blob: dc7c31dfe962de64ab6a0039ee870cb7b665059a [file] [log] [blame]
Derek Beckettf73baca2020-08-19 15:08:47 -07001# Lint as: python2, python3
Oleg Loskutoff75cc9b22019-10-16 17:28:12 -07002# Copyright (c) 2008 The Chromium OS Authors. All rights reserved.
3# Use of this source code is governed by a BSD-style license that can be
4# found in the LICENSE file.
5
Derek Beckettf73baca2020-08-19 15:08:47 -07006from __future__ import absolute_import
7from __future__ import division
8from __future__ import print_function
9
Dan Shid9be07a2017-08-18 09:51:45 -070010import os, time, socket, shutil, glob, logging, tempfile, re
xixuan6cf6d2f2016-01-29 15:29:00 -080011import shlex
Cheng-Yi Chianga155e7e2015-08-20 20:42:04 +080012import subprocess
13
Dan Shi4f8c0242017-07-07 15:34:49 -070014from autotest_lib.client.bin.result_tools import runner as result_tools_runner
Hidehiko Abe28422ed2017-06-21 10:50:44 +090015from autotest_lib.client.common_lib import error
Otabek Kasimovf5e0f102020-06-30 19:41:02 -070016from autotest_lib.client.common_lib import utils
Dan Shi9f92aa62017-07-27 17:07:05 -070017from autotest_lib.client.common_lib.cros.network import ping_runner
Hidehiko Abe28422ed2017-06-21 10:50:44 +090018from autotest_lib.client.common_lib.global_config import global_config
Congbin Guo306cdbc2021-02-08 13:37:41 -080019from autotest_lib.server import autoserv_parser
jadmanski31c49b72008-10-27 20:44:48 +000020from autotest_lib.server import utils, autotest
Prathmesh Prabhu8b5065d2017-01-10 17:13:01 -080021from autotest_lib.server.hosts import host_info
mblighe8b93af2009-01-30 00:45:53 +000022from autotest_lib.server.hosts import remote
Roshan Pius58e5dd32015-10-16 15:16:42 -070023from autotest_lib.server.hosts import rpc_server_tracker
Hidehiko Abe28422ed2017-06-21 10:50:44 +090024from autotest_lib.server.hosts import ssh_multiplex
Derek Beckettfccbb622021-02-08 16:44:53 -080025from autotest_lib.server.hosts.tls_client import exec_dut_command
Andrew Luo4be621d2020-03-21 07:01:13 -070026
Derek Beckettf73baca2020-08-19 15:08:47 -070027import six
28from six.moves import filter
jadmanskica7da372008-10-21 16:26:52 +000029
Otabek Kasimovf5e0f102020-06-30 19:41:02 -070030
Gwendal Grignou36b61702016-02-10 11:57:53 -080031# pylint: disable=C0111
jadmanskica7da372008-10-21 16:26:52 +000032
mblighb86bfa12010-02-12 20:22:21 +000033get_value = global_config.get_config_value
Derek Beckett189dfa42021-01-05 12:47:14 -080034enable_main_ssh = get_value('AUTOSERV',
35 'enable_main_ssh',
36 type=bool,
Derek Beckett4d102242020-12-01 14:24:37 -080037 default=False)
mblighefccc1b2010-01-11 19:08:42 +000038
Derek Beckett3b9974a2021-03-18 11:16:00 -070039ENABLE_EXEC_DUT_COMMAND = get_value('AUTOSERV',
40 'enable_tls',
41 type=bool,
42 default=False)
43
Dan Shi9f92aa62017-07-27 17:07:05 -070044# Number of seconds to use the cached up status.
45_DEFAULT_UP_STATUS_EXPIRATION_SECONDS = 300
Dean Liaoe3e75f62017-11-14 10:36:43 +080046_DEFAULT_SSH_PORT = 22
mblighefccc1b2010-01-11 19:08:42 +000047
Lutz Justen043e9c12017-10-27 12:40:47 +020048# Number of seconds to wait for the host to shut down in wait_down().
49_DEFAULT_WAIT_DOWN_TIME_SECONDS = 120
50
Philip Chen7ce1e392018-12-09 23:53:32 -080051# Number of seconds to wait for the host to boot up in wait_up().
52_DEFAULT_WAIT_UP_TIME_SECONDS = 120
53
54# Timeout in seconds for a single call of get_boot_id() in wait_down()
55# and a single ssh ping in wait_up().
Lutz Justen043e9c12017-10-27 12:40:47 +020056_DEFAULT_MAX_PING_TIMEOUT = 10
57
Derek Beckettfc04fbc2020-12-14 16:37:31 -080058# The client symlink directory.
59AUTOTEST_CLIENT_SYMLINK_END = 'client/autotest_lib'
60
61
Fang Deng96667ca2013-08-01 17:46:18 -070062class AbstractSSHHost(remote.RemoteHost):
mblighbc9402b2009-12-29 01:15:34 +000063 """
64 This class represents a generic implementation of most of the
jadmanskica7da372008-10-21 16:26:52 +000065 framework necessary for controlling a host via ssh. It implements
66 almost all of the abstract Host methods, except for the core
mblighbc9402b2009-12-29 01:15:34 +000067 Host.run method.
68 """
Simran Basi5ace6f22016-01-06 17:30:44 -080069 VERSION_PREFIX = ''
Derek Beckett4d102242020-12-01 14:24:37 -080070 # Timeout for main ssh connection setup, in seconds.
