.
Dan Shib8540a52015-07-16 14:18:23 -0700120 MIN_VERSION_SUPPORT_SSP = CONFIG.get_config_value(
Dan Shiced09e42015-04-17 16:09:34 -0700121 'AUTOSERV', 'min_version_support_ssp', type=int)
Dan Shica503482015-03-30 17:23:25 -0700122
J. Richard Barnette84890bd2014-02-21 11:05:47 -0800123 # REBOOT_TIMEOUT: How long to wait for a reboot.
124 #
Chris Sosab76e0ee2013-05-22 16:55:41 -0700125 # We have a long timeout to ensure we don't flakily fail due to other
126 # issues. Shorter timeouts are vetted in platform_RebootAfterUpdate.
Simran Basi1160e2c2013-10-04 16:00:24 -0700127 # TODO(sbasi - crbug.com/276094) Restore to 5 mins once the 'host did not
128 # return from reboot' bug is solved.
129 REBOOT_TIMEOUT = 480
Chris Sosab76e0ee2013-05-22 16:55:41 -0700130
Ismail Noorbasha07fdb612013-02-14 14:13:31 -0800131 # _USB_POWER_TIMEOUT: Time to allow for USB to power toggle ON and OFF.
132 # _POWER_CYCLE_TIMEOUT: Time to allow for manual power cycle.
133 _USB_POWER_TIMEOUT = 5
134 _POWER_CYCLE_TIMEOUT = 10
135
beeps32a63082013-08-22 14:02:29 -0700136 _RPC_PROXY_URL = 'http://localhost:%d'
Christopher Wileydd181852013-10-10 19:56:58 -0700137 _RPC_SHUTDOWN_POLLING_PERIOD_SECONDS = 2
Peter Qiu4410db72014-06-05 10:32:41 -0700138 # Set shutdown timeout to account for the time for restarting the UI.
139 _RPC_SHUTDOWN_TIMEOUT_SECONDS = cros_ui.RESTART_UI_TIMEOUT
Richard Barnette0c73ffc2012-11-19 15:21:18 -0800140
Dan Shib8540a52015-07-16 14:18:23 -0700141 _RPM_RECOVERY_BOARDS = CONFIG.get_config_value('CROS',
Richard Barnette82c35912012-11-20 10:09:10 -0800142 'rpm_recovery_boards', type=str).split(',')
143
144 _MAX_POWER_CYCLE_ATTEMPTS = 6
145 _LAB_MACHINE_FILE = '/mnt/stateful_partition/.labmachine'
Fang Dengdeba14f2014-11-14 11:54:09 -0800146 _RPM_HOSTNAME_REGEX = ('chromeos(\d+)(-row(\d+))?-rack(\d+[a-z]*)'
147 '-host(\d+)')
Katherine Threlkeldab83d392015-06-18 16:45:57 -0700148 _LIGHTSENSOR_FILES = [ "in_illuminance0_input",
149 "in_illuminance_input",
150 "in_illuminance0_raw",
151 "in_illuminance_raw",
152 "illuminance0_input"]
Richard Barnette82c35912012-11-20 10:09:10 -0800153 _LIGHTSENSOR_SEARCH_DIR = '/sys/bus/iio/devices'
154 _LABEL_FUNCTIONS = []
Aviv Keshet74c89a92013-02-04 15:18:30 -0800155 _DETECTABLE_LABELS = []
156 label_decorator = functools.partial(add_label_detector, _LABEL_FUNCTIONS,
157 _DETECTABLE_LABELS)
J. Richard Barnette134ec2c2012-04-25 12:59:37 -0700158
J. Richard Barnetteb6de7e32013-02-14 13:28:04 -0800159 # Constants used in ping_wait_up() and ping_wait_down().
160 #
161 # _PING_WAIT_COUNT is the approximate number of polling
162 # cycles to use when waiting for a host state change.
163 #
164 # _PING_STATUS_DOWN and _PING_STATUS_UP are names used
165 # for arguments to the internal _ping_wait_for_status()
166 # method.
167 _PING_WAIT_COUNT = 40
168 _PING_STATUS_DOWN = False
169 _PING_STATUS_UP = True
170
Ismail Noorbasha07fdb612013-02-14 14:13:31 -0800171 # Allowed values for the power_method argument.
172
173 # POWER_CONTROL_RPM: Passed as default arg for power_off/on/cycle() methods.
174 # POWER_CONTROL_SERVO: Used in set_power() and power_cycle() methods.
175 # POWER_CONTROL_MANUAL: Used in set_power() and power_cycle() methods.
176 POWER_CONTROL_RPM = 'RPM'
177 POWER_CONTROL_SERVO = 'servoj10'
178 POWER_CONTROL_MANUAL = 'manual'
179
180 POWER_CONTROL_VALID_ARGS = (POWER_CONTROL_RPM,
181 POWER_CONTROL_SERVO,
182 POWER_CONTROL_MANUAL)
Richard Barnette0c73ffc2012-11-19 15:21:18 -0800183
Simran Basi5e6339a2013-03-21 11:34:32 -0700184 _RPM_OUTLET_CHANGED = 'outlet_changed'
185
Dan Shi9cb0eec2014-06-03 09:04:50 -0700186 # URL pattern to download firmware image.
Dan Shib8540a52015-07-16 14:18:23 -0700187 _FW_IMAGE_URL_PATTERN = CONFIG.get_config_value(
Dan Shi9cb0eec2014-06-03 09:04:50 -0700188 'CROS', 'firmware_url_pattern', type=str)
beeps687243d2013-07-18 15:29:27 -0700189
MK Ryu35d661e2014-09-25 17:44:10 -0700190 # File that has a list of directories to be collected
191 _LOGS_TO_COLLECT_FILE = os.path.join(
192 common.client_dir, 'common_lib', 'logs_to_collect')
193
194 # Prefix of logging message w.r.t. crash collection
195 _CRASHLOGS_PREFIX = 'collect_crashlogs'
196
197 # Time duration waiting for host up/down check
198 _CHECK_HOST_UP_TIMEOUT_SECS = 15
199
200 # A command that interacts with kernel and hardware (e.g., rm, mkdir, etc)
201 # might not be completely done deep through the hardware when the machine
202 # is powered down right after the command returns.
203 # We should wait for a few seconds to make them done. Finger crossed.
204 _SAFE_WAIT_SECS = 10
205
206
J. Richard Barnette964fba02012-10-24 17:34:29 -0700207 @staticmethod
beeps46dadc92013-11-07 14:07:10 -0800208 def check_host(host, timeout=10):
209 """
210 Check if the given host is a chrome-os host.
211
212 @param host: An ssh host representing a device.
213 @param timeout: The timeout for the run command.
214
215 @return: True if the host device is chromeos.
216
beeps46dadc92013-11-07 14:07:10 -0800217 """
218 try:
Simran Basi933c8af2015-04-29 14:05:07 -0700219 result = host.run(
220 'grep -q CHROMEOS /etc/lsb-release && '
221 '! test -f /mnt/stateful_partition/.android_tester && '
222 '! grep -q moblab /etc/lsb-release',
223 ignore_status=True, timeout=timeout)
beeps46dadc92013-11-07 14:07:10 -0800224 except (error.AutoservRunError, error.AutoservSSHTimeout):
225 return False
226 return result.exit_status == 0
227
228
229 @staticmethod
Tom Wai-Hong Tamefe1c7f2014-01-02 14:00:11 +0800230 def _extract_arguments(args_dict, key_subset):
231 """Extract options from `args_dict` and return a subset result.
J. Richard Barnette7214e0b2013-02-06 15:20:49 -0800232
233 Take the provided dictionary of argument options and return
Tom Wai-Hong Tamefe1c7f2014-01-02 14:00:11 +0800234 a subset that represent standard arguments needed to construct
235 a test-assistant object (chameleon or servo) for a host. The
236 intent is to provide standard argument processing from
Christopher Wiley644ef3e2015-05-15 13:14:14 -0700237 CrosHost for tests that require a test-assistant board
Tom Wai-Hong Tamefe1c7f2014-01-02 14:00:11 +0800238 to operate.
239
240 @param args_dict Dictionary from which to extract the arguments.
241 @param key_subset Tuple of keys to extract from the args_dict, e.g.
242 ('servo_host', 'servo_port').
243 """
244 result = {}
245 for arg in key_subset:
246 if arg in args_dict:
247 result[arg] = args_dict[arg]
248 return result
249
250
251 @staticmethod
252 def get_chameleon_arguments(args_dict):
253 """Extract chameleon options from `args_dict` and return the result.
254
255 Recommended usage:
256 ~~~~~~~~
257 args_dict = utils.args_to_dict(args)
258 chameleon_args = hosts.CrosHost.get_chameleon_arguments(args_dict)
259 host = hosts.create_host(machine, chameleon_args=chameleon_args)
260 ~~~~~~~~
261
262 @param args_dict Dictionary from which to extract the chameleon
263 arguments.
264 """
265 return CrosHost._extract_arguments(
266 args_dict, ('chameleon_host', 'chameleon_port'))
267
268
269 @staticmethod
270 def get_servo_arguments(args_dict):
271 """Extract servo options from `args_dict` and return the result.
J. Richard Barnette7214e0b2013-02-06 15:20:49 -0800272
273 Recommended usage:
274 ~~~~~~~~
275 args_dict = utils.args_to_dict(args)
Fang Deng0ca40e22013-08-27 17:47:44 -0700276 servo_args = hosts.CrosHost.get_servo_arguments(args_dict)
J. Richard Barnette7214e0b2013-02-06 15:20:49 -0800277 host = hosts.create_host(machine, servo_args=servo_args)
278 ~~~~~~~~
279
280 @param args_dict Dictionary from which to extract the servo
281 arguments.
282 """
Tom Wai-Hong Tamefe1c7f2014-01-02 14:00:11 +0800283 return CrosHost._extract_arguments(
284 args_dict, ('servo_host', 'servo_port'))
J. Richard Barnette134ec2c2012-04-25 12:59:37 -0700285
J. Richard Barnette964fba02012-10-24 17:34:29 -0700286
Tom Wai-Hong Tamefe1c7f2014-01-02 14:00:11 +0800287 def _initialize(self, hostname, chameleon_args=None, servo_args=None,
Fang Denge545abb2014-12-30 18:43:47 -0800288 try_lab_servo=False, ssh_verbosity_flag='', ssh_options='',
Fang Dengd1c2b732013-08-20 12:59:46 -0700289 *args, **dargs):
Tom Wai-Hong Tamefe1c7f2014-01-02 14:00:11 +0800290 """Initialize superclasses, |self.chameleon|, and |self.servo|.
J. Richard Barnette67ccb872012-04-19 16:34:56 -0700291
Fang Denge545abb2014-12-30 18:43:47 -0800292 This method will attempt to create the test-assistant object
293 (chameleon/servo) when it is needed by the test. Check
294 the docstring of chameleon_host.create_chameleon_host and
295 servo_host.create_servo_host for how this is determined.
Fang Deng5d518f42013-08-02 14:04:32 -0700296
Fang Denge545abb2014-12-30 18:43:47 -0800297 @param hostname: Hostname of the dut.
298 @param chameleon_args: A dictionary that contains args for creating
299 a ChameleonHost. See chameleon_host for details.
300 @param servo_args: A dictionary that contains args for creating
301 a ServoHost object. See servo_host for details.
302 @param try_lab_servo: Boolean, False indicates that ServoHost should
303 not be created for a device in Cros test lab.
304 See servo_host for details.
305 @param ssh_verbosity_flag: String, to pass to the ssh command to control
306 verbosity.
307 @param ssh_options: String, other ssh options to pass to the ssh
308 command.
J. Richard Barnette67ccb872012-04-19 16:34:56 -0700309 """
Fang Deng0ca40e22013-08-27 17:47:44 -0700310 super(CrosHost, self)._initialize(hostname=hostname,
J. Richard Barnette45e93de2012-04-11 17:24:15 -0700311 *args, **dargs)
J. Richard Barnettef0859852012-08-20 14:55:50 -0700312 # self.env is a dictionary of environment variable settings
313 # to be exported for commands run on the host.
314 # LIBC_FATAL_STDERR_ can be useful for diagnosing certain
315 # errors that might happen.
316 self.env['LIBC_FATAL_STDERR_'] = '1'
beeps32a63082013-08-22 14:02:29 -0700317 self._rpc_proxy_map = {}
Fang Dengd1c2b732013-08-20 12:59:46 -0700318 self._ssh_verbosity_flag = ssh_verbosity_flag
Aviv Keshetc5947fa2013-09-04 14:06:29 -0700319 self._ssh_options = ssh_options
Fang Deng5d518f42013-08-02 14:04:32 -0700320 # TODO(fdeng): We need to simplify the
321 # process of servo and servo_host initialization.
322 # crbug.com/298432
Fang Denge545abb2014-12-30 18:43:47 -0800323 self._servo_host = servo_host.create_servo_host(
324 dut=self.hostname, servo_args=servo_args,
325 try_lab_servo=try_lab_servo)
Tom Wai-Hong Tamefe1c7f2014-01-02 14:00:11 +0800326 # TODO(waihong): Do the simplication on Chameleon too.
Tom Wai-Hong Tam3d6790d2014-04-14 16:15:47 +0800327 self._chameleon_host = chameleon_host.create_chameleon_host(
328 dut=self.hostname, chameleon_args=chameleon_args)
329
Dan Shi4d478522014-02-14 13:46:32 -0800330 if self._servo_host is not None:
331 self.servo = self._servo_host.get_servo()
332 else:
333 self.servo = None
334
Tom Wai-Hong Tam3d6790d2014-04-14 16:15:47 +0800335 if self._chameleon_host:
Tom Wai-Hong Tameaee3402014-01-22 08:52:10 +0800336 self.chameleon = self._chameleon_host.create_chameleon_board()
Tom Wai-Hong Tamefe1c7f2014-01-02 14:00:11 +0800337 else:
Tom Wai-Hong Tam3d6790d2014-04-14 16:15:47 +0800338 self.chameleon = None
Fang Deng5d518f42013-08-02 14:04:32 -0700339
340
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500341 def get_repair_image_name(self):
342 """Generate a image_name from variables in the global config.
343
344 @returns a str of $board-version/$BUILD.
345
346 """
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500347 board = self._get_board_from_afe()
348 if board is None:
349 raise error.AutoservError('DUT has no board attribute, '
350 'cannot be repaired.')
Dan Shi6964fa52014-12-18 11:04:27 -0800351 stable_version = self._AFE.run('get_stable_version', board=board)
Dan Shib8540a52015-07-16 14:18:23 -0700352 build_pattern = CONFIG.get_config_value(
Dan Shi6964fa52014-12-18 11:04:27 -0800353 'CROS', 'stable_build_pattern')
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500354 return build_pattern % (board, stable_version)
355
356
Scott Zawalski62bacae2013-03-05 10:40:32 -0500357 def _host_in_AFE(self):
358 """Check if the host is an object the AFE knows.
359
360 @returns the host object.
361 """
362 return self._AFE.get_hosts(hostname=self.hostname)
363
364
Chris Sosab76e0ee2013-05-22 16:55:41 -0700365 def lookup_job_repo_url(self):
366 """Looks up the job_repo_url for the host.
367
368 @returns job_repo_url from AFE or None if not found.
369
370 @raises KeyError if the host does not have a job_repo_url
371 """
372 if not self._host_in_AFE():
373 return None
374
375 hosts = self._AFE.get_hosts(hostname=self.hostname)
beepsb5efc532013-06-04 11:29:34 -0700376 if hosts and ds_constants.JOB_REPO_URL in hosts[0].attributes:
377 return hosts[0].attributes[ds_constants.JOB_REPO_URL]
Chris Sosab76e0ee2013-05-22 16:55:41 -0700378
379
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500380 def clear_cros_version_labels_and_job_repo_url(self):
381 """Clear cros_version labels and host attribute job_repo_url."""
Scott Zawalski62bacae2013-03-05 10:40:32 -0500382 if not self._host_in_AFE():
Scott Zawalskieadbf702013-03-14 09:23:06 -0400383 return
384
Scott Zawalski62bacae2013-03-05 10:40:32 -0500385 host_list = [self.hostname]
386 labels = self._AFE.get_labels(
387 name__startswith=ds_constants.VERSION_PREFIX,
388 host__hostname=self.hostname)
Dan Shi0f466e82013-02-22 15:44:58 -0800389
Scott Zawalski62bacae2013-03-05 10:40:32 -0500390 for label in labels:
391 label.remove_hosts(hosts=host_list)
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500392
beepscb6f1e22013-06-28 19:14:10 -0700393 self.update_job_repo_url(None, None)
394
395
396 def update_job_repo_url(self, devserver_url, image_name):
397 """
398 Updates the job_repo_url host attribute and asserts it's value.
399
400 @param devserver_url: The devserver to use in the job_repo_url.
401 @param image_name: The name of the image to use in the job_repo_url.
402
403 @raises AutoservError: If we failed to update the job_repo_url.
404 """
405 repo_url = None
406 if devserver_url and image_name:
407 repo_url = tools.get_package_url(devserver_url, image_name)
408 self._AFE.set_host_attribute(ds_constants.JOB_REPO_URL, repo_url,
Scott Zawalski62bacae2013-03-05 10:40:32 -0500409 hostname=self.hostname)
beepscb6f1e22013-06-28 19:14:10 -0700410 if self.lookup_job_repo_url() != repo_url:
411 raise error.AutoservError('Failed to update job_repo_url with %s, '
412 'host %s' % (repo_url, self.hostname))
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500413
414
Dan Shie9309262013-06-19 22:50:21 -0700415 def add_cros_version_labels_and_job_repo_url(self, image_name):
Scott Zawalskieadbf702013-03-14 09:23:06 -0400416 """Add cros_version labels and host attribute job_repo_url.
417
418 @param image_name: The name of the image e.g.
419 lumpy-release/R27-3837.0.0
Dan Shi7458bf62013-06-10 12:50:16 -0700420
Scott Zawalskieadbf702013-03-14 09:23:06 -0400421 """
Scott Zawalski62bacae2013-03-05 10:40:32 -0500422 if not self._host_in_AFE():
Scott Zawalskieadbf702013-03-14 09:23:06 -0400423 return
Scott Zawalski62bacae2013-03-05 10:40:32 -0500424
Scott Zawalskieadbf702013-03-14 09:23:06 -0400425 cros_label = '%s%s' % (ds_constants.VERSION_PREFIX, image_name)
Dan Shie9309262013-06-19 22:50:21 -0700426 devserver_url = dev_server.ImageServer.resolve(image_name).url()
Scott Zawalski62bacae2013-03-05 10:40:32 -0500427
MK Ryufb5e3a82015-07-01 12:21:20 -0700428 self._AFE.run('label_add_hosts', id=cros_label, hosts=[self.hostname])
beepscb6f1e22013-06-28 19:14:10 -0700429 self.update_job_repo_url(devserver_url, image_name)
430
431
beepsdae65fd2013-07-26 16:24:41 -0700432 def verify_job_repo_url(self, tag=''):
beepscb6f1e22013-06-28 19:14:10 -0700433 """
434 Make sure job_repo_url of this host is valid.
435
joychen03eaad92013-06-26 09:55:21 -0700436 Eg: The job_repo_url "http://lmn.cd.ab.xyx:8080/static/\
beepscb6f1e22013-06-28 19:14:10 -0700437 lumpy-release/R29-4279.0.0/autotest/packages" claims to have the
438 autotest package for lumpy-release/R29-4279.0.0. If this isn't the case,
439 download and extract it. If the devserver embedded in the url is
440 unresponsive, update the job_repo_url of the host after staging it on
441 another devserver.
442
443 @param job_repo_url: A url pointing to the devserver where the autotest
444 package for this build should be staged.
beepsdae65fd2013-07-26 16:24:41 -0700445 @param tag: The tag from the server job, in the format
446 <job_id>-<user>/<hostname>, or <hostless> for a server job.
beepscb6f1e22013-06-28 19:14:10 -0700447
448 @raises DevServerException: If we could not resolve a devserver.
449 @raises AutoservError: If we're unable to save the new job_repo_url as
450 a result of choosing a new devserver because the old one failed to
451 respond to a health check.
beeps0c865032013-07-30 11:37:06 -0700452 @raises urllib2.URLError: If the devserver embedded in job_repo_url
453 doesn't respond within the timeout.
beepscb6f1e22013-06-28 19:14:10 -0700454 """
455 job_repo_url = self.lookup_job_repo_url()
456 if not job_repo_url:
457 logging.warning('No job repo url set on host %s', self.hostname)
458 return
459
460 logging.info('Verifying job repo url %s', job_repo_url)
461 devserver_url, image_name = tools.get_devserver_build_from_package_url(
462 job_repo_url)
463
beeps0c865032013-07-30 11:37:06 -0700464 ds = dev_server.ImageServer(devserver_url)
beepscb6f1e22013-06-28 19:14:10 -0700465
466 logging.info('Staging autotest artifacts for %s on devserver %s',
467 image_name, ds.url())
beeps687243d2013-07-18 15:29:27 -0700468
469 start_time = time.time()
Simran Basi25e7a922014-10-31 11:56:10 -0700470 ds.stage_artifacts(image_name, ['autotest_packages'])
beeps687243d2013-07-18 15:29:27 -0700471 stage_time = time.time() - start_time
472
473 # Record how much of the verification time comes from a devserver
474 # restage. If we're doing things right we should not see multiple
475 # devservers for a given board/build/branch path.
476 try:
J. Richard Barnette3cbd76b2013-11-27 12:11:25 -0800477 board, build_type, branch = server_utils.ParseBuildName(
beeps687243d2013-07-18 15:29:27 -0700478 image_name)[:3]
J. Richard Barnette3cbd76b2013-11-27 12:11:25 -0800479 except server_utils.ParseBuildNameException:
beeps687243d2013-07-18 15:29:27 -0700480 pass
481 else:
beeps0c865032013-07-30 11:37:06 -0700482 devserver = devserver_url[
Chris Sosa65425082013-10-16 13:26:22 -0700483 devserver_url.find('/') + 2:devserver_url.rfind(':')]
beeps687243d2013-07-18 15:29:27 -0700484 stats_key = {
485 'board': board,
486 'build_type': build_type,
487 'branch': branch,
beeps0c865032013-07-30 11:37:06 -0700488 'devserver': devserver.replace('.', '_'),
beeps687243d2013-07-18 15:29:27 -0700489 }
Gabe Black1e1c41b2015-02-04 23:55:15 -0800490 autotest_stats.Gauge('verify_job_repo_url').send(
beeps687243d2013-07-18 15:29:27 -0700491 '%(board)s.%(build_type)s.%(branch)s.%(devserver)s' % stats_key,
492 stage_time)
beepscb6f1e22013-06-28 19:14:10 -0700493
Scott Zawalskieadbf702013-03-14 09:23:06 -0400494
Dan Shicf4d2032015-03-12 15:04:21 -0700495 def stage_server_side_package(self, image=None):
496 """Stage autotest server-side package on devserver.
497
498 @param image: Full path of an OS image to install or a build name.
499
500 @return: A url to the autotest server-side package.
501 """
502 if image:
503 image_name = tools.get_build_from_image(image)
504 if not image_name:
505 raise error.AutoservError(
506 'Failed to parse build name from %s' % image)
507 ds = dev_server.ImageServer.resolve(image_name)
508 else:
509 job_repo_url = self.lookup_job_repo_url()
510 if job_repo_url:
511 devserver_url, image_name = (
512 tools.get_devserver_build_from_package_url(job_repo_url))
513 ds = dev_server.ImageServer(devserver_url)
514 else:
515 labels = self._AFE.get_labels(
516 name__startswith=ds_constants.VERSION_PREFIX,
517 host__hostname=self.hostname)
518 if not labels:
519 raise error.AutoservError(
520 'Failed to stage server-side package. The host has '
521 'no job_report_url attribute or version label.')
522 image_name = labels[0].name[len(ds_constants.VERSION_PREFIX):]
523 ds = dev_server.ImageServer.resolve(image_name)
Dan Shica503482015-03-30 17:23:25 -0700524
525 # Get the OS version of the build, for any build older than
526 # MIN_VERSION_SUPPORT_SSP, server side packaging is not supported.
527 match = re.match('.*/R\d+-(\d+)\.', image_name)
528 if match and int(match.group(1)) < self.MIN_VERSION_SUPPORT_SSP:
529 logging.warn('Build %s is older than %s. Server side packaging is '
530 'disabled.', image_name, self.MIN_VERSION_SUPPORT_SSP)
531 return None
532
Dan Shicf4d2032015-03-12 15:04:21 -0700533 ds.stage_artifacts(image_name, ['autotest_server_package'])
534 return '%s/static/%s/%s' % (ds.url(), image_name,
535 'autotest_server_package.tar.bz2')
536
537
Dan Shi0f466e82013-02-22 15:44:58 -0800538 def _try_stateful_update(self, update_url, force_update, updater):
539 """Try to use stateful update to initialize DUT.
540
541 When DUT is already running the same version that machine_install
542 tries to install, stateful update is a much faster way to clean up
543 the DUT for testing, compared to a full reimage. It is implemeted
544 by calling autoupdater.run_update, but skipping updating root, as
545 updating the kernel is time consuming and not necessary.
546
547 @param update_url: url of the image.
548 @param force_update: Set to True to update the image even if the DUT
549 is running the same version.
550 @param updater: ChromiumOSUpdater instance used to update the DUT.
551 @returns: True if the DUT was updated with stateful update.
552
553 """
J. Richard Barnette3f731032014-04-07 17:42:59 -0700554 # TODO(jrbarnette): Yes, I hate this re.match() test case.
555 # It's better than the alternative: see crbug.com/360944.
556 image_name = autoupdater.url_to_image_name(update_url)
557 release_pattern = r'^.*-release/R[0-9]+-[0-9]+\.[0-9]+\.0$'
558 if not re.match(release_pattern, image_name):
559 return False
Dan Shi0f466e82013-02-22 15:44:58 -0800560 if not updater.check_version():
561 return False
562 if not force_update:
563 logging.info('Canceling stateful update because the new and '
564 'old versions are the same.')
565 return False
566 # Following folders should be rebuilt after stateful update.
567 # A test file is used to confirm each folder gets rebuilt after
568 # the stateful update.
569 folders_to_check = ['/var', '/home', '/mnt/stateful_partition']
570 test_file = '.test_file_to_be_deleted'
571 for folder in folders_to_check:
572 touch_path = os.path.join(folder, test_file)
573 self.run('touch %s' % touch_path)
574
Chris Sosae92399e2015-04-24 11:32:59 -0700575 updater.run_update(update_root=False)
Dan Shi0f466e82013-02-22 15:44:58 -0800576
577 # Reboot to complete stateful update.
Chris Sosab76e0ee2013-05-22 16:55:41 -0700578 self.reboot(timeout=self.REBOOT_TIMEOUT, wait=True)
Dan Shi0f466e82013-02-22 15:44:58 -0800579 check_file_cmd = 'test -f %s; echo $?'
580 for folder in folders_to_check:
581 test_file_path = os.path.join(folder, test_file)
582 result = self.run(check_file_cmd % test_file_path,
583 ignore_status=True)
584 if result.exit_status == 1:
585 return False
586 return True
587
588
J. Richard Barnette7275b612013-06-04 18:13:11 -0700589 def _post_update_processing(self, updater, expected_kernel=None):
Dan Shi0f466e82013-02-22 15:44:58 -0800590 """After the DUT is updated, confirm machine_install succeeded.
591
592 @param updater: ChromiumOSUpdater instance used to update the DUT.
J. Richard Barnette7275b612013-06-04 18:13:11 -0700593 @param expected_kernel: kernel expected to be active after reboot,
594 or `None` to skip rollback checking.
Dan Shi0f466e82013-02-22 15:44:58 -0800595
596 """
J. Richard Barnette7275b612013-06-04 18:13:11 -0700597 # Touch the lab machine file to leave a marker that
598 # distinguishes this image from other test images.
599 # Afterwards, we must re-run the autoreboot script because
600 # it depends on the _LAB_MACHINE_FILE.
Dan Shi0f466e82013-02-22 15:44:58 -0800601 self.run('touch %s' % self._LAB_MACHINE_FILE)
Dan Shi0f466e82013-02-22 15:44:58 -0800602 self.run('start autoreboot')
Chris Sosa65425082013-10-16 13:26:22 -0700603 updater.verify_boot_expectations(
604 expected_kernel, rollback_message=
605 'Build %s failed to boot on %s; system rolled back to previous'
606 'build' % (updater.update_version, self.hostname))
J. Richard Barnette7275b612013-06-04 18:13:11 -0700607 # Check that we've got the build we meant to install.
608 if not updater.check_version_to_confirm_install():
609 raise autoupdater.ChromiumOSError(
610 'Failed to update %s to build %s; found build '
611 '%s instead' % (self.hostname,
Chris Sosa65425082013-10-16 13:26:22 -0700612 updater.update_version,
Dan Shi0942b1d2015-03-31 11:07:00 -0700613 self.get_release_version()))
Dan Shi0f466e82013-02-22 15:44:58 -0800614
Chris Sosae92399e2015-04-24 11:32:59 -0700615 logging.debug('Cleaning up old autotest directories.')
616 try:
617 installed_autodir = autotest.Autotest.get_installed_autodir(self)
618 self.run('rm -rf ' + installed_autodir)
619 except autotest.AutodirNotFoundError:
620 logging.debug('No autotest installed directory found.')
621
Dan Shi0f466e82013-02-22 15:44:58 -0800622
J. Richard Barnettee4af8b92013-05-01 13:16:12 -0700623 def _stage_image_for_update(self, image_name=None):
Chris Sosae92399e2015-04-24 11:32:59 -0700624 """Stage a build on a devserver and return the update_url and devserver.
Scott Zawalskieadbf702013-03-14 09:23:06 -0400625
626 @param image_name: a name like lumpy-release/R27-3837.0.0
Chris Sosae92399e2015-04-24 11:32:59 -0700627 @returns a tuple with an update URL like:
Scott Zawalskieadbf702013-03-14 09:23:06 -0400628 http://172.22.50.205:8082/update/lumpy-release/R27-3837.0.0
Chris Sosae92399e2015-04-24 11:32:59 -0700629 and the devserver instance.
Scott Zawalskieadbf702013-03-14 09:23:06 -0400630 """
J. Richard Barnettee4af8b92013-05-01 13:16:12 -0700631 if not image_name:
632 image_name = self.get_repair_image_name()
Chris Sosae92399e2015-04-24 11:32:59 -0700633
J. Richard Barnettee4af8b92013-05-01 13:16:12 -0700634 logging.info('Staging build for AU: %s', image_name)
Scott Zawalskieadbf702013-03-14 09:23:06 -0400635 devserver = dev_server.ImageServer.resolve(image_name)
636 devserver.trigger_download(image_name, synchronous=False)
Chris Sosae92399e2015-04-24 11:32:59 -0700637 return (tools.image_url_pattern() % (devserver.url(), image_name),
638 devserver)
Scott Zawalskieadbf702013-03-14 09:23:06 -0400639
640
J. Richard Barnettee4af8b92013-05-01 13:16:12 -0700641 def stage_image_for_servo(self, image_name=None):
642 """Stage a build on a devserver and return the update_url.
643
644 @param image_name: a name like lumpy-release/R27-3837.0.0
645 @returns an update URL like:
646 http://172.22.50.205:8082/update/lumpy-release/R27-3837.0.0
647 """
648 if not image_name:
649 image_name = self.get_repair_image_name()
650 logging.info('Staging build for servo install: %s', image_name)
651 devserver = dev_server.ImageServer.resolve(image_name)
652 devserver.stage_artifacts(image_name, ['test_image'])
653 return devserver.get_test_image_url(image_name)
654
655
beepse539be02013-07-31 21:57:39 -0700656 def stage_factory_image_for_servo(self, image_name):
657 """Stage a build on a devserver and return the update_url.
658
659 @param image_name: a name like <baord>/4262.204.0
beeps12c0a3c2013-09-03 11:58:27 -0700660
beepse539be02013-07-31 21:57:39 -0700661 @return: An update URL, eg:
662 http://<devserver>/static/canary-channel/\
663 <board>/4262.204.0/factory_test/chromiumos_factory_image.bin
beeps12c0a3c2013-09-03 11:58:27 -0700664
665 @raises: ValueError if the factory artifact name is missing from
666 the config.
667
beepse539be02013-07-31 21:57:39 -0700668 """
669 if not image_name:
670 logging.error('Need an image_name to stage a factory image.')
671 return
672
Dan Shib8540a52015-07-16 14:18:23 -0700673 factory_artifact = CONFIG.get_config_value(
beeps12c0a3c2013-09-03 11:58:27 -0700674 'CROS', 'factory_artifact', type=str, default='')
675 if not factory_artifact:
676 raise ValueError('Cannot retrieve the factory artifact name from '
677 'autotest config, and hence cannot stage factory '
678 'artifacts.')
679
beepse539be02013-07-31 21:57:39 -0700680 logging.info('Staging build for servo install: %s', image_name)
681 devserver = dev_server.ImageServer.resolve(image_name)
682 devserver.stage_artifacts(
683 image_name,
beeps12c0a3c2013-09-03 11:58:27 -0700684 [factory_artifact],
685 archive_url=None)
beepse539be02013-07-31 21:57:39 -0700686
687 return tools.factory_image_url_pattern() % (devserver.url(), image_name)
688
689
Chris Sosaa3ac2152012-05-23 22:23:13 -0700690 def machine_install(self, update_url=None, force_update=False,
Richard Barnette0b023a72015-04-24 16:07:30 +0000691 local_devserver=False, repair=False,
692 force_full_update=False):
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500693 """Install the DUT.
694
Dan Shi0f466e82013-02-22 15:44:58 -0800695 Use stateful update if the DUT is already running the same build.
696 Stateful update does not update kernel and tends to run much faster
697 than a full reimage. If the DUT is running a different build, or it
698 failed to do a stateful update, full update, including kernel update,
699 will be applied to the DUT.
700
Scott Zawalskieadbf702013-03-14 09:23:06 -0400701 Once a host enters machine_install its cros_version label will be
702 removed as well as its host attribute job_repo_url (used for
703 package install).
704
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500705 @param update_url: The url to use for the update
706 pattern: http://$devserver:###/update/$build
707 If update_url is None and repair is True we will install the
Dan Shi6964fa52014-12-18 11:04:27 -0800708 stable image listed in afe_stable_versions table. If the table
709 is not setup, global_config value under CROS.stable_cros_version
710 will be used instead.
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500711 @param force_update: Force an update even if the version installed
712 is the same. Default:False
Christopher Wiley6a4ff932015-05-15 14:00:47 -0700713 @param local_devserver: Used by test_that to allow people to
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500714 use their local devserver. Default: False
Chris Sosae92399e2015-04-24 11:32:59 -0700715 @param repair: Forces update to repair image. Implies force_update.
Fang Deng3d3b9272014-12-22 12:20:28 -0800716 @param force_full_update: If True, do not attempt to run stateful
717 update, force a full reimage. If False, try stateful update
718 first when the dut is already installed with the same version.
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500719 @raises autoupdater.ChromiumOSError
720
721 """
Chris Sosae92399e2015-04-24 11:32:59 -0700722 devserver = None
Richard Barnette0b023a72015-04-24 16:07:30 +0000723 if repair:
Chris Sosae92399e2015-04-24 11:32:59 -0700724 update_url, devserver = self._stage_image_for_update()
Richard Barnette0b023a72015-04-24 16:07:30 +0000725 force_update = True
Dan Shi0f466e82013-02-22 15:44:58 -0800726
Chris Sosae92399e2015-04-24 11:32:59 -0700727 if not update_url and not self._parser.options.image:
728 raise error.AutoservError(
729 'There is no update URL, nor a method to get one.')
730
731 if not update_url and self._parser.options.image:
732 # This is the base case where we have no given update URL i.e.
733 # dynamic suites logic etc. This is the most flexible case where we
734 # can serve an update from any of our fleet of devservers.
735 requested_build = self._parser.options.image
736 if not requested_build.startswith('http://'):
737 logging.debug('Update will be staged for this installation')
738 update_url, devserver = self._stage_image_for_update(
739 requested_build)
740 else:
741 update_url = requested_build
742
743 logging.debug('Update URL is %s', update_url)
744
Scott Zawalskieadbf702013-03-14 09:23:06 -0400745 # Remove cros-version and job_repo_url host attribute from host.