71 DEFAULT_START_MAIN_SSH_TIMEOUT_S = 5
jadmanskica7da372008-10-21 16:26:52 +000072
Andrew Luo4be621d2020-03-21 07:01:13 -070073 def _initialize(self,
74 hostname,
75 user="root",
76 port=_DEFAULT_SSH_PORT,
77 password="",
78 is_client_install_supported=True,
79 afe_host=None,
80 host_info_store=None,
81 connection_pool=None,
82 *args,
83 **dargs):
jadmanskif6562912008-10-21 17:59:01 +000084 super(AbstractSSHHost, self)._initialize(hostname=hostname,
85 *args, **dargs)
Kevin Cheng05ae2a42016-06-06 10:12:48 -070086 """
87 @param hostname: The hostname of the host.
88 @param user: The username to use when ssh'ing into the host.
89 @param password: The password to use when ssh'ing into the host.
90 @param port: The port to use for ssh.
91 @param is_client_install_supported: Boolean to indicate if we can
92 install autotest on the host.
93 @param afe_host: The host object attained from the AFE (get_hosts).
Prathmesh Prabhu8b5065d2017-01-10 17:13:01 -080094 @param host_info_store: Optional host_info.CachingHostInfoStore object
95 to obtain / update host information.
Hidehiko Abe06893302017-06-24 07:32:38 +090096 @param connection_pool: ssh_multiplex.ConnectionPool instance to share
Derek Beckett4d102242020-12-01 14:24:37 -080097 the main ssh connection across control scripts.
Kevin Cheng05ae2a42016-06-06 10:12:48 -070098 """
Dan Shic07b8932014-12-11 15:22:30 -080099 # IP address is retrieved only on demand. Otherwise the host
100 # initialization will fail for host is not online.
101 self._ip = None
jadmanskica7da372008-10-21 16:26:52 +0000102 self.user = user
103 self.port = port
104 self.password = password
Roshan Piusa58163a2015-10-14 13:36:29 -0700105 self._is_client_install_supported = is_client_install_supported
showard6eafb492010-01-15 20:29:06 +0000106 self._use_rsync = None
Fang Deng3af66202013-08-16 15:19:25 -0700107 self.known_hosts_file = tempfile.mkstemp()[1]
Roshan Pius58e5dd32015-10-16 15:16:42 -0700108 self._rpc_server_tracker = rpc_server_tracker.RpcServerTracker(self);
Derek Beckettfccbb622021-02-08 16:44:53 -0800109 self._tls_exec_dut_command_client = None
110 self._tls_unstable = False
jadmanskica7da372008-10-21 16:26:52 +0000111
Andrew Luo4be621d2020-03-21 07:01:13 -0700112 # Read the value of the use_icmp flag, setting to true if missing.
113 args_string = autoserv_parser.autoserv_parser.options.args
114 args_dict = utils.args_to_dict(
115 args_string.split() if args_string is not None else '')
116 value = args_dict.get('use_icmp', 'true').lower()
117 if value == 'true':
118 self._use_icmp = True
119 elif value == 'false':
120 self._use_icmp = False
121 else:
122 raise ValueError(
123 'use_icmp must be true or false: {}'.format(value))
mblighefccc1b2010-01-11 19:08:42 +0000124 """
Derek Beckett4d102242020-12-01 14:24:37 -0800125 Main SSH connection background job, socket temp directory and socket
126 control path option. If main-SSH is enabled, these fields will be
127 initialized by start_main_ssh when a new SSH connection is initiated.
mblighefccc1b2010-01-11 19:08:42 +0000128 """
Hidehiko Abe06893302017-06-24 07:32:38 +0900129 self._connection_pool = connection_pool
130 if connection_pool:
Derek Beckett4d102242020-12-01 14:24:37 -0800131 self._main_ssh = connection_pool.get(hostname, user, port)
Hidehiko Abe06893302017-06-24 07:32:38 +0900132 else:
Derek Beckett4d102242020-12-01 14:24:37 -0800133 self._main_ssh = ssh_multiplex.MainSsh(hostname, user, port)
Simran Basi3b858a22015-03-17 16:23:24 -0700134
Kevin Cheng05ae2a42016-06-06 10:12:48 -0700135 self._afe_host = afe_host or utils.EmptyAFEHost()
Prathmesh Prabhu8b5065d2017-01-10 17:13:01 -0800136 self.host_info_store = (host_info_store or
137 host_info.InMemoryHostInfoStore())
showard6eafb492010-01-15 20:29:06 +0000138
Dan Shi9f92aa62017-07-27 17:07:05 -0700139 # The cached status of whether the DUT responded to ping.
140 self._cached_up_status = None
141 # The timestamp when the value of _cached_up_status is set.
142 self._cached_up_status_updated = None
143
144
Dan Shic07b8932014-12-11 15:22:30 -0800145 @property
146 def ip(self):
147 """@return IP address of the host.
148 """
149 if not self._ip:
150 self._ip = socket.getaddrinfo(self.hostname, None)[0][4][0]
151 return self._ip
152
153
Roshan Piusa58163a2015-10-14 13:36:29 -0700154 @property
155 def is_client_install_supported(self):
156 """"
157 Returns True if the host supports autotest client installs, False
158 otherwise.
159 """
160 return self._is_client_install_supported
161
162
Roshan Pius58e5dd32015-10-16 15:16:42 -0700163 @property
164 def rpc_server_tracker(self):
165 """"
166 @return The RPC server tracker associated with this host.
167 """
168 return self._rpc_server_tracker
169
170
Dean Liaoe3e75f62017-11-14 10:36:43 +0800171 @property
172 def is_default_port(self):
Garry Wang81bea592020-08-27 17:25:25 -0700173 """Returns True if its port is default SSH port."""
174 return self.port == _DEFAULT_SSH_PORT
Dean Liaoe3e75f62017-11-14 10:36:43 +0800175
176 @property
177 def host_port(self):
178 """Returns hostname if port is default. Otherwise, hostname:port.
179 """
180 if self.is_default_port:
181 return self.hostname
182 else:
183 return '%s:%d' % (self.hostname, self.port)
184
Andrew Luo4be621d2020-03-21 07:01:13 -0700185 @property
186 def use_icmp(self):
187 """Returns True if icmp pings are allowed."""
188 return self._use_icmp
189
Dean Liaoe3e75f62017-11-14 10:36:43 +0800190
191 # Though it doesn't use self here, it is not declared as staticmethod
192 # because its subclass may use self to access member variables.
193 def make_ssh_command(self, user="root", port=_DEFAULT_SSH_PORT, opts='',
194 hosts_file='/dev/null', connect_timeout=30,
195 alive_interval=300, alive_count_max=3,
196 connection_attempts=1):
197 ssh_options = " ".join([
198 opts,
199 self.make_ssh_options(
200 hosts_file=hosts_file, connect_timeout=connect_timeout,
201 alive_interval=alive_interval, alive_count_max=alive_count_max,
202 connection_attempts=connection_attempts)])
203 return "/usr/bin/ssh -a -x %s -l %s -p %d" % (ssh_options, user, port)
204
205
206 @staticmethod
207 def make_ssh_options(hosts_file='/dev/null', connect_timeout=30,
208 alive_interval=300, alive_count_max=3,
209 connection_attempts=1):
210 """Composes SSH -o options."""
Derek Beckettf73baca2020-08-19 15:08:47 -0700211 assert isinstance(connect_timeout, six.integer_types)
Fang Deng96667ca2013-08-01 17:46:18 -0700212 assert connect_timeout > 0 # can't disable the timeout
Dean Liaoe3e75f62017-11-14 10:36:43 +0800213
214 options = [("StrictHostKeyChecking", "no"),
215 ("UserKnownHostsFile", hosts_file),
216 ("BatchMode", "yes"),
217 ("ConnectTimeout", str(connect_timeout)),
218 ("ServerAliveInterval", str(alive_interval)),
219 ("ServerAliveCountMax", str(alive_count_max)),
220 ("ConnectionAttempts", str(connection_attempts))]
221 return " ".join("-o %s=%s" % kv for kv in options)
Fang Deng96667ca2013-08-01 17:46:18 -0700222
223
showard6eafb492010-01-15 20:29:06 +0000224 def use_rsync(self):
225 if self._use_rsync is not None:
226 return self._use_rsync
227
mblighc9892c02010-01-06 19:02:16 +0000228 # Check if rsync is available on the remote host. If it's not,
229 # don't try to use it for any future file transfers.
Gwendal Grignou03286f02017-03-24 10:50:59 -0700230 self._use_rsync = self.check_rsync()
showard6eafb492010-01-15 20:29:06 +0000231 if not self._use_rsync:
Ilja H. Friedel04be2bd2014-05-07 21:29:59 -0700232 logging.warning("rsync not available on remote host %s -- disabled",
Dean Liaoe3e75f62017-11-14 10:36:43 +0800233 self.host_port)
Eric Lie0493a42010-11-15 13:05:43 -0800234 return self._use_rsync
mblighc9892c02010-01-06 19:02:16 +0000235
236
Gwendal Grignou03286f02017-03-24 10:50:59 -0700237 def check_rsync(self):
mblighc9892c02010-01-06 19:02:16 +0000238 """
239 Check if rsync is available on the remote host.
240 """
241 try:
Allen Liad719c12017-06-27 23:48:04 +0000242 self.run("rsync --version", stdout_tee=None, stderr_tee=None)
mblighc9892c02010-01-06 19:02:16 +0000243 except error.AutoservRunError:
244 return False
245 return True
246
jadmanskica7da372008-10-21 16:26:52 +0000247
Gwendal Grignou36b61702016-02-10 11:57:53 -0800248 def _encode_remote_paths(self, paths, escape=True, use_scp=False):
mblighbc9402b2009-12-29 01:15:34 +0000249 """
250 Given a list of file paths, encodes it as a single remote path, in
251 the style used by rsync and scp.
Gwendal Grignou36b61702016-02-10 11:57:53 -0800252 escape: add \\ to protect special characters.
253 use_scp: encode for scp if true, rsync if false.
mblighbc9402b2009-12-29 01:15:34 +0000254 """
showard56176ec2009-10-28 19:52:30 +0000255 if escape:
256 paths = [utils.scp_remote_escape(path) for path in paths]
Marc Herbert21eb6492015-11-13 15:48:53 -0800257
258 remote = self.hostname
259
260 # rsync and scp require IPv6 brackets, even when there isn't any
261 # trailing port number (ssh doesn't support IPv6 brackets).
262 # In the Python >= 3.3 future, 'import ipaddress' will parse addresses.