746 self.clear_cros_version_labels_and_job_repo_url()
Chris Sosae92399e2015-04-24 11:32:59 -0700747
748 update_complete = False
749 updater = autoupdater.ChromiumOSUpdater(
750 update_url, host=self, local_devserver=local_devserver)
Fang Deng3d3b9272014-12-22 12:20:28 -0800751 if not force_full_update:
752 try:
Chris Sosae92399e2015-04-24 11:32:59 -0700753 # If the DUT is already running the same build, try stateful
754 # update first as it's much quicker than a full re-image.
755 update_complete = self._try_stateful_update(
756 update_url, force_update, updater)
Fang Deng3d3b9272014-12-22 12:20:28 -0800757 except Exception as e:
758 logging.exception(e)
J. Richard Barnette45e93de2012-04-11 17:24:15 -0700759
Dan Shi0f466e82013-02-22 15:44:58 -0800760 inactive_kernel = None
Chris Sosae92399e2015-04-24 11:32:59 -0700761 if update_complete or (not force_update and updater.check_version()):
762 logging.info('Install complete without full update')
763 else:
764 logging.info('DUT requires full update.')
765 self.reboot(timeout=self.REBOOT_TIMEOUT, wait=True)
766 num_of_attempts = provision.FLAKY_DEVSERVER_ATTEMPTS
Chris Sosab7612bc2013-03-21 10:32:37 -0700767
Chris Sosae92399e2015-04-24 11:32:59 -0700768 while num_of_attempts > 0:
769 num_of_attempts -= 1
770 try:
771 updater.run_update()
772 except Exception:
773 logging.warn('Autoupdate did not complete.')
774 # Do additional check for the devserver health. Ideally,
775 # the autoupdater.py could raise an exception when it
776 # detected network flake but that would require
777 # instrumenting the update engine and parsing it log.
778 if (num_of_attempts <= 0 or
779 devserver is None or
780 dev_server.DevServer.devserver_healthy(
781 devserver.url())):
782 raise
J. Richard Barnette45e93de2012-04-11 17:24:15 -0700783
Chris Sosae92399e2015-04-24 11:32:59 -0700784 logging.warn('Devserver looks unhealthy. Trying another')
785 update_url, devserver = self._stage_image_for_update(
786 requested_build)
787 logging.debug('New Update URL is %s', update_url)
788 updater = autoupdater.ChromiumOSUpdater(
789 update_url, host=self,
790 local_devserver=local_devserver)
791 else:
792 break
J. Richard Barnette45e93de2012-04-11 17:24:15 -0700793
Chris Sosae92399e2015-04-24 11:32:59 -0700794 # Give it some time in case of IO issues.
795 time.sleep(10)
Dan Shi5699ac22014-12-19 10:55:49 -0800796
Chris Sosae92399e2015-04-24 11:32:59 -0700797 # Figure out active and inactive kernel.
798 active_kernel, inactive_kernel = updater.get_kernel_state()
Simran Basi13fa1ba2013-03-04 10:56:47 -0800799
Chris Sosae92399e2015-04-24 11:32:59 -0700800 # Ensure inactive kernel has higher priority than active.
801 if (updater.get_kernel_priority(inactive_kernel)
802 < updater.get_kernel_priority(active_kernel)):
803 raise autoupdater.ChromiumOSError(
804 'Update failed. The priority of the inactive kernel'
805 ' partition is less than that of the active kernel'
806 ' partition.')
807
808 # Updater has returned successfully; reboot the host.
809 self.reboot(timeout=self.REBOOT_TIMEOUT, wait=True)
810
811 self._post_update_processing(updater, inactive_kernel)
812 self.add_cros_version_labels_and_job_repo_url(
813 autoupdater.url_to_image_name(update_url))
J. Richard Barnette45e93de2012-04-11 17:24:15 -0700814
815
Dan Shi9cb0eec2014-06-03 09:04:50 -0700816 def _clear_fw_version_labels(self):
817 """Clear firmware version labels from the machine."""
818 labels = self._AFE.get_labels(
Dan Shi0723bf52015-06-24 10:52:38 -0700819 name__startswith=provision.FW_RW_VERSION_PREFIX,
Dan Shi9cb0eec2014-06-03 09:04:50 -0700820 host__hostname=self.hostname)
821 for label in labels:
822 label.remove_hosts(hosts=[self.hostname])
823
824
825 def _add_fw_version_label(self, build):
826 """Add firmware version label to the machine.
827
828 @param build: Build of firmware.
829
830 """
831 fw_label = provision.fw_version_to_label(build)
MK Ryu73be9862015-07-06 12:25:00 -0700832 self._AFE.run('label_add_hosts', id=fw_label, hosts=[self.hostname])
Dan Shi9cb0eec2014-06-03 09:04:50 -0700833
834
835 def firmware_install(self, build=None):
836 """Install firmware to the DUT.
837
838 Use stateful update if the DUT is already running the same build.
839 Stateful update does not update kernel and tends to run much faster
840 than a full reimage. If the DUT is running a different build, or it
841 failed to do a stateful update, full update, including kernel update,
842 will be applied to the DUT.
843
844 Once a host enters firmware_install its fw_version label will be
845 removed. After the firmware is updated successfully, a new fw_version
846 label will be added to the host.
847
848 @param build: The build version to which we want to provision the
849 firmware of the machine,
850 e.g. 'link-firmware/R22-2695.1.144'.
851
852 TODO(dshi): After bug 381718 is fixed, update here with corresponding
853 exceptions that could be raised.
854
855 """
856 if not self.servo:
857 raise error.TestError('Host %s does not have servo.' %
858 self.hostname)
859
860 # TODO(fdeng): use host.get_board() after
861 # crbug.com/271834 is fixed.
862 board = self._get_board_from_afe()
863
Chris Sosae92399e2015-04-24 11:32:59 -0700864 # If build is not set, try to install firmware from stable CrOS.
Dan Shi9cb0eec2014-06-03 09:04:50 -0700865 if not build:
866 build = self.get_repair_image_name()
867
868 config = FAFTConfig(board)
869 if config.use_u_boot:
870 ap_image = 'image-%s.bin' % board
871 else: # Depthcharge platform
872 ap_image = 'image.bin'
873 ec_image = 'ec.bin'
874 ds = dev_server.ImageServer.resolve(build)
875 ds.stage_artifacts(build, ['firmware'])
876
877 tmpd = autotemp.tempdir(unique_id='fwimage')
878 try:
879 fwurl = self._FW_IMAGE_URL_PATTERN % (ds.url(), build)
880 local_tarball = os.path.join(tmpd.name, os.path.basename(fwurl))
881 server_utils.system('wget -O %s %s' % (local_tarball, fwurl),
882 timeout=60)
883 server_utils.system('tar xf %s -C %s %s %s' %
884 (local_tarball, tmpd.name, ap_image, ec_image),
885 timeout=60)
886 server_utils.system('tar xf %s --wildcards -C %s "dts/*"' %
887 (local_tarball, tmpd.name),
888 timeout=60, ignore_status=True)
889
890 self._clear_fw_version_labels()
891 logging.info('Will re-program EC now')
892 self.servo.program_ec(os.path.join(tmpd.name, ec_image))
893 logging.info('Will re-program BIOS now')
894 self.servo.program_bios(os.path.join(tmpd.name, ap_image))
895 self.servo.get_power_state_controller().reset()
896 time.sleep(self.servo.BOOT_DELAY)
Dan Shia5fef052015-05-18 23:28:47 -0700897 self._add_fw_version_label(build)
Dan Shi9cb0eec2014-06-03 09:04:50 -0700898 finally:
899 tmpd.clean()
900
901
Dan Shi10e992b2013-08-30 11:02:59 -0700902 def show_update_engine_log(self):
903 """Output update engine log."""
MK Ryu35d661e2014-09-25 17:44:10 -0700904 logging.debug('Dumping %s', client_constants.UPDATE_ENGINE_LOG)
905 self.run('cat %s' % client_constants.UPDATE_ENGINE_LOG)
Dan Shi10e992b2013-08-30 11:02:59 -0700906
907
Richard Barnette82c35912012-11-20 10:09:10 -0800908 def _get_board_from_afe(self):
909 """Retrieve this host's board from its labels in the AFE.
910
911 Looks for a host label of the form "board:<board>", and
912 returns the "<board>" part of the label. `None` is returned
913 if there is not a single, unique label matching the pattern.
914
915 @returns board from label, or `None`.
916 """
Dan Shia1ecd5c2013-06-06 11:21:31 -0700917 return server_utils.get_board_from_afe(self.hostname, self._AFE)
Simran Basi833814b2013-01-29 13:13:43 -0800918
919
920 def get_build(self):
921 """Retrieve the current build for this Host from the AFE.
922
923 Looks through this host's labels in the AFE to determine its build.
924
925 @returns The current build or None if it could not find it or if there
926 were multiple build labels assigned to this host.
927 """
Dan Shia1ecd5c2013-06-06 11:21:31 -0700928 return server_utils.get_build_from_afe(self.hostname, self._AFE)
Richard Barnette82c35912012-11-20 10:09:10 -0800929
930
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500931 def _install_repair(self):
Chris Sosae92399e2015-04-24 11:32:59 -0700932 """Attempt to repair this host using the update-engine.
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500933
934 If the host is up, try installing the DUT with a stable
Dan Shi6964fa52014-12-18 11:04:27 -0800935 "repair" version of Chrome OS as defined in afe_stable_versions table.
936 If the table is not setup, global_config value under
937 CROS.stable_cros_version will be used instead.
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500938
Scott Zawalski62bacae2013-03-05 10:40:32 -0500939 @raises AutoservRepairMethodNA if the DUT is not reachable.
940 @raises ChromiumOSError if the install failed for some reason.
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500941
942 """
943 if not self.is_up():
Scott Zawalski62bacae2013-03-05 10:40:32 -0500944 raise error.AutoservRepairMethodNA('DUT unreachable for install.')
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500945 logging.info('Attempting to reimage machine to repair image.')
946 try:
Richard Barnette0b023a72015-04-24 16:07:30 +0000947 self.machine_install(repair=True)
Fang Dengd0672f32013-03-18 17:18:09 -0700948 except autoupdater.ChromiumOSError as e:
949 logging.exception(e)
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500950 logging.info('Repair via install failed.')
Scott Zawalski62bacae2013-03-05 10:40:32 -0500951 raise
Scott Zawalski89c44dd2013-02-26 09:28:02 -0500952
953
Dan Shi2c88eed2013-11-12 10:18:38 -0800954 def _install_repair_with_powerwash(self):
Dan Shi9cc48452013-11-12 12:39:26 -0800955 """Attempt to powerwash first then repair this host using update-engine.
Dan Shi2c88eed2013-11-12 10:18:38 -0800956
Dan Shi9cc48452013-11-12 12:39:26 -0800957 update-engine may fail due to a bad image. In such case, powerwash
958 may help to cleanup the DUT for update-engine to work again.
Dan Shi2c88eed2013-11-12 10:18:38 -0800959
960 @raises AutoservRepairMethodNA if the DUT is not reachable.
961 @raises ChromiumOSError if the install failed for some reason.
962
963 """
964 if not self.is_up():
965 raise error.AutoservRepairMethodNA('DUT unreachable for install.')
966
967 logging.info('Attempting to powerwash the DUT.')
968 self.run('echo "fast safe" > '
969 '/mnt/stateful_partition/factory_install_reset')
970 self.reboot(timeout=self.POWERWASH_BOOT_TIMEOUT, wait=True)
971 if not self.is_up():
Dan Shi9cc48452013-11-12 12:39:26 -0800972 logging.error('Powerwash failed. DUT did not come back after '
Dan Shi2c88eed2013-11-12 10:18:38 -0800973 'reboot.')
974 raise error.AutoservRepairFailure(
975 'DUT failed to boot from powerwash after %d seconds' %
976 self.POWERWASH_BOOT_TIMEOUT)
977
978 logging.info('Powerwash succeeded.')
979 self._install_repair()
980
981
beepsf079cfb2013-09-18 17:49:51 -0700982 def servo_install(self, image_url=None, usb_boot_timeout=USB_BOOT_TIMEOUT,
983 install_timeout=INSTALL_TIMEOUT):
Scott Zawalski62bacae2013-03-05 10:40:32 -0500984 """
985 Re-install the OS on the DUT by:
986 1) installing a test image on a USB storage device attached to the Servo
987 board,
Richard Barnette03a0c132012-11-05 12:40:35 -0800988 2) booting that image in recovery mode, and then
J. Richard Barnette31b2e312013-04-04 16:05:22 -0700989 3) installing the image with chromeos-install.
990
Scott Zawalski62bacae2013-03-05 10:40:32 -0500991 @param image_url: If specified use as the url to install on the DUT.
992 otherwise boot the currently staged image on the USB stick.
beepsf079cfb2013-09-18 17:49:51 -0700993 @param usb_boot_timeout: The usb_boot_timeout to use during reimage.
994 Factory images need a longer usb_boot_timeout than regular
995 cros images.
996 @param install_timeout: The timeout to use when installing the chromeos
997 image. Factory images need a longer install_timeout.
Richard Barnette03a0c132012-11-05 12:40:35 -0800998
Scott Zawalski62bacae2013-03-05 10:40:32 -0500999 @raises AutoservError if the image fails to boot.
beepsf079cfb2013-09-18 17:49:51 -07001000
J. Richard Barnette0199cc82014-12-05 17:08:40 -08001001 """
beepsf079cfb2013-09-18 17:49:51 -07001002 usb_boot_timer_key = ('servo_install.usb_boot_timeout_%s'
1003 % usb_boot_timeout)
1004 logging.info('Downloading image to USB, then booting from it. Usb boot '
1005 'timeout = %s', usb_boot_timeout)
Gabe Black1e1c41b2015-02-04 23:55:15 -08001006 timer = autotest_stats.Timer(usb_boot_timer_key)
beepsf079cfb2013-09-18 17:49:51 -07001007 timer.start()
J. Richard Barnette31b2e312013-04-04 16:05:22 -07001008 self.servo.install_recovery_image(image_url)
beepsf079cfb2013-09-18 17:49:51 -07001009 if not self.wait_up(timeout=usb_boot_timeout):
Scott Zawalski62bacae2013-03-05 10:40:32 -05001010 raise error.AutoservRepairFailure(
1011 'DUT failed to boot from USB after %d seconds' %
beepsf079cfb2013-09-18 17:49:51 -07001012 usb_boot_timeout)
1013 timer.stop()
Scott Zawalski62bacae2013-03-05 10:40:32 -05001014
Tom Wai-Hong Tamf6b4f812015-08-08 04:14:59 +08001015 # The new chromeos-tpm-recovery has been merged since R44-7073.0.0.
1016 # In old CrOS images, this command fails. Skip the error.
Tom Wai-Hong Tam27af7332015-07-25 06:09:39 +08001017 logging.info('Resetting the TPM status')
Tom Wai-Hong Tamf6b4f812015-08-08 04:14:59 +08001018 try:
1019 self.run('chromeos-tpm-recovery')
1020 except error.AutoservRunError:
1021 logging.warn('chromeos-tpm-recovery is too old.')
1022
Tom Wai-Hong Tam27af7332015-07-25 06:09:39 +08001023
beepsf079cfb2013-09-18 17:49:51 -07001024 install_timer_key = ('servo_install.install_timeout_%s'
1025 % install_timeout)
Gabe Black1e1c41b2015-02-04 23:55:15 -08001026 timer = autotest_stats.Timer(install_timer_key)
beepsf079cfb2013-09-18 17:49:51 -07001027 timer.start()
1028 logging.info('Installing image through chromeos-install.')
J. Richard Barnette2522a8f2015-03-04 15:59:15 -08001029 self.run('chromeos-install --yes',
MK Ryu35d661e2014-09-25 17:44:10 -07001030 timeout=install_timeout)
J. Richard Barnette0199cc82014-12-05 17:08:40 -08001031 self.run('halt')
beepsf079cfb2013-09-18 17:49:51 -07001032 timer.stop()
1033
1034 logging.info('Power cycling DUT through servo.')
J. Richard Barnette0199cc82014-12-05 17:08:40 -08001035 self.servo.get_power_state_controller().power_off()
Fang Dengafb88142013-05-30 17:44:31 -07001036 self.servo.switch_usbkey('off')
J. Richard Barnette0199cc82014-12-05 17:08:40 -08001037 # N.B. The Servo API requires that we use power_on() here
1038 # for two reasons:
1039 # 1) After turning on a DUT in recovery mode, you must turn
1040 # it off and then on with power_on() once more to
1041 # disable recovery mode (this is a Parrot specific
1042 # requirement).
1043 # 2) After power_off(), the only way to turn on is with
1044 # power_on() (this is a Storm specific requirement).
J. Richard Barnettefbcc7122013-07-24 18:24:59 -07001045 self.servo.get_power_state_controller().power_on()
beepsf079cfb2013-09-18 17:49:51 -07001046
1047 logging.info('Waiting for DUT to come back up.')
Richard Barnette03a0c132012-11-05 12:40:35 -08001048 if not self.wait_up(timeout=self.BOOT_TIMEOUT):
1049 raise error.AutoservError('DUT failed to reboot installed '
1050 'test image after %d seconds' %
Scott Zawalski62bacae2013-03-05 10:40:32 -05001051 self.BOOT_TIMEOUT)
1052
1053
J. Richard Barnettee4af8b92013-05-01 13:16:12 -07001054 def _servo_repair_reinstall(self):
Scott Zawalski62bacae2013-03-05 10:40:32 -05001055 """Reinstall the DUT utilizing servo and a test image.
1056
1057 Re-install the OS on the DUT by:
1058 1) installing a test image on a USB storage device attached to the Servo
1059 board,
Tom Wai-Hong Tam27af7332015-07-25 06:09:39 +08001060 2) booting that image in recovery mode,
1061 3) resetting the TPM status, and then
1062 4) installing the image with chromeos-install.
Scott Zawalski62bacae2013-03-05 10:40:32 -05001063
Scott Zawalski62bacae2013-03-05 10:40:32 -05001064 @raises AutoservRepairMethodNA if the device does not have servo
1065 support.