263 if re.search(r':.*:', remote):
264 remote = '[%s]' % remote
265
Gwendal Grignou36b61702016-02-10 11:57:53 -0800266 if use_scp:
267 return '%s@%s:"%s"' % (self.user, remote, " ".join(paths))
268 else:
269 return '%s@%s:%s' % (
270 self.user, remote,
271 " :".join('"%s"' % p for p in paths))
jadmanskica7da372008-10-21 16:26:52 +0000272
Gwendal Grignou36b61702016-02-10 11:57:53 -0800273 def _encode_local_paths(self, paths, escape=True):
274 """
275 Given a list of file paths, encodes it as a single local path.
276 escape: add \\ to protect special characters.
277 """
278 if escape:
279 paths = [utils.sh_escape(path) for path in paths]
280
281 return " ".join('"%s"' % p for p in paths)
jadmanskica7da372008-10-21 16:26:52 +0000282
Dean Liaoe3e75f62017-11-14 10:36:43 +0800283
284 def rsync_options(self, delete_dest=False, preserve_symlinks=False,
285 safe_symlinks=False, excludes=None):
286 """Obtains rsync options for the remote."""
Fang Deng96667ca2013-08-01 17:46:18 -0700287 ssh_cmd = self.make_ssh_command(user=self.user, port=self.port,
Derek Beckett4d102242020-12-01 14:24:37 -0800288 opts=self._main_ssh.ssh_option,
Fang Deng96667ca2013-08-01 17:46:18 -0700289 hosts_file=self.known_hosts_file)
jadmanskid7b79ed2009-01-07 17:19:48 +0000290 if delete_dest:
291 delete_flag = "--delete"
292 else:
293 delete_flag = ""
Luigi Semenzato9b083072016-12-19 16:50:40 -0800294 if safe_symlinks:
295 symlink_flag = "-l --safe-links"
296 elif preserve_symlinks:
297 symlink_flag = "-l"
mbligh45561782009-05-11 21:14:34 +0000298 else:
299 symlink_flag = "-L"
Dan Shi92c34c92017-07-14 15:28:56 -0700300 exclude_args = ''
301 if excludes:
302 exclude_args = ' '.join(
303 ["--exclude '%s'" % exclude for exclude in excludes])
Dean Liaoe3e75f62017-11-14 10:36:43 +0800304 return "%s %s --timeout=1800 --rsh='%s' -az --no-o --no-g %s" % (
305 symlink_flag, delete_flag, ssh_cmd, exclude_args)
306
307
308 def _make_rsync_cmd(self, sources, dest, delete_dest,
309 preserve_symlinks, safe_symlinks, excludes=None):
310 """
311 Given a string of source paths and a destination path, produces the
312 appropriate rsync command for copying them. Remote paths must be
313 pre-encoded.
314 """
315 rsync_options = self.rsync_options(
316 delete_dest=delete_dest, preserve_symlinks=preserve_symlinks,
317 safe_symlinks=safe_symlinks, excludes=excludes)
318 return 'rsync %s %s "%s"' % (rsync_options, sources, dest)
jadmanskid7b79ed2009-01-07 17:19:48 +0000319
320
Eric Li861b2d52011-02-04 14:50:35 -0800321 def _make_ssh_cmd(self, cmd):
322 """
323 Create a base ssh command string for the host which can be used
324 to run commands directly on the machine
325 """
Fang Deng96667ca2013-08-01 17:46:18 -0700326 base_cmd = self.make_ssh_command(user=self.user, port=self.port,
Derek Beckett4d102242020-12-01 14:24:37 -0800327 opts=self._main_ssh.ssh_option,
Fang Deng96667ca2013-08-01 17:46:18 -0700328 hosts_file=self.known_hosts_file)
Eric Li861b2d52011-02-04 14:50:35 -0800329
330 return '%s %s "%s"' % (base_cmd, self.hostname, utils.sh_escape(cmd))
331
jadmanskid7b79ed2009-01-07 17:19:48 +0000332 def _make_scp_cmd(self, sources, dest):
mblighbc9402b2009-12-29 01:15:34 +0000333 """
Gwendal Grignou36b61702016-02-10 11:57:53 -0800334 Given a string of source paths and a destination path, produces the
jadmanskid7b79ed2009-01-07 17:19:48 +0000335 appropriate scp command for encoding it. Remote paths must be
mblighbc9402b2009-12-29 01:15:34 +0000336 pre-encoded.
337 """
mblighc0649d62010-01-15 18:15:58 +0000338 command = ("scp -rq %s -o StrictHostKeyChecking=no "
lmraf676f32010-02-04 03:36:26 +0000339 "-o UserKnownHostsFile=%s -P %d %s '%s'")
Derek Beckett4d102242020-12-01 14:24:37 -0800340 return command % (self._main_ssh.ssh_option, self.known_hosts_file,
Gwendal Grignou36b61702016-02-10 11:57:53 -0800341 self.port, sources, dest)
jadmanskid7b79ed2009-01-07 17:19:48 +0000342
343
344 def _make_rsync_compatible_globs(self, path, is_local):
mblighbc9402b2009-12-29 01:15:34 +0000345 """
346 Given an rsync-style path, returns a list of globbed paths
jadmanskid7b79ed2009-01-07 17:19:48 +0000347 that will hopefully provide equivalent behaviour for scp. Does not
348 support the full range of rsync pattern matching behaviour, only that
349 exposed in the get/send_file interface (trailing slashes).
350
351 The is_local param is flag indicating if the paths should be
mblighbc9402b2009-12-29 01:15:34 +0000352 interpreted as local or remote paths.