1066
1067 """
1068 if not self.servo:
1069 raise error.AutoservRepairMethodNA('Repair Reinstall NA: '
1070 'DUT has no servo support.')
1071
1072 logging.info('Attempting to recovery servo enabled device with '
1073 'servo_repair_reinstall')
1074
J. Richard Barnettee4af8b92013-05-01 13:16:12 -07001075 image_url = self.stage_image_for_servo()
Scott Zawalski62bacae2013-03-05 10:40:32 -05001076 self.servo_install(image_url)
1077
1078
1079 def _servo_repair_power(self):
1080 """Attempt to repair DUT using an attached Servo.
1081
1082 Attempt to power on the DUT via power_long_press.
1083
1084 @raises AutoservRepairMethodNA if the device does not have servo
1085 support.
1086 @raises AutoservRepairFailure if the repair fails for any reason.
1087 """
1088 if not self.servo:
1089 raise error.AutoservRepairMethodNA('Repair Power NA: '
1090 'DUT has no servo support.')
1091
1092 logging.info('Attempting to recover servo enabled device by '
1093 'powering it off and on.')
1094 self.servo.get_power_state_controller().power_off()
1095 self.servo.get_power_state_controller().power_on()
1096 if self.wait_up(self.BOOT_TIMEOUT):
1097 return
1098
1099 raise error.AutoservRepairFailure('DUT did not boot after long_press.')
Richard Barnette03a0c132012-11-05 12:40:35 -08001100
1101
Richard Barnette82c35912012-11-20 10:09:10 -08001102 def _powercycle_to_repair(self):
1103 """Utilize the RPM Infrastructure to bring the host back up.
1104
1105 If the host is not up/repaired after the first powercycle we utilize
1106 auto fallback to the last good install by powercycling and rebooting the
1107 host 6 times.
Scott Zawalski62bacae2013-03-05 10:40:32 -05001108
1109 @raises AutoservRepairMethodNA if the device does not support remote
1110 power.
1111 @raises AutoservRepairFailure if the repair fails for any reason.
1112
Richard Barnette82c35912012-11-20 10:09:10 -08001113 """
Scott Zawalski62bacae2013-03-05 10:40:32 -05001114 if not self.has_power():
1115 raise error.AutoservRepairMethodNA('Device does not support power.')
1116
Richard Barnette82c35912012-11-20 10:09:10 -08001117 logging.info('Attempting repair via RPM powercycle.')
1118 failed_cycles = 0
1119 self.power_cycle()
1120 while not self.wait_up(timeout=self.BOOT_TIMEOUT):
1121 failed_cycles += 1
1122 if failed_cycles >= self._MAX_POWER_CYCLE_ATTEMPTS:
Scott Zawalski62bacae2013-03-05 10:40:32 -05001123 raise error.AutoservRepairFailure(
1124 'Powercycled host %s %d times; device did not come back'
1125 ' online.' % (self.hostname, failed_cycles))
Richard Barnette82c35912012-11-20 10:09:10 -08001126 self.power_cycle()
1127 if failed_cycles == 0:
1128 logging.info('Powercycling was successful first time.')
1129 else:
1130 logging.info('Powercycling was successful after %d failures.',
1131 failed_cycles)
1132
1133
MK Ryu35d661e2014-09-25 17:44:10 -07001134 def _reboot_repair(self):
1135 """SSH to this host and reboot."""
1136 if not self.is_up(self._CHECK_HOST_UP_TIMEOUT_SECS):
1137 raise error.AutoservRepairMethodNA('DUT unreachable for reboot.')
1138 logging.info('Attempting repair via SSH reboot.')
1139 self.reboot(timeout=self.BOOT_TIMEOUT, wait=True)
1140
1141
Prashanth B4d8184f2014-05-05 12:22:02 -07001142 def check_device(self):
1143 """Check if a device is ssh-able, and if so, clean and verify it.
1144
1145 @raise AutoservSSHTimeout: If the ssh ping times out.
1146 @raise AutoservSshPermissionDeniedError: If ssh ping fails due to
1147 permissions.
1148 @raise AutoservSshPingHostError: For other AutoservRunErrors during
1149 ssh_ping.
1150 @raises AutoservError: As appropriate, during cleanup and verify.
1151 """
1152 self.ssh_ping()
1153 self.cleanup()
1154 self.verify()
1155
1156
Richard Barnette82c35912012-11-20 10:09:10 -08001157 def repair_full(self):
1158 """Repair a host for repair level NO_PROTECTION.
1159
1160 This overrides the base class function for repair; it does
1161 not call back to the parent class, but instead offers a
1162 simplified implementation based on the capabilities in the
1163 Chrome OS test lab.
1164
Fang Deng5d518f42013-08-02 14:04:32 -07001165 It first verifies and repairs servo if it is a DUT in CrOS
Fang Deng03590af2013-10-07 17:34:20 -07001166 lab and a servo is attached.
Fang Deng5d518f42013-08-02 14:04:32 -07001167
Jakob Juelich82b7d1c2014-09-15 16:10:57 -07001168 This escalates in order through the following procedures and verifies
1169 the status using `self.check_device()` after each of them. This is done
1170 until both the repair and the veryfing step succeed.
1171
MK Ryu35d661e2014-09-25 17:44:10 -07001172 Escalation order of repair procedures from less intrusive to
1173 more intrusive repairs:
1174 1. SSH to the DUT and reboot.
Scott Zawalski62bacae2013-03-05 10:40:32 -05001175 2. If there's a servo for the DUT, try to power the DUT off and
1176 on.
MK Ryu35d661e2014-09-25 17:44:10 -07001177 3. If the DUT can be power-cycled via RPM, try to repair
Richard Barnette82c35912012-11-20 10:09:10 -08001178 by power-cycling.
MK Ryu35d661e2014-09-25 17:44:10 -07001179 4. Try to re-install to a known stable image using
1180 auto-update.
1181 5. If there's a servo for the DUT, try to re-install via
1182 the servo.
Richard Barnette82c35912012-11-20 10:09:10 -08001183
1184 As with the parent method, the last operation performed on
Prashanth B4d8184f2014-05-05 12:22:02 -07001185 the DUT must be to call `self.check_device()`; If that call fails the
1186 exception it raises is passed back to the caller.
J. Richard Barnettefde55fc2013-03-15 17:47:01 -07001187
Scott Zawalski62bacae2013-03-05 10:40:32 -05001188 @raises AutoservRepairTotalFailure if the repair process fails to
1189 fix the DUT.
Fang Deng5d518f42013-08-02 14:04:32 -07001190 @raises ServoHostRepairTotalFailure if the repair process fails to
1191 fix the servo host if one is attached to the DUT.
1192 @raises AutoservSshPermissionDeniedError if it is unable
1193 to ssh to the servo host due to permission error.
1194
Richard Barnette82c35912012-11-20 10:09:10 -08001195 """
Jakob Juelich82b7d1c2014-09-15 16:10:57 -07001196 # Caution: Deleting shards relies on repair to always reboot the DUT.
1197
Dan Shi4d478522014-02-14 13:46:32 -08001198 if self._servo_host and not self.servo:
Fang Deng03590af2013-10-07 17:34:20 -07001199 try:
Dan Shi4d478522014-02-14 13:46:32 -08001200 self._servo_host.repair_full()
Fang Deng03590af2013-10-07 17:34:20 -07001201 except Exception as e:
Fang Deng03590af2013-10-07 17:34:20 -07001202 logging.error('Could not create a healthy servo: %s', e)
Dan Shi4d478522014-02-14 13:46:32 -08001203 self.servo = self._servo_host.get_servo()
Fang Deng5d518f42013-08-02 14:04:32 -07001204
MK Ryu35d661e2014-09-25 17:44:10 -07001205 self.try_collect_crashlogs()
1206
Scott Zawalski62bacae2013-03-05 10:40:32 -05001207 # TODO(scottz): This should use something similar to label_decorator,
1208 # but needs to be populated in order so DUTs are repaired with the
1209 # least amount of effort.
MK Ryu35d661e2014-09-25 17:44:10 -07001210 repair_funcs = [self._reboot_repair,
1211 self._servo_repair_power,
1212 self._powercycle_to_repair,
Dan Shi849a1c42014-03-05 11:10:43 -08001213 self._install_repair,
Dan Shi2c88eed2013-11-12 10:18:38 -08001214 self._install_repair_with_powerwash,
MK Ryu35d661e2014-09-25 17:44:10 -07001215 self._servo_repair_reinstall]
Scott Zawalski62bacae2013-03-05 10:40:32 -05001216 errors = []
Simran Basie6130932013-10-01 14:07:52 -07001217 board = self._get_board_from_afe()
Scott Zawalski62bacae2013-03-05 10:40:32 -05001218 for repair_func in repair_funcs:
1219 try:
1220 repair_func()
MK Ryu35d661e2014-09-25 17:44:10 -07001221 self.try_collect_crashlogs()
Prashanth B4d8184f2014-05-05 12:22:02 -07001222 self.check_device()
Gabe Black1e1c41b2015-02-04 23:55:15 -08001223 autotest_stats.Counter(
Simran Basie6130932013-10-01 14:07:52 -07001224 '%s.SUCCEEDED' % repair_func.__name__).increment()
1225 if board:
Gabe Black1e1c41b2015-02-04 23:55:15 -08001226 autotest_stats.Counter(
Dan Shib87c3aa2014-02-12 15:40:31 -08001227 '%s.%s.SUCCEEDED' % (repair_func.__name__,
Simran Basie6130932013-10-01 14:07:52 -07001228 board)).increment()
Scott Zawalski62bacae2013-03-05 10:40:32 -05001229 return
Simran Basie6130932013-10-01 14:07:52 -07001230 except error.AutoservRepairMethodNA as e:
Gabe Black1e1c41b2015-02-04 23:55:15 -08001231 autotest_stats.Counter(
Simran Basie6130932013-10-01 14:07:52 -07001232 '%s.RepairNA' % repair_func.__name__).increment()
1233 if board:
Gabe Black1e1c41b2015-02-04 23:55:15 -08001234 autotest_stats.Counter(
Dan Shib87c3aa2014-02-12 15:40:31 -08001235 '%s.%s.RepairNA' % (repair_func.__name__,
Simran Basie6130932013-10-01 14:07:52 -07001236 board)).increment()
Ilja H. Friedel04be2bd2014-05-07 21:29:59 -07001237 logging.warning('Repair function NA: %s', e)
Simran Basie6130932013-10-01 14:07:52 -07001238 errors.append(str(e))
Scott Zawalski62bacae2013-03-05 10:40:32 -05001239 except Exception as e:
Gabe Black1e1c41b2015-02-04 23:55:15 -08001240 autotest_stats.Counter(
Simran Basie6130932013-10-01 14:07:52 -07001241 '%s.FAILED' % repair_func.__name__).increment()
1242 if board:
Gabe Black1e1c41b2015-02-04 23:55:15 -08001243 autotest_stats.Counter(
Dan Shib87c3aa2014-02-12 15:40:31 -08001244 '%s.%s.FAILED' % (repair_func.__name__,
Simran Basie6130932013-10-01 14:07:52 -07001245 board)).increment()
Ilja H. Friedel04be2bd2014-05-07 21:29:59 -07001246 logging.warning('Failed to repair device: %s', e)
Scott Zawalski62bacae2013-03-05 10:40:32 -05001247 errors.append(str(e))
Scott Zawalski89c44dd2013-02-26 09:28:02 -05001248
Gabe Black1e1c41b2015-02-04 23:55:15 -08001249 autotest_stats.Counter('Full_Repair_Failed').increment()
Simran Basie6130932013-10-01 14:07:52 -07001250 if board:
Gabe Black1e1c41b2015-02-04 23:55:15 -08001251 autotest_stats.Counter(
Simran Basie6130932013-10-01 14:07:52 -07001252 'Full_Repair_Failed.%s' % board).increment()
Scott Zawalski62bacae2013-03-05 10:40:32 -05001253 raise error.AutoservRepairTotalFailure(
1254 'All attempts at repairing the device failed:\n%s' %
1255 '\n'.join(errors))
Richard Barnette82c35912012-11-20 10:09:10 -08001256
1257
MK Ryu35d661e2014-09-25 17:44:10 -07001258 def try_collect_crashlogs(self, check_host_up=True):
1259 """
1260 Check if a host is up and logs need to be collected from the host,
1261 if yes, collect them.
1262
1263 @param check_host_up: Flag for checking host is up. Default is True.
1264 """
1265 try:
1266 crash_job = self._need_crash_logs()
1267 if crash_job:
1268 logging.debug('%s: Job %s was crashed', self._CRASHLOGS_PREFIX,
1269 crash_job)
1270 if not check_host_up or self.is_up(
1271 self._CHECK_HOST_UP_TIMEOUT_SECS):
1272 self._collect_crashlogs(crash_job)
1273 logging.debug('%s: Completed collecting logs for the '
1274 'crashed job %s', self._CRASHLOGS_PREFIX,
1275 crash_job)
1276 except Exception as e:
1277 # Exception should not result in repair failure.
1278 # Therefore, suppress all exceptions here.
1279 logging.error('%s: Failed while trying to collect crash-logs: %s',
1280 self._CRASHLOGS_PREFIX, e)
1281
1282
1283 def _need_crash_logs(self):
1284 """Get the value of need_crash_logs attribute of this host.
1285
1286 @return: Value string of need_crash_logs attribute
1287 None if there is no need_crash_logs attribute
1288 """
1289 attrs = self._AFE.get_host_attribute(constants.CRASHLOGS_HOST_ATTRIBUTE,
1290 hostname=self.hostname)
1291 assert len(attrs) < 2
1292 return attrs[0].value if attrs else None
1293
1294
1295 def _collect_crashlogs(self, job_id):
1296 """Grab logs from the host where a job was crashed.
1297
1298 First, check if PRIOR_LOGS_DIR exists in the host.
1299 If yes, collect them.
1300 Otherwise, check if a lab-machine marker (_LAB_MACHINE_FILE) exists
1301 in the host.
1302 If yes, the host was repaired automatically, and we collect normal
1303 system logs.
1304
1305 @param job_id: Id of the job that was crashed.
1306 """
1307 crashlogs_dir = crashcollect.get_crashinfo_dir(self,
1308 constants.CRASHLOGS_DEST_DIR_PREFIX)
1309 flag_prior_logs = False
1310
1311 if self.path_exists(client_constants.PRIOR_LOGS_DIR):
1312 flag_prior_logs = True
1313 self._collect_prior_logs(crashlogs_dir)
1314 elif self.path_exists(self._LAB_MACHINE_FILE):
1315 self._collect_system_logs(crashlogs_dir)
1316 else:
1317 logging.warning('%s: Host was manually re-installed without '
1318 '--lab_preserve_log option. Skip collecting '
1319 'crash-logs.', self._CRASHLOGS_PREFIX)
1320
1321 # We make crash collection be one-time effort.
1322 # _collect_prior_logs() and _collect_system_logs() will not throw
1323 # any exception, and following codes will be executed even when
1324 # those methods fail.
1325 # _collect_crashlogs() is called only when the host is up (refer
1326 # to try_collect_crashlogs()). We assume _collect_prior_logs() and
1327 # _collect_system_logs() fail rarely when the host is up.
1328 # In addition, it is not clear how many times we should try crash
1329 # collection again while not triggering next repair unnecessarily.
1330 # Threfore, we try crash collection one time.
1331
1332 # Create a marker file as soon as log collection is done.
1333 # Leave the job id to this marker for gs_offloader to consume.
1334 marker_file = os.path.join(crashlogs_dir, constants.CRASHLOGS_MARKER)
1335 with open(marker_file, 'a') as f:
1336 f.write('%s\n' % job_id)
1337
1338 # Remove need_crash_logs attribute
1339 logging.debug('%s: Remove attribute need_crash_logs from host %s',
1340 self._CRASHLOGS_PREFIX, self.hostname)
1341 self._AFE.set_host_attribute(constants.CRASHLOGS_HOST_ATTRIBUTE,
1342 None, hostname=self.hostname)
1343
1344 if flag_prior_logs:
1345 logging.debug('%s: Remove %s from host %s', self._CRASHLOGS_PREFIX,
1346 client_constants.PRIOR_LOGS_DIR, self.hostname)
1347 self.run('rm -rf %s; sync' % client_constants.PRIOR_LOGS_DIR)
1348 # Wait for a few seconds to make sure the prior command is
1349 # done deep through storage.
1350 time.sleep(self._SAFE_WAIT_SECS)
1351
1352
1353 def _collect_prior_logs(self, crashlogs_dir):
1354 """Grab prior logs that were stashed before re-installing a host.
1355
1356 @param crashlogs_dir: Directory path where crash-logs are stored.
1357 """
1358 logging.debug('%s: Found %s, collecting them...',
1359 self._CRASHLOGS_PREFIX, client_constants.PRIOR_LOGS_DIR)
1360 try:
1361 self.collect_logs(client_constants.PRIOR_LOGS_DIR,
1362 crashlogs_dir, False)
1363 logging.debug('%s: %s is collected',
1364 self._CRASHLOGS_PREFIX, client_constants.PRIOR_LOGS_DIR)
1365 except Exception as e:
1366 logging.error('%s: Failed to collect %s: %s',
1367 self._CRASHLOGS_PREFIX, client_constants.PRIOR_LOGS_DIR,
1368 e)
1369
1370
1371 def _collect_system_logs(self, crashlogs_dir):
1372 """Grab normal system logs from a host.
1373
1374 @param crashlogs_dir: Directory path where crash-logs are stored.
1375 """
1376 logging.debug('%s: Found %s, collecting system logs...',
1377 self._CRASHLOGS_PREFIX, self._LAB_MACHINE_FILE)
1378 sources = server_utils.parse_simple_config(self._LOGS_TO_COLLECT_FILE)
1379 for src in sources:
1380 try:
1381 if self.path_exists(src):
1382 logging.debug('%s: Collecting %s...',
1383 self._CRASHLOGS_PREFIX, src)
1384 dest = server_utils.concat_path_except_last(
1385 crashlogs_dir, src)
1386 self.collect_logs(src, dest, False)
1387 logging.debug('%s: %s is collected',
1388 self._CRASHLOGS_PREFIX, src)
1389 except Exception as e:
1390 logging.error('%s: Failed to collect %s: %s',
1391 self._CRASHLOGS_PREFIX, src, e)
1392
1393
J. Richard Barnette1d78b012012-05-15 13:56:30 -07001394 def close(self):
beeps32a63082013-08-22 14:02:29 -07001395 self.rpc_disconnect_all()
Fang Deng0ca40e22013-08-27 17:47:44 -07001396 super(CrosHost, self).close()
J. Richard Barnette1d78b012012-05-15 13:56:30 -07001397
1398
Dan Shi49ca0932014-11-14 11:22:27 -08001399 def get_power_supply_info(self):
1400 """Get the output of power_supply_info.