353 """
jadmanskid7b79ed2009-01-07 17:19:48 +0000354
355 # non-trailing slash paths should just work
356 if len(path) == 0 or path[-1] != "/":
357 return [path]
358
359 # make a function to test if a pattern matches any files
360 if is_local:
showard56176ec2009-10-28 19:52:30 +0000361 def glob_matches_files(path, pattern):
362 return len(glob.glob(path + pattern)) > 0
jadmanskid7b79ed2009-01-07 17:19:48 +0000363 else:
showard56176ec2009-10-28 19:52:30 +0000364 def glob_matches_files(path, pattern):
365 result = self.run("ls \"%s\"%s" % (utils.sh_escape(path),
366 pattern),
367 stdout_tee=None, ignore_status=True)
jadmanskid7b79ed2009-01-07 17:19:48 +0000368 return result.exit_status == 0
369
370 # take a set of globs that cover all files, and see which are needed
371 patterns = ["*", ".[!.]*"]
showard56176ec2009-10-28 19:52:30 +0000372 patterns = [p for p in patterns if glob_matches_files(path, p)]
jadmanskid7b79ed2009-01-07 17:19:48 +0000373
374 # convert them into a set of paths suitable for the commandline
jadmanskid7b79ed2009-01-07 17:19:48 +0000375 if is_local:
showard56176ec2009-10-28 19:52:30 +0000376 return ["\"%s\"%s" % (utils.sh_escape(path), pattern)
377 for pattern in patterns]
jadmanskid7b79ed2009-01-07 17:19:48 +0000378 else:
showard56176ec2009-10-28 19:52:30 +0000379 return [utils.scp_remote_escape(path) + pattern
380 for pattern in patterns]
jadmanskid7b79ed2009-01-07 17:19:48 +0000381
382
383 def _make_rsync_compatible_source(self, source, is_local):
mblighbc9402b2009-12-29 01:15:34 +0000384 """
385 Applies the same logic as _make_rsync_compatible_globs, but
jadmanskid7b79ed2009-01-07 17:19:48 +0000386 applies it to an entire list of sources, producing a new list of
mblighbc9402b2009-12-29 01:15:34 +0000387 sources, properly quoted.
388 """
jadmanskid7b79ed2009-01-07 17:19:48 +0000389 return sum((self._make_rsync_compatible_globs(path, is_local)
390 for path in source), [])
jadmanskica7da372008-10-21 16:26:52 +0000391
392
mblighfeac0102009-04-28 18:31:12 +0000393 def _set_umask_perms(self, dest):
mblighbc9402b2009-12-29 01:15:34 +0000394 """
395 Given a destination file/dir (recursively) set the permissions on
396 all the files and directories to the max allowed by running umask.
397 """
mblighfeac0102009-04-28 18:31:12 +0000398
399 # now this looks strange but I haven't found a way in Python to _just_
400 # get the umask, apparently the only option is to try to set it
401 umask = os.umask(0)
402 os.umask(umask)
403
Derek Beckettf73baca2020-08-19 15:08:47 -0700404 max_privs = 0o777 & ~umask
mblighfeac0102009-04-28 18:31:12 +0000405
406 def set_file_privs(filename):
Chris Masone567d0d92011-12-19 09:38:30 -0800407 """Sets mode of |filename|. Assumes |filename| exists."""
408 file_stat = os.stat(filename)
mblighfeac0102009-04-28 18:31:12 +0000409
410 file_privs = max_privs
411 # if the original file permissions do not have at least one
412 # executable bit then do not set it anywhere
Derek Beckettf73baca2020-08-19 15:08:47 -0700413 if not file_stat.st_mode & 0o111:
414 file_privs &= ~0o111
mblighfeac0102009-04-28 18:31:12 +0000415
416 os.chmod(filename, file_privs)
417
418 # try a bottom-up walk so changes on directory permissions won't cut
419 # our access to the files/directories inside it
420 for root, dirs, files in os.walk(dest, topdown=False):
421 # when setting the privileges we emulate the chmod "X" behaviour
422 # that sets to execute only if it is a directory or any of the
423 # owner/group/other already has execute right
424 for dirname in dirs:
425 os.chmod(os.path.join(root, dirname), max_privs)
426
Chris Masone567d0d92011-12-19 09:38:30 -0800427 # Filter out broken symlinks as we go.
428 for filename in filter(os.path.exists, files):
mblighfeac0102009-04-28 18:31:12 +0000429 set_file_privs(os.path.join(root, filename))
430
431
432 # now set privs for the dest itself
433 if os.path.isdir(dest):
434 os.chmod(dest, max_privs)
435 else:
436 set_file_privs(dest)
437
438
mbligh45561782009-05-11 21:14:34 +0000439 def get_file(self, source, dest, delete_dest=False, preserve_perm=True,
Dana Goyette4d864e12019-09-19 11:05:44 -0700440 preserve_symlinks=False, retry=True, safe_symlinks=False,
441 try_rsync=True):
jadmanskica7da372008-10-21 16:26:52 +0000442 """
443 Copy files from the remote host to a local path.
444
445 Directories will be copied recursively.
446 If a source component is a directory with a trailing slash,
447 the content of the directory will be copied, otherwise, the
448 directory itself and its content will be copied. This
449 behavior is similar to that of the program 'rsync'.