1401
1402 power_supply_info outputs the info of each power supply, e.g.,
1403 Device: Line Power
1404 online: no
1405 type: Mains
1406 voltage (V): 0
1407 current (A): 0
1408 Device: Battery
1409 state: Discharging
1410 percentage: 95.9276
1411 technology: Li-ion
1412
1413 Above output shows two devices, Line Power and Battery, with details of
1414 each device listed. This function parses the output into a dictionary,
1415 with key being the device name, and value being a dictionary of details
1416 of the device info.
1417
1418 @return: The dictionary of power_supply_info, e.g.,
1419 {'Line Power': {'online': 'yes', 'type': 'main'},
1420 'Battery': {'vendor': 'xyz', 'percentage': '100'}}
Dan Shie9b765d2014-12-29 16:59:49 -08001421 @raise error.AutoservRunError if power_supply_info tool is not found in
1422 the DUT. Caller should handle this error to avoid false failure
1423 on verification.
Dan Shi49ca0932014-11-14 11:22:27 -08001424 """
1425 result = self.run('power_supply_info').stdout.strip()
1426 info = {}
1427 device_name = None
1428 device_info = {}
1429 for line in result.split('\n'):
1430 pair = [v.strip() for v in line.split(':')]
1431 if len(pair) != 2:
1432 continue
1433 if pair[0] == 'Device':
1434 if device_name:
1435 info[device_name] = device_info
1436 device_name = pair[1]
1437 device_info = {}
1438 else:
1439 device_info[pair[0]] = pair[1]
1440 if device_name and not device_name in info:
1441 info[device_name] = device_info
1442 return info
1443
1444
1445 def get_battery_percentage(self):
1446 """Get the battery percentage.
1447
1448 @return: The percentage of battery level, value range from 0-100. Return
1449 None if the battery info cannot be retrieved.
1450 """
1451 try:
1452 info = self.get_power_supply_info()
1453 logging.info(info)
1454 return float(info['Battery']['percentage'])
Dan Shie9b765d2014-12-29 16:59:49 -08001455 except (KeyError, ValueError, error.AutoservRunError):
Dan Shi49ca0932014-11-14 11:22:27 -08001456 return None
1457
1458
1459 def is_ac_connected(self):
1460 """Check if the dut has power adapter connected and charging.
1461
1462 @return: True if power adapter is connected and charging.
1463 """
1464 try:
1465 info = self.get_power_supply_info()
1466 return info['Line Power']['online'] == 'yes'
Dan Shie9b765d2014-12-29 16:59:49 -08001467 except (KeyError, error.AutoservRunError):
1468 return None
Dan Shi49ca0932014-11-14 11:22:27 -08001469
1470
Simran Basi5e6339a2013-03-21 11:34:32 -07001471 def _cleanup_poweron(self):
1472 """Special cleanup method to make sure hosts always get power back."""
1473 afe = frontend_wrappers.RetryingAFE(timeout_min=5, delay_sec=10)
1474 hosts = afe.get_hosts(hostname=self.hostname)
1475 if not hosts or not (self._RPM_OUTLET_CHANGED in
1476 hosts[0].attributes):
1477 return
1478 logging.debug('This host has recently interacted with the RPM'
1479 ' Infrastructure. Ensuring power is on.')
1480 try:
1481 self.power_on()
Dan Shi7dca56e2014-11-11 17:07:56 -08001482 afe.set_host_attribute(self._RPM_OUTLET_CHANGED, None,
1483 hostname=self.hostname)
Simran Basi5e6339a2013-03-21 11:34:32 -07001484 except rpm_client.RemotePowerException:
Simran Basi5e6339a2013-03-21 11:34:32 -07001485 logging.error('Failed to turn Power On for this host after '
1486 'cleanup through the RPM Infrastructure.')
Gabe Blackb72f4fb2015-01-20 16:47:13 -08001487 autotest_es.post(
Dan Shi7dca56e2014-11-11 17:07:56 -08001488 type_str='RPM_poweron_failure',
1489 metadata={'hostname': self.hostname})
Dan Shi49ca0932014-11-14 11:22:27 -08001490
1491 battery_percentage = self.get_battery_percentage()
Dan Shif01ebe22014-12-05 13:10:57 -08001492 if battery_percentage and battery_percentage < 50:
Dan Shi49ca0932014-11-14 11:22:27 -08001493 raise
1494 elif self.is_ac_connected():
1495 logging.info('The device has power adapter connected and '
1496 'charging. No need to try to turn RPM on '
1497 'again.')
1498 afe.set_host_attribute(self._RPM_OUTLET_CHANGED, None,
1499 hostname=self.hostname)
1500 logging.info('Battery level is now at %s%%. The device may '
1501 'still have enough power to run test, so no '
1502 'exception will be raised.', battery_percentage)
1503
Simran Basi5e6339a2013-03-21 11:34:32 -07001504
beepsc87ff602013-07-31 21:53:00 -07001505 def _is_factory_image(self):
1506 """Checks if the image on the DUT is a factory image.
1507
1508 @return: True if the image on the DUT is a factory image.
1509 False otherwise.
1510 """
1511 result = self.run('[ -f /root/.factory_test ]', ignore_status=True)
1512 return result.exit_status == 0
1513
1514
1515 def _restart_ui(self):
J. Richard Barnette84890bd2014-02-21 11:05:47 -08001516 """Restart the Chrome UI.
beepsc87ff602013-07-31 21:53:00 -07001517
1518 @raises: FactoryImageCheckerException for factory images, since
1519 we cannot attempt to restart ui on them.
1520 error.AutoservRunError for any other type of error that
1521 occurs while restarting ui.
1522 """
1523 if self._is_factory_image():
Dan Shi549fb822015-03-24 18:01:11 -07001524 raise FactoryImageCheckerException('Cannot restart ui on factory '
1525 'images')
beepsc87ff602013-07-31 21:53:00 -07001526
J. Richard Barnette84890bd2014-02-21 11:05:47 -08001527 # TODO(jrbarnette): The command to stop/start the ui job
1528 # should live inside cros_ui, too. However that would seem
1529 # to imply interface changes to the existing start()/restart()
1530 # functions, which is a bridge too far (for now).
J. Richard Barnette6069aa12015-06-08 09:10:24 -07001531 prompt = cros_ui.get_chrome_session_ident(self)
J. Richard Barnette84890bd2014-02-21 11:05:47 -08001532 self.run('stop ui; start ui')
1533 cros_ui.wait_for_chrome_ready(prompt, self)
beepsc87ff602013-07-31 21:53:00 -07001534
1535
Dan Shi549fb822015-03-24 18:01:11 -07001536 def get_release_version(self):
1537 """Get the value of attribute CHROMEOS_RELEASE_VERSION from lsb-release.
1538
1539 @returns The version string in lsb-release, under attribute
1540 CHROMEOS_RELEASE_VERSION.
1541 """
1542 lsb_release_content = self.run(
1543 'cat "%s"' % client_constants.LSB_RELEASE).stdout.strip()
1544 return lsbrelease_utils.get_chromeos_release_version(
1545 lsb_release_content=lsb_release_content)
1546
1547
1548 def verify_cros_version_label(self):
1549 """ Make sure host's cros-version label match the actual image in dut.
1550
1551 Remove any cros-version: label that doesn't match that installed in
1552 the dut.
1553
1554 @param raise_error: Set to True to raise exception if any mismatch found
1555
1556 @raise error.AutoservError: If any mismatch between cros-version label
1557 and the build installed in dut is found.
1558 """
1559 labels = self._AFE.get_labels(
1560 name__startswith=ds_constants.VERSION_PREFIX,
1561 host__hostname=self.hostname)
1562 mismatch_found = False
1563 if labels:
1564 # Get CHROMEOS_RELEASE_VERSION from lsb-release, e.g., 6908.0.0.
1565 # Note that it's different from cros-version label, which has
1566 # builder and branch info, e.g.,
1567 # cros-version:peppy-release/R43-6908.0.0
1568 release_version = self.get_release_version()
1569 host_list = [self.hostname]
1570 for label in labels:
1571 # Remove any cros-version label that does not match
1572 # release_version.
1573 build_version = label.name[len(ds_constants.VERSION_PREFIX):]
1574 if not utils.version_match(build_version, release_version):
1575 logging.warn('cros-version label "%s" does not match '
1576 'release version %s. Removing the label.',
1577 label.name, release_version)
1578 label.remove_hosts(hosts=host_list)
1579 mismatch_found = True
1580 if mismatch_found:
Dan Shi1057bae2015-03-30 11:35:09 -07001581 autotest_es.post(use_http=True,
1582 type_str='cros_version_label_mismatch',
1583 metadata={'hostname': self.hostname})
Dan Shi549fb822015-03-24 18:01:11 -07001584 raise error.AutoservError('The host has wrong cros-version label.')
1585
1586
beepsc87ff602013-07-31 21:53:00 -07001587 def cleanup(self):
MK Ryu35d661e2014-09-25 17:44:10 -07001588 self.run('rm -f %s' % client_constants.CLEANUP_LOGS_PAUSED_FILE)
Scott Zawalskiddbc31e2012-11-15 11:29:01 -05001589 try:
beepsc87ff602013-07-31 21:53:00 -07001590 self._restart_ui()
1591 except (error.AutotestRunError, error.AutoservRunError,
1592 FactoryImageCheckerException):
Ilja H. Friedel04be2bd2014-05-07 21:29:59 -07001593 logging.warning('Unable to restart ui, rebooting device.')
Scott Zawalskiddbc31e2012-11-15 11:29:01 -05001594 # Since restarting the UI fails fall back to normal Autotest
1595 # cleanup routines, i.e. reboot the machine.
Fang Deng0ca40e22013-08-27 17:47:44 -07001596 super(CrosHost, self).cleanup()
Simran Basi5e6339a2013-03-21 11:34:32 -07001597 # Check if the rpm outlet was manipulated.
Simran Basid5e5e272012-09-24 15:23:59 -07001598 if self.has_power():
Simran Basi5e6339a2013-03-21 11:34:32 -07001599 self._cleanup_poweron()
Dan Shi549fb822015-03-24 18:01:11 -07001600 self.verify_cros_version_label()
J. Richard Barnette45e93de2012-04-11 17:24:15 -07001601
1602
Yu-Ju Honga2be94a2012-07-31 09:48:52 -07001603 def reboot(self, **dargs):
1604 """
1605 This function reboots the site host. The more generic
1606 RemoteHost.reboot() performs sync and sleeps for 5
1607 seconds. This is not necessary for Chrome OS devices as the
1608 sync should be finished in a short time during the reboot
1609 command.
1610 """
Tom Wai-Hong Tamf5cd1d42012-08-13 12:04:08 +08001611 if 'reboot_cmd' not in dargs:
Doug Anderson7d5aeb22014-02-27 15:12:17 -08001612 reboot_timeout = dargs.get('reboot_timeout', 10)
1613 dargs['reboot_cmd'] = ('((reboot & sleep %d; reboot -f &)'
1614 ' </dev/null >/dev/null 2>&1 &)' %
1615 reboot_timeout)
Yu-Ju Honga2be94a2012-07-31 09:48:52 -07001616 # Enable fastsync to avoid running extra sync commands before reboot.
Tom Wai-Hong Tamf5cd1d42012-08-13 12:04:08 +08001617 if 'fastsync' not in dargs:
1618 dargs['fastsync'] = True
Michael Liangda8c60a2014-06-03 13:24:51 -07001619
Charlie Mooneya8e6dab2014-05-29 14:37:55 -07001620 # For purposes of logging reboot times:
1621 # Get the board name i.e. 'daisy_spring'
Michael Liangca4f5a62014-07-10 15:45:13 -07001622 board_fullname = self.get_board()
1623
1624 # Strip the prefix and add it to dargs.
1625 dargs['board'] = board_fullname[board_fullname.find(':')+1:]
Fang Deng0ca40e22013-08-27 17:47:44 -07001626 super(CrosHost, self).reboot(**dargs)
Yu-Ju Honga2be94a2012-07-31 09:48:52 -07001627
1628
Gwendal Grignou7a61d2f2014-05-23 11:05:51 -07001629 def suspend(self, **dargs):
1630 """
1631 This function suspends the site host.
1632 """
1633 suspend_time = dargs.get('suspend_time', 60)
1634 dargs['timeout'] = suspend_time
1635 if 'suspend_cmd' not in dargs:
1636 cmd = ' && '.join(['echo 0 > /sys/class/rtc/rtc0/wakealarm',
1637 'echo +%d > /sys/class/rtc/rtc0/wakealarm' % suspend_time,
1638 'powerd_dbus_suspend --delay=0 &'])
1639 dargs['suspend_cmd'] = ('(( %s )'
1640 '< /dev/null >/dev/null 2>&1 &)' % cmd)
1641 super(CrosHost, self).suspend(**dargs)
1642
1643
Simran Basiec564392014-08-25 16:48:09 -07001644 def upstart_status(self, service_name):
1645 """Check the status of an upstart init script.
1646
1647 @param service_name: Service to look up.
1648
1649 @returns True if the service is running, False otherwise.
1650 """
1651 return self.run('status %s | grep start/running' %
1652 service_name).stdout.strip() != ''
1653
1654
J. Richard Barnette45e93de2012-04-11 17:24:15 -07001655 def verify_software(self):
Richard Barnetteb2bc13c2013-01-08 17:32:51 -08001656 """Verify working software on a Chrome OS system.
J. Richard Barnette45e93de2012-04-11 17:24:15 -07001657
Richard Barnetteb2bc13c2013-01-08 17:32:51 -08001658 Tests for the following conditions:
1659 1. All conditions tested by the parent version of this
1660 function.
1661 2. Sufficient space in /mnt/stateful_partition.
Fang Deng6b05f5b2013-03-20 13:42:11 -07001662 3. Sufficient space in /mnt/stateful_partition/encrypted.
1663 4. update_engine answers a simple status request over DBus.
J. Richard Barnette45e93de2012-04-11 17:24:15 -07001664
J. Richard Barnette45e93de2012-04-11 17:24:15 -07001665 """
MK Ryu35d661e2014-09-25 17:44:10 -07001666 # Check if a job was crashed on this host.
1667 # If yes, avoid verification until crash-logs are collected.
1668 if self._need_crash_logs():
1669 raise error.AutoservCrashLogCollectRequired(
1670 'Need to collect crash-logs before verification')
1671
Fang Deng0ca40e22013-08-27 17:47:44 -07001672 super(CrosHost, self).verify_software()
Dan Shib8540a52015-07-16 14:18:23 -07001673 default_kilo_inodes_required = CONFIG.get_config_value(
1674 'SERVER', 'kilo_inodes_required', type=int, default=100)
1675 board = self.get_board().replace(ds_constants.BOARD_PREFIX, '')
1676 kilo_inodes_required = CONFIG.get_config_value(
1677 'SERVER', 'kilo_inodes_required_%s' % board,
1678 type=int, default=default_kilo_inodes_required)
1679 self.check_inodes('/mnt/stateful_partition', kilo_inodes_required)
J. Richard Barnette45e93de2012-04-11 17:24:15 -07001680 self.check_diskspace(
1681 '/mnt/stateful_partition',
Dan Shib8540a52015-07-16 14:18:23 -07001682 CONFIG.get_config_value(
Fang Deng6b05f5b2013-03-20 13:42:11 -07001683 'SERVER', 'gb_diskspace_required', type=float,
1684 default=20.0))
Gaurav Shahe448af82014-06-19 15:18:59 -07001685 encrypted_stateful_path = '/mnt/stateful_partition/encrypted'
1686 # Not all targets build with encrypted stateful support.
1687 if self.path_exists(encrypted_stateful_path):
1688 self.check_diskspace(
1689 encrypted_stateful_path,
Dan Shib8540a52015-07-16 14:18:23 -07001690 CONFIG.get_config_value(
Gaurav Shahe448af82014-06-19 15:18:59 -07001691 'SERVER', 'gb_encrypted_diskspace_required', type=float,
1692 default=0.1))
beepsc87ff602013-07-31 21:53:00 -07001693
Simran Basiec564392014-08-25 16:48:09 -07001694 if not self.upstart_status('system-services'):
Prashanth B5d0a0512014-04-25 12:26:08 -07001695 raise error.AutoservError('Chrome failed to reach login. '
1696 'System services not running.')
1697
beepsc87ff602013-07-31 21:53:00 -07001698 # Factory images don't run update engine,
1699 # goofy controls dbus on these DUTs.
1700 if not self._is_factory_image():
1701 self.run('update_engine_client --status')
Scott Zawalskifbca4a92013-03-04 15:56:42 -05001702 # Makes sure python is present, loads and can use built in functions.
1703 # We have seen cases where importing cPickle fails with undefined
1704 # symbols in cPickle.so.
1705 self.run('python -c "import cPickle"')
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07001706
Dan Shi549fb822015-03-24 18:01:11 -07001707 self.verify_cros_version_label()
1708
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07001709
Dan Shi49ca0932014-11-14 11:22:27 -08001710 def verify_hardware(self):
1711 """Verify hardware system of a Chrome OS system.
1712
1713 Check following hardware conditions:
1714 1. Battery level.
1715 2. Is power adapter connected.
1716 """
1717 logging.info('Battery percentage: %s', self.get_battery_percentage())
Dan Shie9b765d2014-12-29 16:59:49 -08001718 if self.is_ac_connected() is None:
1719 logging.info('Can not determine if the device has power adapter '
1720 'connected.')
1721 else:
1722 logging.info('Device %s power adapter connected and charging.',
1723 'has' if self.is_ac_connected() else 'does not have')
Dan Shi49ca0932014-11-14 11:22:27 -08001724
1725
Fang Deng96667ca2013-08-01 17:46:18 -07001726 def make_ssh_command(self, user='root', port=22, opts='', hosts_file=None,
1727 connect_timeout=None, alive_interval=None):
1728 """Override default make_ssh_command to use options tuned for Chrome OS.
1729
1730 Tuning changes:
1731 - ConnectTimeout=30; maximum of 30 seconds allowed for an SSH
1732 connection failure. Consistency with remote_access.sh.
1733
Samuel Tan2ce155b2015-06-23 18:24:38 -07001734 - ServerAliveInterval=900; which causes SSH to ping connection every
1735 900 seconds. In conjunction with ServerAliveCountMax ensures
1736 that if the connection dies, Autotest will bail out.
Fang Deng96667ca2013-08-01 17:46:18 -07001737 Originally tried 60 secs, but saw frequent job ABORTS where
Samuel Tan2ce155b2015-06-23 18:24:38 -07001738 the test completed successfully. Later increased from 180 seconds to
1739 900 seconds to account for tests where the DUT is suspended for
1740 longer periods of time.
Fang Deng96667ca2013-08-01 17:46:18 -07001741
1742 - ServerAliveCountMax=3; consistency with remote_access.sh.
1743
1744 - ConnectAttempts=4; reduce flakiness in connection errors;
1745 consistency with remote_access.sh.
1746
1747 - UserKnownHostsFile=/dev/null; we don't care about the keys.
1748 Host keys change with every new installation, don't waste
1749 memory/space saving them.
1750
1751 - SSH protocol forced to 2; needed for ServerAliveInterval.
1752
1753 @param user User name to use for the ssh connection.
1754 @param port Port on the target host to use for ssh connection.
1755 @param opts Additional options to the ssh command.
1756 @param hosts_file Ignored.
1757 @param connect_timeout Ignored.
1758 @param alive_interval Ignored.
1759 """
Aviv Keshetc5947fa2013-09-04 14:06:29 -07001760 base_command = ('/usr/bin/ssh -a -x %s %s %s'
1761 ' -o StrictHostKeyChecking=no'
Fang Deng96667ca2013-08-01 17:46:18 -07001762 ' -o UserKnownHostsFile=/dev/null -o BatchMode=yes'
Samuel Tan2ce155b2015-06-23 18:24:38 -07001763 ' -o ConnectTimeout=30 -o ServerAliveInterval=900'
Fang Deng96667ca2013-08-01 17:46:18 -07001764 ' -o ServerAliveCountMax=3 -o ConnectionAttempts=4'
1765 ' -o Protocol=2 -l %s -p %d')
Aviv Keshetc5947fa2013-09-04 14:06:29 -07001766 return base_command % (self._ssh_verbosity_flag, self._ssh_options,
1767 opts, user, port)
Fang Deng96667ca2013-08-01 17:46:18 -07001768
1769
beeps32a63082013-08-22 14:02:29 -07001770 def _create_ssh_tunnel(self, port, local_port):
1771 """Create an ssh tunnel from local_port to port.
1772
1773 @param port: remote port on the host.
1774 @param local_port: local forwarding port.
1775
1776 @return: the tunnel process.
1777 """
1778 # Chrome OS on the target closes down most external ports
1779 # for security. We could open the port, but doing that
1780 # would conflict with security tests that check that only
1781 # expected ports are open. So, to get to the port on the
1782 # target we use an ssh tunnel.
1783 tunnel_options = '-n -N -q -L %d:localhost:%d' % (local_port, port)
1784 ssh_cmd = self.make_ssh_command(opts=tunnel_options)
1785 tunnel_cmd = '%s %s' % (ssh_cmd, self.hostname)
1786 logging.debug('Full tunnel command: %s', tunnel_cmd)
1787 tunnel_proc = subprocess.Popen(tunnel_cmd, shell=True, close_fds=True)
1788 logging.debug('Started ssh tunnel, local = %d'
1789 ' remote = %d, pid = %d',
1790 local_port, port, tunnel_proc.pid)
1791 return tunnel_proc
1792
1793
Christopher Wileydd181852013-10-10 19:56:58 -07001794 def _setup_rpc(self, port, command_name, remote_pid=None):
beeps32a63082013-08-22 14:02:29 -07001795 """Sets up a tunnel process and performs rpc connection book keeping.
1796
1797 This method assumes that xmlrpc and jsonrpc never conflict, since
1798 we can only either have an xmlrpc or a jsonrpc server listening on
1799 a remote port. As such, it enforces a single proxy->remote port
1800 policy, i.e if one starts a jsonrpc proxy/server from port A->B,
1801 and then tries to start an xmlrpc proxy forwarded to the same port,
1802 the xmlrpc proxy will override the jsonrpc tunnel process, however:
1803
1804 1. None of the methods on the xmlrpc proxy will work because
1805 the server listening on B is jsonrpc.
1806
1807 2. The xmlrpc client cannot initiate a termination of the JsonRPC
1808 server, as the only use case currently is goofy, which is tied to
1809 the factory image. It is much easier to handle a failed xmlrpc
1810 call on the client than it is to terminate goofy in this scenario,
1811 as doing the latter might leave the DUT in a hard to recover state.
1812
1813 With the current implementation newer rpc proxy connections will
1814 terminate the tunnel processes of older rpc connections tunneling
1815 to the same remote port. If methods are invoked on the client
1816 after this has happened they will fail with connection closed errors.
1817
1818 @param port: The remote forwarding port.
1819 @param command_name: The name of the remote process, to terminate
1820 using pkill.
1821
1822 @return A url that we can use to initiate the rpc connection.
1823 """
1824 self.rpc_disconnect(port)
1825 local_port = utils.get_unused_port()
1826 tunnel_proc = self._create_ssh_tunnel(port, local_port)
Christopher Wileydd181852013-10-10 19:56:58 -07001827 self._rpc_proxy_map[port] = (command_name, tunnel_proc, remote_pid)
beeps32a63082013-08-22 14:02:29 -07001828 return self._RPC_PROXY_URL % local_port
1829
1830
Christopher Wileyd78249a2013-03-01 13:05:31 -08001831 def xmlrpc_connect(self, command, port, command_name=None,
Yusuf Mohsinallyfff89d62013-11-18 16:34:07 -08001832 ready_test_name=None, timeout_seconds=10,
1833 logfile='/dev/null'):
J. Richard Barnette1d78b012012-05-15 13:56:30 -07001834 """Connect to an XMLRPC server on the host.
1835
1836 The `command` argument should be a simple shell command that
1837 starts an XMLRPC server on the given `port`. The command
1838 must not daemonize, and must terminate cleanly on SIGTERM.
1839 The command is started in the background on the host, and a
1840 local XMLRPC client for the server is created and returned
1841 to the caller.
1842
1843 Note that the process of creating an XMLRPC client makes no
1844 attempt to connect to the remote server; the caller is
1845 responsible for determining whether the server is running
1846 correctly, and is ready to serve requests.
1847
Christopher Wileyd78249a2013-03-01 13:05:31 -08001848 Optionally, the caller can pass ready_test_name, a string
1849 containing the name of a method to call on the proxy. This
1850 method should take no parameters and return successfully only
1851 when the server is ready to process client requests. When
1852 ready_test_name is set, xmlrpc_connect will block until the
1853 proxy is ready, and throw a TestError if the server isn't
1854 ready by timeout_seconds.
1855
beeps32a63082013-08-22 14:02:29 -07001856 If a server is already running on the remote port, this
1857 method will kill it and disconnect the tunnel process
1858 associated with the connection before establishing a new one,
1859 by consulting the rpc_proxy_map in rpc_disconnect.
1860
J. Richard Barnette1d78b012012-05-15 13:56:30 -07001861 @param command Shell command to start the server.
1862 @param port Port number on which the server is expected to
1863 be serving.
J. Richard Barnette7214e0b2013-02-06 15:20:49 -08001864 @param command_name String to use as input to `pkill` to
1865 terminate the XMLRPC server on the host.
Christopher Wileyd78249a2013-03-01 13:05:31 -08001866 @param ready_test_name String containing the name of a
1867 method defined on the XMLRPC server.
1868 @param timeout_seconds Number of seconds to wait
1869 for the server to become 'ready.' Will throw a
1870 TestFail error if server is not ready in time.
Yusuf Mohsinallyfff89d62013-11-18 16:34:07 -08001871 @param logfile Logfile to send output when running
1872 'command' argument.
Yusuf Mohsinally8d19e3c2013-11-21 14:25:45 -08001873
J. Richard Barnette1d78b012012-05-15 13:56:30 -07001874 """
Christopher Wileyc14f06a2013-10-16 13:55:39 -07001875 # Clean up any existing state. If the caller is willing
1876 # to believe their server is down, we ought to clean up
1877 # any tunnels we might have sitting around.
1878 self.rpc_disconnect(port)
J. Richard Barnette1d78b012012-05-15 13:56:30 -07001879 # Start the server on the host. Redirection in the command
1880 # below is necessary, because 'ssh' won't terminate until
1881 # background child processes close stdin, stdout, and
1882 # stderr.
Yusuf Mohsinallyfff89d62013-11-18 16:34:07 -08001883 remote_cmd = '%s </dev/null >%s 2>&1 & echo $!' % (command, logfile)
Christopher Wileydd181852013-10-10 19:56:58 -07001884 remote_pid = self.run(remote_cmd).stdout.rstrip('\n')
J. Richard Barnette1d78b012012-05-15 13:56:30 -07001885 logging.debug('Started XMLRPC server on host %s, pid = %s',
1886 self.hostname, remote_pid)
1887
Christopher Wileydd181852013-10-10 19:56:58 -07001888 # Tunnel through SSH to be able to reach that remote port.
1889 rpc_url = self._setup_rpc(port, command_name, remote_pid=remote_pid)
Christopher Wileyd78249a2013-03-01 13:05:31 -08001890 proxy = xmlrpclib.ServerProxy(rpc_url, allow_none=True)
Christopher Wileydd181852013-10-10 19:56:58 -07001891
Christopher Wileyd78249a2013-03-01 13:05:31 -08001892 if ready_test_name is not None:
J. Richard Barnette13eb7c02013-03-07 12:06:29 -08001893 # retry.retry logs each attempt; calculate delay_sec to
1894 # keep log spam to a dull roar.
Christopher Wiley0ed712b2013-04-09 15:25:12 -07001895 @retry.retry((socket.error,
1896 xmlrpclib.ProtocolError,
1897 httplib.BadStatusLine),
Chris Sosa65425082013-10-16 13:26:22 -07001898 timeout_min=timeout_seconds / 60.0,
1899 delay_sec=min(max(timeout_seconds / 20.0, 0.1), 1))
Christopher Wileyd78249a2013-03-01 13:05:31 -08001900 def ready_test():
1901 """ Call proxy.ready_test_name(). """
1902 getattr(proxy, ready_test_name)()
1903 successful = False
1904 try:
1905 logging.info('Waiting %d seconds for XMLRPC server '
1906 'to start.', timeout_seconds)
1907 ready_test()
1908 successful = True
Christopher Wileyd78249a2013-03-01 13:05:31 -08001909 finally:
1910 if not successful:
1911 logging.error('Failed to start XMLRPC server.')
beeps32a63082013-08-22 14:02:29 -07001912 self.rpc_disconnect(port)
Christopher Wileyd78249a2013-03-01 13:05:31 -08001913 logging.info('XMLRPC server started successfully.')
1914 return proxy
J. Richard Barnette1d78b012012-05-15 13:56:30 -07001915
J. Richard Barnette1d78b012012-05-15 13:56:30 -07001916
Jason Abeleb6f924f2013-11-13 16:01:54 -08001917 def syslog(self, message, tag='autotest'):
1918 """Logs a message to syslog on host.
1919
1920 @param message String message to log into syslog
1921 @param tag String tag prefix for syslog
1922
1923 """
1924 self.run('logger -t "%s" "%s"' % (tag, message))
1925
1926
beeps32a63082013-08-22 14:02:29 -07001927 def jsonrpc_connect(self, port):
1928 """Creates a jsonrpc proxy connection through an ssh tunnel.
1929
1930 This method exists to facilitate communication with goofy (which is
1931 the default system manager on all factory images) and as such, leaves
1932 most of the rpc server sanity checking to the caller. Unlike
1933 xmlrpc_connect, this method does not facilitate the creation of a remote
1934 jsonrpc server, as the only clients of this code are factory tests,
1935 for which the goofy system manager is built in to the image and starts
1936 when the target boots.
1937
1938 One can theoretically create multiple jsonrpc proxies all forwarded
1939 to the same remote port, provided the remote port has an rpc server
1940 listening. However, in doing so we stand the risk of leaking an
1941 existing tunnel process, so we always disconnect any older tunnels
1942 we might have through rpc_disconnect.
1943
1944 @param port: port on the remote host that is serving this proxy.
1945
1946 @return: The client proxy.
1947 """
1948 if not jsonrpclib:
1949 logging.warning('Jsonrpclib could not be imported. Check that '
1950 'site-packages contains jsonrpclib.')
1951 return None
1952
1953 proxy = jsonrpclib.jsonrpc.ServerProxy(self._setup_rpc(port, None))
1954
1955 logging.info('Established a jsonrpc connection through port %s.', port)
1956 return proxy
1957
1958
1959 def rpc_disconnect(self, port):
1960 """Disconnect from an RPC server on the host.
1961
1962 Terminates the remote RPC server previously started for
J. Richard Barnette1d78b012012-05-15 13:56:30 -07001963 the given `port`. Also closes the local ssh tunnel created
1964 for the connection to the host. This function does not
beeps32a63082013-08-22 14:02:29 -07001965 directly alter the state of a previously returned RPC
J. Richard Barnette1d78b012012-05-15 13:56:30 -07001966 client object; however disconnection will cause all
1967 subsequent calls to methods on the object to fail.
1968
1969 This function does nothing if requested to disconnect a port
beeps32a63082013-08-22 14:02:29 -07001970 that was not previously connected via _setup_rpc.
J. Richard Barnette1d78b012012-05-15 13:56:30 -07001971
1972 @param port Port number passed to a previous call to
beeps32a63082013-08-22 14:02:29 -07001973 `_setup_rpc()`.
J. Richard Barnette1d78b012012-05-15 13:56:30 -07001974 """
beeps32a63082013-08-22 14:02:29 -07001975 if port not in self._rpc_proxy_map:
J. Richard Barnette1d78b012012-05-15 13:56:30 -07001976 return
Christopher Wileydd181852013-10-10 19:56:58 -07001977 remote_name, tunnel_proc, remote_pid = self._rpc_proxy_map[port]
J. Richard Barnette1d78b012012-05-15 13:56:30 -07001978 if remote_name:
1979 # We use 'pkill' to find our target process rather than
1980 # a PID, because the host may have rebooted since
1981 # connecting, and we don't want to kill an innocent
1982 # process with the same PID.
1983 #
1984 # 'pkill' helpfully exits with status 1 if no target
1985 # process is found, for which run() will throw an
Simran Basid5e5e272012-09-24 15:23:59 -07001986 # exception. We don't want that, so we the ignore
J. Richard Barnette1d78b012012-05-15 13:56:30 -07001987 # status.
1988 self.run("pkill -f '%s'" % remote_name, ignore_status=True)
Christopher Wileydd181852013-10-10 19:56:58 -07001989 if remote_pid:
1990 logging.info('Waiting for RPC server "%s" shutdown',
1991 remote_name)
1992 start_time = time.time()
1993 while (time.time() - start_time <
1994 self._RPC_SHUTDOWN_TIMEOUT_SECONDS):
1995 running_processes = self.run(
1996 "pgrep -f '%s'" % remote_name,
1997 ignore_status=True).stdout.split()
1998 if not remote_pid in running_processes:
1999 logging.info('Shut down RPC server.')
2000 break
2001 time.sleep(self._RPC_SHUTDOWN_POLLING_PERIOD_SECONDS)
2002 else:
2003 raise error.TestError('Failed to shutdown RPC server %s' %
2004 remote_name)
J. Richard Barnette1d78b012012-05-15 13:56:30 -07002005
2006 if tunnel_proc.poll() is None:
2007 tunnel_proc.terminate()
2008 logging.debug('Terminated tunnel, pid %d', tunnel_proc.pid)
2009 else:
2010 logging.debug('Tunnel pid %d terminated early, status %d',
2011 tunnel_proc.pid, tunnel_proc.returncode)
beeps32a63082013-08-22 14:02:29 -07002012 del self._rpc_proxy_map[port]
J. Richard Barnette1d78b012012-05-15 13:56:30 -07002013
2014
beeps32a63082013-08-22 14:02:29 -07002015 def rpc_disconnect_all(self):
2016 """Disconnect all known RPC proxy ports."""
2017 for port in self._rpc_proxy_map.keys():
2018 self.rpc_disconnect(port)
J. Richard Barnette1d78b012012-05-15 13:56:30 -07002019
2020
Ilja H. Friedel1232e8a2014-06-17 21:30:48 -07002021 def poor_mans_rpc(self, fun):
2022 """
2023 Calls a function from client utils on the host and returns a string.
2024
2025 @param fun function in client utils namespace.
2026 @return output string from calling fun.
2027 """
Simran Basi263a9d32014-08-19 11:16:51 -07002028 script = 'cd %s/bin; ' % autotest.Autotest.get_installed_autodir(self)
Ilja H. Friedel1232e8a2014-06-17 21:30:48 -07002029 script += 'python -c "import common; import utils;'
2030 script += 'print utils.%s"' % fun
2031 return script
2032
2033
J. Richard Barnetteb6de7e32013-02-14 13:28:04 -08002034 def _ping_check_status(self, status):
2035 """Ping the host once, and return whether it has a given status.
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002036
J. Richard Barnetteb6de7e32013-02-14 13:28:04 -08002037 @param status Check the ping status against this value.
2038 @return True iff `status` and the result of ping are the same
2039 (i.e. both True or both False).
2040
2041 """
2042 ping_val = utils.ping(self.hostname, tries=1, deadline=1)
2043 return not (status ^ (ping_val == 0))
2044
2045 def _ping_wait_for_status(self, status, timeout):
2046 """Wait for the host to have a given status (UP or DOWN).