450
451 Args:
452 source: either
453 1) a single file or directory, as a string
454 2) a list of one or more (possibly mixed)
455 files or directories
456 dest: a file or a directory (if source contains a
457 directory or more than one element, you must
458 supply a directory dest)
mbligh89e258d2008-10-24 13:58:08 +0000459 delete_dest: if this is true, the command will also clear
460 out any old files at dest that are not in the
461 source
mblighfeac0102009-04-28 18:31:12 +0000462 preserve_perm: tells get_file() to try to preserve the sources
463 permissions on files and dirs
mbligh45561782009-05-11 21:14:34 +0000464 preserve_symlinks: try to preserve symlinks instead of
465 transforming them into files/dirs on copy
Luigi Semenzato9b083072016-12-19 16:50:40 -0800466 safe_symlinks: same as preserve_symlinks, but discard links
467 that may point outside the copied tree
Dana Goyette4d864e12019-09-19 11:05:44 -0700468 try_rsync: set to False to skip directly to using scp
jadmanskica7da372008-10-21 16:26:52 +0000469 Raises:
470 AutoservRunError: the scp command failed
471 """
Simran Basi882f15b2013-10-29 14:59:34 -0700472 logging.debug('get_file. source: %s, dest: %s, delete_dest: %s,'
473 'preserve_perm: %s, preserve_symlinks:%s', source, dest,
474 delete_dest, preserve_perm, preserve_symlinks)
Dan Shi4f8c0242017-07-07 15:34:49 -0700475
Derek Beckett4d102242020-12-01 14:24:37 -0800476 # Start a main SSH connection if necessary.
477 self.start_main_ssh()
mblighefccc1b2010-01-11 19:08:42 +0000478
Derek Beckettf73baca2020-08-19 15:08:47 -0700479 if isinstance(source, six.string_types):
jadmanskica7da372008-10-21 16:26:52 +0000480 source = [source]
jadmanskid7b79ed2009-01-07 17:19:48 +0000481 dest = os.path.abspath(dest)
jadmanskica7da372008-10-21 16:26:52 +0000482
mblighc9892c02010-01-06 19:02:16 +0000483 # If rsync is disabled or fails, try scp.
showard6eafb492010-01-15 20:29:06 +0000484 try_scp = True
Dana Goyette4d864e12019-09-19 11:05:44 -0700485 if try_rsync and self.use_rsync():
Simran Basi882f15b2013-10-29 14:59:34 -0700486 logging.debug('Using Rsync.')
mblighc9892c02010-01-06 19:02:16 +0000487 try:
488 remote_source = self._encode_remote_paths(source)
489 local_dest = utils.sh_escape(dest)
Gwendal Grignou36b61702016-02-10 11:57:53 -0800490 rsync = self._make_rsync_cmd(remote_source, local_dest,
Luigi Semenzato9b083072016-12-19 16:50:40 -0800491 delete_dest, preserve_symlinks,
492 safe_symlinks)
mblighc9892c02010-01-06 19:02:16 +0000493 utils.run(rsync)
showard6eafb492010-01-15 20:29:06 +0000494 try_scp = False
Derek Beckettf73baca2020-08-19 15:08:47 -0700495 except error.CmdError as e:
Luigi Semenzato7f9dff12016-11-21 14:01:20 -0800496 # retry on rsync exit values which may be caused by transient
497 # network problems:
498 #
499 # rc 10: Error in socket I/O
500 # rc 12: Error in rsync protocol data stream
501 # rc 23: Partial transfer due to error
502 # rc 255: Ssh error
503 #
504 # Note that rc 23 includes dangling symlinks. In this case
505 # retrying is useless, but not very damaging since rsync checks
506 # for those before starting the transfer (scp does not).
507 status = e.result_obj.exit_status
508 if status in [10, 12, 23, 255] and retry:
509 logging.warning('rsync status %d, retrying', status)
510 self.get_file(source, dest, delete_dest, preserve_perm,
511 preserve_symlinks, retry=False)
512 # The nested get_file() does all that's needed.
513 return
514 else:
515 logging.warning("trying scp, rsync failed: %s (%d)",
516 e, status)
mblighc9892c02010-01-06 19:02:16 +0000517
518 if try_scp:
Simran Basi882f15b2013-10-29 14:59:34 -0700519 logging.debug('Trying scp.')
jadmanskid7b79ed2009-01-07 17:19:48 +0000520 # scp has no equivalent to --delete, just drop the entire dest dir
521 if delete_dest and os.path.isdir(dest):
522 shutil.rmtree(dest)
523 os.mkdir(dest)
jadmanskica7da372008-10-21 16:26:52 +0000524
jadmanskid7b79ed2009-01-07 17:19:48 +0000525 remote_source = self._make_rsync_compatible_source(source, False)
526 if remote_source:
showard56176ec2009-10-28 19:52:30 +0000527 # _make_rsync_compatible_source() already did the escaping
Gwendal Grignou36b61702016-02-10 11:57:53 -0800528 remote_source = self._encode_remote_paths(
529 remote_source, escape=False, use_scp=True)
jadmanskid7b79ed2009-01-07 17:19:48 +0000530 local_dest = utils.sh_escape(dest)
Gwendal Grignou36b61702016-02-10 11:57:53 -0800531 scp = self._make_scp_cmd(remote_source, local_dest)
jadmanskid7b79ed2009-01-07 17:19:48 +0000532 try:
533 utils.run(scp)
Derek Beckettf73baca2020-08-19 15:08:47 -0700534 except error.CmdError as e:
Simran Basi882f15b2013-10-29 14:59:34 -0700535 logging.debug('scp failed: %s', e)
jadmanskid7b79ed2009-01-07 17:19:48 +0000536 raise error.AutoservRunError(e.args[0], e.args[1])
jadmanskica7da372008-10-21 16:26:52 +0000537
mblighfeac0102009-04-28 18:31:12 +0000538 if not preserve_perm:
539 # we have no way to tell scp to not try to preserve the
540 # permissions so set them after copy instead.
541 # for rsync we could use "--no-p --chmod=ugo=rwX" but those
542 # options are only in very recent rsync versions
543 self._set_umask_perms(dest)
544
jadmanskica7da372008-10-21 16:26:52 +0000545
mbligh45561782009-05-11 21:14:34 +0000546 def send_file(self, source, dest, delete_dest=False,
Dan Shi92c34c92017-07-14 15:28:56 -0700547 preserve_symlinks=False, excludes=None):
jadmanskica7da372008-10-21 16:26:52 +0000548 """
549 Copy files from a local path to the remote host.
550
551 Directories will be copied recursively.
552 If a source component is a directory with a trailing slash,
553 the content of the directory will be copied, otherwise, the
554 directory itself and its content will be copied. This
555 behavior is similar to that of the program 'rsync'.
556
557 Args:
558 source: either
559 1) a single file or directory, as a string
560 2) a list of one or more (possibly mixed)
561 files or directories
562 dest: a file or a directory (if source contains a
563 directory or more than one element, you must
564 supply a directory dest)
mbligh89e258d2008-10-24 13:58:08 +0000565 delete_dest: if this is true, the command will also clear
566 out any old files at dest that are not in the
567 source
mbligh45561782009-05-11 21:14:34 +0000568 preserve_symlinks: controls if symlinks on the source will be
569 copied as such on the destination or transformed into the
570 referenced file/directory
Dan Shi92c34c92017-07-14 15:28:56 -0700571 excludes: A list of file pattern that matches files not to be
572 sent. `send_file` will fail if exclude is set, since
573 local copy does not support --exclude, e.g., when
574 using scp to copy file.
jadmanskica7da372008-10-21 16:26:52 +0000575
576 Raises:
577 AutoservRunError: the scp command failed
578 """
Simran Basi882f15b2013-10-29 14:59:34 -0700579 logging.debug('send_file. source: %s, dest: %s, delete_dest: %s,'
580 'preserve_symlinks:%s', source, dest,
581 delete_dest, preserve_symlinks)
Derek Beckett4d102242020-12-01 14:24:37 -0800582 # Start a main SSH connection if necessary.
583 self.start_main_ssh()
mblighefccc1b2010-01-11 19:08:42 +0000584
Derek Beckettf73baca2020-08-19 15:08:47 -0700585 if isinstance(source, six.string_types):
jadmanskica7da372008-10-21 16:26:52 +0000586 source = [source]
587
Derek Beckett61525712021-02-11 08:13:46 -0800588 client_symlink = _client_symlink(source)
Derek Beckettbc3d5b62021-03-10 08:57:32 -0800589 # The client symlink *must* be preserved, and should not be sent with
590 # the main send_file in case scp is used, which does not support symlink
591 if client_symlink:
Derek Beckett61525712021-02-11 08:13:46 -0800592 source.remove(client_symlink)
Derek Beckett61525712021-02-11 08:13:46 -0800593
Gwendal Grignou36b61702016-02-10 11:57:53 -0800594 local_sources = self._encode_local_paths(source)
mukesh agrawal0d3616c2015-07-17 15:47:36 -0700595 if not local_sources:
Gwendal Grignou36b61702016-02-10 11:57:53 -0800596 raise error.TestError('source |%s| yielded an empty string' % (
mukesh agrawal0d3616c2015-07-17 15:47:36 -0700597 source))
Gwendal Grignou36b61702016-02-10 11:57:53 -0800598 if local_sources.find('\x00') != -1:
mukesh agrawal0d3616c2015-07-17 15:47:36 -0700599 raise error.TestError('one or more sources include NUL char')
600
Derek Beckettfc04fbc2020-12-14 16:37:31 -0800601 self._send_file(
602 dest=dest,
603 source=source,
604 local_sources=local_sources,
605 delete_dest=delete_dest,
606 excludes=excludes,
607 preserve_symlinks=preserve_symlinks)
Derek Beckettfc04fbc2020-12-14 16:37:31 -0800608
Derek Beckettbc3d5b62021-03-10 08:57:32 -0800609 # Send the client symlink after the rest of the autotest repo has been
610 # sent.
611 if client_symlink:
612 self._send_client_symlink(dest=dest,
613 source=[client_symlink],
614 local_sources=client_symlink,
615 delete_dest=delete_dest,
616 excludes=excludes,
617 preserve_symlinks=True)
618
619 def _send_client_symlink(self, dest, source, local_sources, delete_dest,
620 excludes, preserve_symlinks):
621 if self.use_rsync():
622 if self._send_using_rsync(dest=dest,
623 local_sources=local_sources,
624 delete_dest=delete_dest,
625 preserve_symlinks=preserve_symlinks,
626 excludes=excludes):
627 return
628 # Manually create the symlink if rsync is not available, or fails.