2047
2048 Status is checked by polling. Polling will not last longer
2049 than the number of seconds in `timeout`. The polling
2050 interval will be long enough that only approximately
2051 _PING_WAIT_COUNT polling cycles will be executed, subject
2052 to a maximum interval of about one minute.
2053
2054 @param status Waiting will stop immediately if `ping` of the
2055 host returns this status.
2056 @param timeout Poll for at most this many seconds.
2057 @return True iff the host status from `ping` matched the
2058 requested status at the time of return.
2059
2060 """
2061 # _ping_check_status() takes about 1 second, hence the
2062 # "- 1" in the formula below.
2063 poll_interval = min(int(timeout / self._PING_WAIT_COUNT), 60) - 1
2064 end_time = time.time() + timeout
2065 while time.time() <= end_time:
2066 if self._ping_check_status(status):
2067 return True
2068 if poll_interval > 0:
2069 time.sleep(poll_interval)
2070
2071 # The last thing we did was sleep(poll_interval), so it may
2072 # have been too long since the last `ping`. Check one more
2073 # time, just to be sure.
2074 return self._ping_check_status(status)
2075
2076 def ping_wait_up(self, timeout):
2077 """Wait for the host to respond to `ping`.
2078
2079 N.B. This method is not a reliable substitute for
2080 `wait_up()`, because a host that responds to ping will not
2081 necessarily respond to ssh. This method should only be used
2082 if the target DUT can be considered functional even if it
2083 can't be reached via ssh.
2084
2085 @param timeout Minimum time to allow before declaring the
2086 host to be non-responsive.
2087 @return True iff the host answered to ping before the timeout.
2088
2089 """
2090 return self._ping_wait_for_status(self._PING_STATUS_UP, timeout)
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002091
Andrew Bresticker678c0c72013-01-22 10:44:09 -08002092 def ping_wait_down(self, timeout):
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002093 """Wait until the host no longer responds to `ping`.
2094
J. Richard Barnetteb6de7e32013-02-14 13:28:04 -08002095 This function can be used as a slightly faster version of
2096 `wait_down()`, by avoiding potentially long ssh timeouts.
2097
2098 @param timeout Minimum time to allow for the host to become
2099 non-responsive.
2100 @return True iff the host quit answering ping before the
2101 timeout.
2102
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002103 """
J. Richard Barnetteb6de7e32013-02-14 13:28:04 -08002104 return self._ping_wait_for_status(self._PING_STATUS_DOWN, timeout)
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002105
Tom Wai-Hong Tamfced4f62014-04-17 10:56:30 +08002106 def test_wait_for_sleep(self, sleep_timeout=None):
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002107 """Wait for the client to enter low-power sleep mode.
2108
2109 The test for "is asleep" can't distinguish a system that is
2110 powered off; to confirm that the unit was asleep, it is
2111 necessary to force resume, and then call
2112 `test_wait_for_resume()`.
2113
2114 This function is expected to be called from a test as part
2115 of a sequence like the following:
2116
2117 ~~~~~~~~
2118 boot_id = host.get_boot_id()
2119 # trigger sleep on the host
2120 host.test_wait_for_sleep()
2121 # trigger resume on the host
2122 host.test_wait_for_resume(boot_id)
2123 ~~~~~~~~
2124
Tom Wai-Hong Tamfced4f62014-04-17 10:56:30 +08002125 @param sleep_timeout time limit in seconds to allow the host sleep.
2126
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002127 @exception TestFail The host did not go to sleep within
2128 the allowed time.
2129 """
Tom Wai-Hong Tamfced4f62014-04-17 10:56:30 +08002130 if sleep_timeout is None:
2131 sleep_timeout = self.SLEEP_TIMEOUT
2132
2133 if not self.ping_wait_down(timeout=sleep_timeout):
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002134 raise error.TestFail(
Tom Wai-Hong Tamfced4f62014-04-17 10:56:30 +08002135 'client failed to sleep after %d seconds' % sleep_timeout)
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002136
2137
Tom Wai-Hong Tamfced4f62014-04-17 10:56:30 +08002138 def test_wait_for_resume(self, old_boot_id, resume_timeout=None):
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002139 """Wait for the client to resume from low-power sleep mode.
2140
2141 The `old_boot_id` parameter should be the value from
2142 `get_boot_id()` obtained prior to entering sleep mode. A
2143 `TestFail` exception is raised if the boot id changes.
2144
2145 See @ref test_wait_for_sleep for more on this function's
2146 usage.
2147
J. Richard Barnette7214e0b2013-02-06 15:20:49 -08002148 @param old_boot_id A boot id value obtained before the
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002149 target host went to sleep.
Tom Wai-Hong Tamfced4f62014-04-17 10:56:30 +08002150 @param resume_timeout time limit in seconds to allow the host up.
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002151
2152 @exception TestFail The host did not respond within the
2153 allowed time.
2154 @exception TestFail The host responded, but the boot id test
2155 indicated a reboot rather than a sleep
2156 cycle.
2157 """
Tom Wai-Hong Tamfced4f62014-04-17 10:56:30 +08002158 if resume_timeout is None:
2159 resume_timeout = self.RESUME_TIMEOUT
2160
2161 if not self.wait_up(timeout=resume_timeout):
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002162 raise error.TestFail(
2163 'client failed to resume from sleep after %d seconds' %
Tom Wai-Hong Tamfced4f62014-04-17 10:56:30 +08002164 resume_timeout)
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002165 else:
2166 new_boot_id = self.get_boot_id()
2167 if new_boot_id != old_boot_id:
Tom Wai-Hong Tam01792682015-01-06 08:00:46 +08002168 logging.error('client rebooted (old boot %s, new boot %s)',
2169 old_boot_id, new_boot_id)
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002170 raise error.TestFail(
Tom Wai-Hong Tam01792682015-01-06 08:00:46 +08002171 'client rebooted, but sleep was expected')
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002172
2173
Tom Wai-Hong Tamfe005c22014-12-03 09:25:44 +08002174 def test_wait_for_shutdown(self, shutdown_timeout=None):
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002175 """Wait for the client to shut down.
2176
2177 The test for "has shut down" can't distinguish a system that
2178 is merely asleep; to confirm that the unit was down, it is
2179 necessary to force boot, and then call test_wait_for_boot().
2180
2181 This function is expected to be called from a test as part
2182 of a sequence like the following:
2183
2184 ~~~~~~~~
2185 boot_id = host.get_boot_id()
2186 # trigger shutdown on the host
2187 host.test_wait_for_shutdown()
2188 # trigger boot on the host
2189 host.test_wait_for_boot(boot_id)
2190 ~~~~~~~~
2191
Tom Wai-Hong Tamfe005c22014-12-03 09:25:44 +08002192 @param shutdown_timeout time limit in seconds to allow the host down.
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002193 @exception TestFail The host did not shut down within the
2194 allowed time.
2195 """
Tom Wai-Hong Tamfe005c22014-12-03 09:25:44 +08002196 if shutdown_timeout is None:
2197 shutdown_timeout = self.SHUTDOWN_TIMEOUT
2198
2199 if not self.ping_wait_down(timeout=shutdown_timeout):
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002200 raise error.TestFail(
2201 'client failed to shut down after %d seconds' %
Tom Wai-Hong Tamfe005c22014-12-03 09:25:44 +08002202 shutdown_timeout)
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002203
2204
2205 def test_wait_for_boot(self, old_boot_id=None):
2206 """Wait for the client to boot from cold power.
2207
2208 The `old_boot_id` parameter should be the value from
2209 `get_boot_id()` obtained prior to shutting down. A
2210 `TestFail` exception is raised if the boot id does not
2211 change. The boot id test is omitted if `old_boot_id` is not
2212 specified.
2213
2214 See @ref test_wait_for_shutdown for more on this function's
2215 usage.
2216
J. Richard Barnette7214e0b2013-02-06 15:20:49 -08002217 @param old_boot_id A boot id value obtained before the
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002218 shut down.
2219
2220 @exception TestFail The host did not respond within the
2221 allowed time.
2222 @exception TestFail The host responded, but the boot id test
2223 indicated that there was no reboot.
2224 """
J. Richard Barnetteeb69d722012-06-18 17:29:44 -07002225 if not self.wait_up(timeout=self.REBOOT_TIMEOUT):
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002226 raise error.TestFail(
2227 'client failed to reboot after %d seconds' %
J. Richard Barnetteeb69d722012-06-18 17:29:44 -07002228 self.REBOOT_TIMEOUT)
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002229 elif old_boot_id:
2230 if self.get_boot_id() == old_boot_id:
Tom Wai-Hong Tam01792682015-01-06 08:00:46 +08002231 logging.error('client not rebooted (boot %s)',
2232 old_boot_id)
J. Richard Barnette134ec2c2012-04-25 12:59:37 -07002233 raise error.TestFail(
Tom Wai-Hong Tam01792682015-01-06 08:00:46 +08002234 'client is back up, but did not reboot')
Simran Basid5e5e272012-09-24 15:23:59 -07002235
2236
2237 @staticmethod
2238 def check_for_rpm_support(hostname):
2239 """For a given hostname, return whether or not it is powered by an RPM.
2240
Simran Basi1df55112013-09-06 11:25:09 -07002241 @param hostname: hostname to check for rpm support.
2242
Simran Basid5e5e272012-09-24 15:23:59 -07002243 @return None if this host does not follows the defined naming format
2244 for RPM powered DUT's in the lab. If it does follow the format,
2245 it returns a regular expression MatchObject instead.
2246 """
Fang Dengbaff9082015-01-06 13:46:15 -08002247 return re.match(CrosHost._RPM_HOSTNAME_REGEX, hostname)
Simran Basid5e5e272012-09-24 15:23:59 -07002248
2249
2250 def has_power(self):
2251 """For this host, return whether or not it is powered by an RPM.
2252
2253 @return True if this host is in the CROS lab and follows the defined
2254 naming format.
2255 """
Fang Deng0ca40e22013-08-27 17:47:44 -07002256 return CrosHost.check_for_rpm_support(self.hostname)
Simran Basid5e5e272012-09-24 15:23:59 -07002257
2258
Ismail Noorbasha07fdb612013-02-14 14:13:31 -08002259 def _set_power(self, state, power_method):
2260 """Sets the power to the host via RPM, Servo or manual.
2261
2262 @param state Specifies which power state to set to DUT
2263 @param power_method Specifies which method of power control to
2264 use. By default "RPM" will be used. Valid values
2265 are the strings "RPM", "manual", "servoj10".
2266
2267 """
2268 ACCEPTABLE_STATES = ['ON', 'OFF']
2269
2270 if state.upper() not in ACCEPTABLE_STATES:
2271 raise error.TestError('State must be one of: %s.'
2272 % (ACCEPTABLE_STATES,))
2273
2274 if power_method == self.POWER_CONTROL_SERVO:
2275 logging.info('Setting servo port J10 to %s', state)
2276 self.servo.set('prtctl3_pwren', state.lower())
2277 time.sleep(self._USB_POWER_TIMEOUT)
2278 elif power_method == self.POWER_CONTROL_MANUAL:
2279 logging.info('You have %d seconds to set the AC power to %s.',
2280 self._POWER_CYCLE_TIMEOUT, state)
2281 time.sleep(self._POWER_CYCLE_TIMEOUT)
2282 else:
2283 if not self.has_power():
2284 raise error.TestFail('DUT does not have RPM connected.')
Simran Basi5e6339a2013-03-21 11:34:32 -07002285 afe = frontend_wrappers.RetryingAFE(timeout_min=5, delay_sec=10)
2286 afe.set_host_attribute(self._RPM_OUTLET_CHANGED, True,
2287 hostname=self.hostname)
Simran Basi1df55112013-09-06 11:25:09 -07002288 rpm_client.set_power(self.hostname, state.upper(), timeout_mins=5)
Simran Basid5e5e272012-09-24 15:23:59 -07002289
2290
Ismail Noorbasha07fdb612013-02-14 14:13:31 -08002291 def power_off(self, power_method=POWER_CONTROL_RPM):
2292 """Turn off power to this host via RPM, Servo or manual.
2293
2294 @param power_method Specifies which method of power control to
2295 use. By default "RPM" will be used. Valid values
2296 are the strings "RPM", "manual", "servoj10".
2297
2298 """
2299 self._set_power('OFF', power_method)
Simran Basid5e5e272012-09-24 15:23:59 -07002300
2301
Ismail Noorbasha07fdb612013-02-14 14:13:31 -08002302 def power_on(self, power_method=POWER_CONTROL_RPM):
2303 """Turn on power to this host via RPM, Servo or manual.
2304
2305 @param power_method Specifies which method of power control to
2306 use. By default "RPM" will be used. Valid values
2307 are the strings "RPM", "manual", "servoj10".
2308
2309 """
2310 self._set_power('ON', power_method)
2311
2312
2313 def power_cycle(self, power_method=POWER_CONTROL_RPM):
2314 """Cycle power to this host by turning it OFF, then ON.
2315
2316 @param power_method Specifies which method of power control to
2317 use. By default "RPM" will be used. Valid values
2318 are the strings "RPM", "manual", "servoj10".
2319
2320 """
2321 if power_method in (self.POWER_CONTROL_SERVO,
2322 self.POWER_CONTROL_MANUAL):
2323 self.power_off(power_method=power_method)
2324 time.sleep(self._POWER_CYCLE_TIMEOUT)
2325 self.power_on(power_method=power_method)
2326 else:
2327 rpm_client.set_power(self.hostname, 'CYCLE')
Simran Basic6f1f7a2012-10-16 10:47:46 -07002328
2329
2330 def get_platform(self):
2331 """Determine the correct platform label for this host.
2332
2333 @returns a string representing this host's platform.
2334 """
2335 crossystem = utils.Crossystem(self)
2336 crossystem.init()
2337 # Extract fwid value and use the leading part as the platform id.
2338 # fwid generally follow the format of {platform}.{firmware version}
2339 # Example: Alex.X.YYY.Z or Google_Alex.X.YYY.Z
2340 platform = crossystem.fwid().split('.')[0].lower()
2341 # Newer platforms start with 'Google_' while the older ones do not.
2342 return platform.replace('google_', '')
2343
2344
Hung-ying Tyanb1328032014-04-01 14:18:54 +08002345 def get_architecture(self):
2346 """Determine the correct architecture label for this host.
2347
2348 @returns a string representing this host's architecture.
2349 """
2350 crossystem = utils.Crossystem(self)
2351 crossystem.init()
2352 return crossystem.arch()
2353
2354
Luis Lozano40b7d0d2014-01-17 15:12:06 -08002355 def get_chrome_version(self):
2356 """Gets the Chrome version number and milestone as strings.
2357
2358 Invokes "chrome --version" to get the version number and milestone.
2359
2360 @return A tuple (chrome_ver, milestone) where "chrome_ver" is the
2361 current Chrome version number as a string (in the form "W.X.Y.Z")
2362 and "milestone" is the first component of the version number
2363 (the "W" from "W.X.Y.Z"). If the version number cannot be parsed
2364 in the "W.X.Y.Z" format, the "chrome_ver" will be the full output
2365 of "chrome --version" and the milestone will be the empty string.
2366
2367 """
MK Ryu35d661e2014-09-25 17:44:10 -07002368 version_string = self.run(client_constants.CHROME_VERSION_COMMAND).stdout
Luis Lozano40b7d0d2014-01-17 15:12:06 -08002369 return utils.parse_chrome_version(version_string)
2370
Aviv Keshet74c89a92013-02-04 15:18:30 -08002371 @label_decorator()
Simran Basic6f1f7a2012-10-16 10:47:46 -07002372 def get_board(self):
2373 """Determine the correct board label for this host.
2374
2375 @returns a string representing this host's board.
2376 """
2377 release_info = utils.parse_cmd_output('cat /etc/lsb-release',
2378 run_method=self.run)
2379 board = release_info['CHROMEOS_RELEASE_BOARD']
2380 # Devices in the lab generally have the correct board name but our own
2381 # development devices have {board_name}-signed-{key_type}. The board
2382 # name may also begin with 'x86-' which we need to keep.
Simran Basi833814b2013-01-29 13:13:43 -08002383 board_format_string = ds_constants.BOARD_PREFIX + '%s'
Simran Basic6f1f7a2012-10-16 10:47:46 -07002384 if 'x86' not in board:
Simran Basi833814b2013-01-29 13:13:43 -08002385 return board_format_string % board.split('-')[0]
2386 return board_format_string % '-'.join(board.split('-')[0:2])
Simran Basic6f1f7a2012-10-16 10:47:46 -07002387
2388
Ilja H. Friedel1232e8a2014-06-17 21:30:48 -07002389 @label_decorator('board_freq_mem')
2390 def get_board_with_frequency_and_memory(self):
2391 """
2392 Determines the board name with frequency and memory.
2393
2394 @returns a more detailed string representing the board. Examples are
2395 butterfly_1.1GHz_2GB, link_1.8GHz_4GB, x86-zgb_1.7GHz_2GB
2396 """
2397 board = self.run(self.poor_mans_rpc(
2398 'get_board_with_frequency_and_memory()')).stdout
2399 return 'board_freq_mem:%s' % str.strip(board)
2400
2401
Aviv Keshet74c89a92013-02-04 15:18:30 -08002402 @label_decorator('lightsensor')
Simran Basic6f1f7a2012-10-16 10:47:46 -07002403 def has_lightsensor(self):
2404 """Determine the correct board label for this host.
2405
2406 @returns the string 'lightsensor' if this host has a lightsensor or
2407 None if it does not.
2408 """
2409 search_cmd = "find -L %s -maxdepth 4 | egrep '%s'" % (
Richard Barnette82c35912012-11-20 10:09:10 -08002410 self._LIGHTSENSOR_SEARCH_DIR, '|'.join(self._LIGHTSENSOR_FILES))
Simran Basic6f1f7a2012-10-16 10:47:46 -07002411 try:
2412 # Run the search cmd following the symlinks. Stderr_tee is set to
2413 # None as there can be a symlink loop, but the command will still
2414 # execute correctly with a few messages printed to stderr.
2415 self.run(search_cmd, stdout_tee=None, stderr_tee=None)
2416 return 'lightsensor'
2417 except error.AutoservRunError:
2418 # egrep exited with a return code of 1 meaning none of the possible
2419 # lightsensor files existed.
2420 return None
2421
2422
Aviv Keshet74c89a92013-02-04 15:18:30 -08002423 @label_decorator('bluetooth')
Simran Basic6f1f7a2012-10-16 10:47:46 -07002424 def has_bluetooth(self):
2425 """Determine the correct board label for this host.
2426
2427 @returns the string 'bluetooth' if this host has bluetooth or
2428 None if it does not.
2429 """
2430 try:
2431 self.run('test -d /sys/class/bluetooth/hci0')
2432 # test exited with a return code of 0.
2433 return 'bluetooth'
2434 except error.AutoservRunError:
2435 # test exited with a return code 1 meaning the directory did not
2436 # exist.
2437 return None
2438
2439
Ilja H. Friedel1232e8a2014-06-17 21:30:48 -07002440 @label_decorator('gpu_family')
2441 def get_gpu_family(self):
2442 """
2443 Determine GPU family.
2444
2445 @returns a string representing the gpu family. Examples are mali, tegra,
2446 pinetrail, sandybridge, ivybridge, haswell and baytrail.
2447 """
2448 gpu_family = self.run(self.poor_mans_rpc('get_gpu_family()')).stdout
2449 return 'gpu_family:%s' % str.strip(gpu_family)
2450
2451
Ilja Friedel0ce0b602013-08-15 18:45:27 -07002452 @label_decorator('graphics')
2453 def get_graphics(self):
2454 """
2455 Determine the correct board label for this host.
2456
2457 @returns a string representing this host's graphics. For now ARM boards
2458 return graphics:gles while all other boards return graphics:gl. This
2459 may change over time, but for robustness reasons this should avoid
2460 executing code in actual graphics libraries (which may not be ready and
2461 is tested by graphics_GLAPICheck).
2462 """
2463 uname = self.run('uname -a').stdout.lower()
2464 if 'arm' in uname:
2465 return 'graphics:gles'
2466 return 'graphics:gl'
2467
2468
Bill Richardson4f595f52014-02-13 16:20:26 -08002469 @label_decorator('ec')
2470 def get_ec(self):
2471 """
2472 Determine the type of EC on this host.
2473
2474 @returns a string representing this host's embedded controller type.
2475 At present, it only returns "ec:cros", for Chrome OS ECs. Other types
2476 of EC (or none) don't return any strings, since no tests depend on
2477 those.
2478 """
2479 cmd = 'mosys ec info'
2480 # The output should look like these, so that the last field should
2481 # match our EC version scheme:
2482 #
2483 # stm | stm32f100 | snow_v1.3.139-375eb9f
2484 # ti | Unknown-10de | peppy_v1.5.114-5d52788
2485 #
2486 # Non-Chrome OS ECs will look like these:
2487 #
2488 # ENE | KB932 | 00BE107A00
2489 # ite | it8518 | 3.08
2490 #
2491 # And some systems don't have ECs at all (Lumpy, for example).
2492 regexp = r'^.*\|\s*(\S+_v\d+\.\d+\.\d+-[0-9a-f]+)\s*$'
2493
2494 ecinfo = self.run(command=cmd, ignore_status=True)
2495 if ecinfo.exit_status == 0:
2496 res = re.search(regexp, ecinfo.stdout)
2497 if res:
2498 logging.info("EC version is %s", res.groups()[0])
2499 return 'ec:cros'
2500 logging.info("%s got: %s", cmd, ecinfo.stdout)
2501 # Has an EC, but it's not a Chrome OS EC
2502 return None
2503 logging.info("%s exited with status %d", cmd, ecinfo.exit_status)
2504 # No EC present
2505 return None
2506
2507
Alec Berg31b932b2014-04-04 16:09:11 -07002508 @label_decorator('accels')
2509 def get_accels(self):
2510 """
2511 Determine the type of accelerometers on this host.
2512
2513 @returns a string representing this host's accelerometer type.
2514 At present, it only returns "accel:cros-ec", for accelerometers
2515 attached to a Chrome OS EC, or none, if no accelerometers.
2516 """
2517 # Check to make sure we have ectool
2518 rv = self.run('which ectool', ignore_status=True)
2519 if rv.exit_status:
2520 logging.info("No ectool cmd found, assuming no EC accelerometers")
2521 return None
2522
2523 # Check that the EC supports the motionsense command
2524 rv = self.run('ectool motionsense', ignore_status=True)
2525 if rv.exit_status:
2526 logging.info("EC does not support motionsense command "
2527 "assuming no EC accelerometers")
2528 return None
2529
2530 # Check that EC motion sensors are active
2531 active = self.run('ectool motionsense active').stdout.split('\n')
2532 if active[0] == "0":
2533 logging.info("Motion sense inactive, assuming no EC accelerometers")
2534 return None
2535
2536 logging.info("EC accelerometers found")
2537 return 'accel:cros-ec'
2538
2539
Tom Wai-Hong Tam3d6790d2014-04-14 16:15:47 +08002540 @label_decorator('chameleon')
2541 def has_chameleon(self):
2542 """Determine if a Chameleon connected to this host.
2543
Tom Wai-Hong Tambadbb332014-10-10 02:59:41 +08002544 @returns a list containing two strings ('chameleon' and
2545 'chameleon:' + label, e.g. 'chameleon:hdmi') if this host
2546 has a Chameleon or None if it has not.
Tom Wai-Hong Tam3d6790d2014-04-14 16:15:47 +08002547 """
2548 if self._chameleon_host:
Tom Wai-Hong Tambadbb332014-10-10 02:59:41 +08002549 return ['chameleon', 'chameleon:' + self.chameleon.get_label()]
Tom Wai-Hong Tam3d6790d2014-04-14 16:15:47 +08002550 else:
2551 return None
2552
2553
Cheng-Yi Chiangf4104ff2014-12-23 19:39:01 +08002554 @label_decorator('audio_loopback_dongle')
2555 def has_loopback_dongle(self):
2556 """Determine if an audio loopback dongle is plugged to this host.
2557
2558 @returns 'audio_loopback_dongle' when there is an audio loopback dongle
2559 plugged to this host.
2560 None when there is no audio loopback dongle
2561 plugged to this host.
2562 """
Cheng-Yi Chiang8de78112015-05-27 14:47:08 +08002563 nodes_info = self.run(command=cras_utils.get_cras_nodes_cmd(),
2564 ignore_status=True).stdout
2565 if (cras_utils.node_type_is_plugged('HEADPHONE', nodes_info) and
2566 cras_utils.node_type_is_plugged('MIC', nodes_info)):
Cheng-Yi Chiangf4104ff2014-12-23 19:39:01 +08002567 return 'audio_loopback_dongle'
2568 else:
2569 return None
2570
2571
Derek Basehorec71ff622014-07-07 15:18:40 -07002572 @label_decorator('power_supply')
2573 def get_power_supply(self):
2574 """
2575 Determine what type of power supply the host has
2576
2577 @returns a string representing this host's power supply.
2578 'power:battery' when the device has a battery intended for
2579 extended use
2580 'power:AC_primary' when the device has a battery not intended
2581 for extended use (for moving the machine, etc)
2582 'power:AC_only' when the device has no battery at all.
2583 """
2584 psu = self.run(command='mosys psu type', ignore_status=True)
2585 if psu.exit_status:
2586 # The psu command for mosys is not included for all platforms. The
2587 # assumption is that the device will have a battery if the command
2588 # is not found.
2589 return 'power:battery'
2590
2591 psu_str = psu.stdout.strip()
2592 if psu_str == 'unknown':
2593 return None
2594
2595 return 'power:%s' % psu_str
2596
2597
Puthikorn Voravootivatfa011242014-03-14 18:45:11 -07002598 @label_decorator('storage')
2599 def get_storage(self):
2600 """
2601 Determine the type of boot device for this host.
2602
2603 Determine if the internal device is SCSI or dw_mmc device.
2604 Then check that it is SSD or HDD or eMMC or something else.
2605
2606 @returns a string representing this host's internal device type.
2607 'storage:ssd' when internal device is solid state drive
2608 'storage:hdd' when internal device is hard disk drive
2609 'storage:mmc' when internal device is mmc drive
2610 None When internal device is something else or
2611 when we are unable to determine the type
2612 """
2613 # The output should be /dev/mmcblk* for SD/eMMC or /dev/sd* for scsi
2614 rootdev_cmd = ' '.join(['. /usr/sbin/write_gpt.sh;',
2615 '. /usr/share/misc/chromeos-common.sh;',
2616 'load_base_vars;',
2617 'get_fixed_dst_drive'])
Puthikorn Voravootivat03c51682014-04-24 13:52:12 -07002618 rootdev = self.run(command=rootdev_cmd, ignore_status=True)
2619 if rootdev.exit_status:
2620 logging.info("Fail to run %s", rootdev_cmd)
2621 return None
Puthikorn Voravootivatfa011242014-03-14 18:45:11 -07002622 rootdev_str = rootdev.stdout.strip()
2623
2624 if not rootdev_str:
2625 return None
2626
2627 rootdev_base = os.path.basename(rootdev_str)
2628
2629 mmc_pattern = '/dev/mmcblk[0-9]'
2630 if re.match(mmc_pattern, rootdev_str):
2631 # Use type to determine if the internal device is eMMC or somthing
2632 # else. We can assume that MMC is always an internal device.
2633 type_cmd = 'cat /sys/block/%s/device/type' % rootdev_base
Puthikorn Voravootivat03c51682014-04-24 13:52:12 -07002634 type = self.run(command=type_cmd, ignore_status=True)
2635 if type.exit_status:
2636 logging.info("Fail to run %s", type_cmd)
2637 return None
Puthikorn Voravootivatfa011242014-03-14 18:45:11 -07002638 type_str = type.stdout.strip()
2639
2640 if type_str == 'MMC':
2641 return 'storage:mmc'
2642
2643 scsi_pattern = '/dev/sd[a-z]+'
2644 if re.match(scsi_pattern, rootdev.stdout):
2645 # Read symlink for /sys/block/sd* to determine if the internal
2646 # device is connected via ata or usb.
2647 link_cmd = 'readlink /sys/block/%s' % rootdev_base
Puthikorn Voravootivat03c51682014-04-24 13:52:12 -07002648 link = self.run(command=link_cmd, ignore_status=True)
2649 if link.exit_status:
2650 logging.info("Fail to run %s", link_cmd)
2651 return None
Puthikorn Voravootivatfa011242014-03-14 18:45:11 -07002652 link_str = link.stdout.strip()
2653 if 'usb' in link_str:
2654 return None
2655
2656 # Read rotation to determine if the internal device is ssd or hdd.
2657 rotate_cmd = str('cat /sys/block/%s/queue/rotational'
2658 % rootdev_base)
Puthikorn Voravootivat03c51682014-04-24 13:52:12 -07002659 rotate = self.run(command=rotate_cmd, ignore_status=True)
2660 if rotate.exit_status:
2661 logging.info("Fail to run %s", rotate_cmd)
2662 return None
Puthikorn Voravootivatfa011242014-03-14 18:45:11 -07002663 rotate_str = rotate.stdout.strip()
2664
2665 rotate_dict = {'0':'storage:ssd', '1':'storage:hdd'}
2666 return rotate_dict.get(rotate_str)
2667
2668 # All other internal device / error case will always fall here
2669 return None
2670
2671
Dan Shi4e9a2aa2014-03-24 14:28:42 -07002672 @label_decorator('servo')
2673 def get_servo(self):
2674 """Determine if the host has a servo attached.
2675
2676 If the host has a working servo attached, it should have a servo label.
2677
2678 @return: string 'servo' if the host has servo attached. Otherwise,
2679 returns None.
2680 """
2681 return 'servo' if self._servo_host else None
2682
2683
Dan Shi5beba472014-05-28 22:46:07 -07002684 @label_decorator('video_labels')
2685 def get_video_labels(self):
2686 """Run /usr/local/bin/avtest_label_detect to get a list of video labels.
2687
2688 Sample output of avtest_label_detect:
2689 Detected label: hw_video_acc_vp8
2690 Detected label: webcam
2691
2692 @return: A list of labels detected by tool avtest_label_detect.
2693 """
2694 try:
2695 result = self.run('/usr/local/bin/avtest_label_detect').stdout
2696 return re.findall('^Detected label: (\w+)$', result, re.M)
2697 except error.AutoservRunError:
2698 # The tool is not installed.
2699 return []
2700
2701
mussa584b4462014-06-20 15:13:28 -07002702 @label_decorator('video_glitch_detection')
2703 def is_video_glitch_detection_supported(self):
2704 """ Determine if a board under test is supported for video glitch
2705 detection tests.
2706
2707 @return: 'video_glitch_detection' if board is supported, None otherwise.
2708 """
2709 parser = ConfigParser.SafeConfigParser()
2710 filename = os.path.join(
2711 common.autotest_dir, 'client/cros/video/device_spec.conf')
2712
2713 dut = self.get_board().replace(ds_constants.BOARD_PREFIX, '')
2714
2715 try:
2716 parser.read(filename)
mussa584b4462014-06-20 15:13:28 -07002717 supported_boards = parser.sections()
2718
Mussa83c84d62014-10-02 12:11:28 -07002719 return 'video_glitch_detection' if dut in supported_boards else None
mussa584b4462014-06-20 15:13:28 -07002720
2721 except ConfigParser.error:
2722 # something went wrong while parsing the conf file
2723 return None
2724
Katherine Threlkeld7b97a9f2014-06-24 13:47:14 -07002725 @label_decorator('touch_labels')
2726 def get_touch(self):
2727 """
2728 Determine whether board under test has a touchpad or touchscreen.
2729
2730 @return: A list of some combination of 'touchscreen' and 'touchpad',
2731 depending on what is present on the device.
Katherine Threlkeldab83d392015-06-18 16:45:57 -07002732
Katherine Threlkeld7b97a9f2014-06-24 13:47:14 -07002733 """
2734 labels = []
Katherine Threlkeldab83d392015-06-18 16:45:57 -07002735 looking_for = ['touchpad', 'touchscreen']
2736 player = input_playback.InputPlayback()
2737 input_events = self.run('ls /dev/input/event*').stdout.strip().split()
2738 filename = '/tmp/touch_labels'
2739 for event in input_events:
2740 self.run('evtest %s > %s' % (event, filename), timeout=1,
2741 ignore_timeout=True)
2742 properties = self.run('cat %s' % filename).stdout
2743 input_type = player._determine_input_type(properties)
2744 if input_type in looking_for:
2745 labels.append(input_type)
2746 looking_for.remove(input_type)
2747 if len(looking_for) == 0:
2748 break
2749 self.run('rm %s' % filename)
2750
Katherine Threlkeld7b97a9f2014-06-24 13:47:14 -07002751 return labels
2752
Hung-ying Tyana39b0542015-06-30 10:36:42 +08002753
2754 @label_decorator('internal_display')
2755 def has_internal_display(self):
2756 """Determine if the device under test is equipped with an internal
2757 display.
2758
2759 @return: 'internal_display' if one is present; None otherwise.
2760 """
2761 from autotest_lib.client.cros.graphics import graphics_utils
2762 from autotest_lib.client.common_lib import utils as common_utils
2763
2764 def __system_output(cmd):
2765 return self.run(cmd).stdout
2766
2767 def __read_file(remote_path):
2768 return self.run('cat %s' % remote_path).stdout
2769
2770 # Hijack the necessary client functions so that we can take advantage
2771 # of the client lib here.
2772 # FIXME: find a less hacky way than this
2773 original_system_output = utils.system_output
2774 original_read_file = common_utils.read_file
2775 utils.system_output = __system_output
2776 common_utils.read_file = __read_file
2777 try:
2778 return ('internal_display' if graphics_utils.has_internal_display()
2779 else None)
2780 finally:
2781 utils.system_output = original_system_output
2782 common_utils.read_file = original_read_file
2783
2784
Eric Carusoee673ac2015-08-05 17:03:04 -07002785 @label_decorator('lucidsleep')
2786 def has_lucid_sleep_support(self):
2787 """Determine if the device under test has support for lucid sleep.
2788
2789 @return 'lucidsleep' if this board supports lucid sleep; None otherwise
2790 """
2791 board = self.get_board().replace(ds_constants.BOARD_PREFIX, '')
2792 return 'lucidsleep' if board in LUCID_SLEEP_BOARDS else None
2793
2794
Simran Basic6f1f7a2012-10-16 10:47:46 -07002795 def get_labels(self):
2796 """Return a list of labels for this given host.
2797
2798 This is the main way to retrieve all the automatic labels for a host
2799 as it will run through all the currently implemented label functions.
2800 """
2801 labels = []
Richard Barnette82c35912012-11-20 10:09:10 -08002802 for label_function in self._LABEL_FUNCTIONS:
J. Richard Barnetteb869b222014-09-03 17:55:44 -07002803 try:
2804 label = label_function(self)
2805 except Exception as e:
2806 logging.error('Label function %s failed; ignoring it.',
2807 label_function.__name__)
2808 logging.exception(e)
2809 label = None
Simran Basic6f1f7a2012-10-16 10:47:46 -07002810 if label:
Dan Shi5beba472014-05-28 22:46:07 -07002811 if type(label) is str:
2812 labels.append(label)
2813 elif type(label) is list:
2814 labels.extend(label)
Simran Basic6f1f7a2012-10-16 10:47:46 -07002815 return labels
Dan Shi85276d42014-04-08 22:11:45 -07002816
2817
2818 def is_boot_from_usb(self):
2819 """Check if DUT is boot from USB.
2820
2821 @return: True if DUT is boot from usb.
2822 """
2823 device = self.run('rootdev -s -d').stdout.strip()
2824 removable = int(self.run('cat /sys/block/%s/removable' %
2825 os.path.basename(device)).stdout.strip())
2826 return removable == 1
Helen Zhang17dae2b2014-11-11 09:25:52 -08002827
2828
2829 def read_from_meminfo(self, key):
Dan Shi49ca0932014-11-14 11:22:27 -08002830 """Return the memory info from /proc/meminfo
Helen Zhang17dae2b2014-11-11 09:25:52 -08002831
2832 @param key: meminfo requested
2833
2834 @return the memory value as a string
2835
2836 """
Helen Zhang17dae2b2014-11-11 09:25:52 -08002837 meminfo = self.run('grep %s /proc/meminfo' % key).stdout.strip()
2838 logging.debug('%s', meminfo)
2839 return int(re.search(r'\d+', meminfo).group(0))