629 try:
630 self.run('mkdir {f} && touch {f}/__init__.py && cd {f} && '
631 'ln -s ../ client'.format(
632 f=os.path.join(dest, 'autotest_lib')))
633 except Exception as e:
634 raise error.AutotestHostRunError(
635 "Could not create client symlink on host: %s" % e)
636
Derek Beckettfc04fbc2020-12-14 16:37:31 -0800637 def _send_file(self, dest, source, local_sources, delete_dest, excludes,
638 preserve_symlinks):
639 """Send file(s), trying rsync first, then scp."""
showard6eafb492010-01-15 20:29:06 +0000640 if self.use_rsync():
Derek Beckettfc04fbc2020-12-14 16:37:31 -0800641 rsync_success = self._send_using_rsync(
642 dest=dest,
643 local_sources=local_sources,
644 delete_dest=delete_dest,
645 preserve_symlinks=preserve_symlinks,
646 excludes=excludes)
Derek Beckettb0821d82021-01-08 11:33:39 -0800647 if rsync_success:
648 return
Derek Beckettfc04fbc2020-12-14 16:37:31 -0800649
Derek Beckettb0821d82021-01-08 11:33:39 -0800650 # Send using scp if you cannot via rsync, or rsync fails.
651 self._send_using_scp(dest=dest,
652 source=source,
653 delete_dest=delete_dest,
654 excludes=excludes)
Derek Beckettfc04fbc2020-12-14 16:37:31 -0800655
656 def _send_using_rsync(self, dest, local_sources, delete_dest,
657 preserve_symlinks, excludes):
658 """Send using rsync.
659
660 Args:
661 dest: a file or a directory (if source contains a
662 directory or more than one element, you must
663 supply a directory dest)
664 local_sources: a string of files/dirs to send separated with spaces
665 delete_dest: if this is true, the command will also clear
666 out any old files at dest that are not in the
667 source
668 preserve_symlinks: controls if symlinks on the source will be
669 copied as such on the destination or transformed into the
670 referenced file/directory
671 excludes: A list of file pattern that matches files not to be
672 sent. `send_file` will fail if exclude is set, since
673 local copy does not support --exclude, e.g., when
674 using scp to copy file.
675 Returns:
676 bool: True if the cmd succeeded, else False
677
678 """
679 logging.debug('Using Rsync.')
680 remote_dest = self._encode_remote_paths([dest])
681 try:
682 rsync = self._make_rsync_cmd(local_sources,
683 remote_dest,
684 delete_dest,
685 preserve_symlinks,
686 False,
687 excludes=excludes)
688 utils.run(rsync)
689 return True
690 except error.CmdError as e:
691 logging.warning("trying scp, rsync failed: %s", e)
692 return False
693
694 def _send_using_scp(self, dest, source, delete_dest, excludes):
695 """Send using scp.
696
697 Args:
698 source: either
699 1) a single file or directory, as a string
700 2) a list of one or more (possibly mixed)
701 files or directories
702 dest: a file or a directory (if source contains a
703 directory or more than one element, you must
704 supply a directory dest)
705 delete_dest: if this is true, the command will also clear
706 out any old files at dest that are not in the
707 source
708 excludes: A list of file pattern that matches files not to be
709 sent. `send_file` will fail if exclude is set, since
710 local copy does not support --exclude, e.g., when
711 using scp to copy file.
712
713 Raises:
714 AutoservRunError: the scp command failed
715 """
716 logging.debug('Trying scp.')
717 if excludes:
718 raise error.AutotestHostRunError(
719 '--exclude is not supported in scp, try to use rsync. '
720 'excludes: %s' % ','.join(excludes), None)
721
722 # scp has no equivalent to --delete, just drop the entire dest dir
723 if delete_dest:
724 is_dir = self.run("ls -d %s/" % dest,
725 ignore_status=True).exit_status == 0
726 if is_dir:
727 cmd = "rm -rf %s && mkdir %s"
728 cmd %= (dest, dest)
729 self.run(cmd)
730
731 remote_dest = self._encode_remote_paths([dest], use_scp=True)
732 local_sources = self._make_rsync_compatible_source(source, True)
733 if local_sources:
734 sources = self._encode_local_paths(local_sources, escape=False)
735 scp = self._make_scp_cmd(sources, remote_dest)
mblighc9892c02010-01-06 19:02:16 +0000736 try:
Derek Beckettfc04fbc2020-12-14 16:37:31 -0800737 utils.run(scp)
Derek Beckettf73baca2020-08-19 15:08:47 -0700738 except error.CmdError as e:
Derek Beckettfc04fbc2020-12-14 16:37:31 -0800739 logging.debug('scp failed: %s', e)
740 raise error.AutoservRunError(e.args[0], e.args[1])
741 else:
742 logging.debug('skipping scp for empty source list')
jadmanskid7b79ed2009-01-07 17:19:48 +0000743
Simran Basi1621c632015-10-14 12:22:23 -0700744 def verify_ssh_user_access(self):
745 """Verify ssh access to this host.
746
747 @returns False if ssh_ping fails due to Permissions error, True
748 otherwise.
749 """
750 try:
751 self.ssh_ping()
752 except (error.AutoservSshPermissionDeniedError,
753 error.AutoservSshPingHostError):
754 return False
755 return True
756
757
Luigi Semenzato135574c2016-08-31 17:25:08 -0700758 def ssh_ping(self, timeout=60, connect_timeout=None, base_cmd='true'):
beepsadd66d32013-03-04 17:21:51 -0800759 """
760 Pings remote host via ssh.
761
Philip Chen7ce1e392018-12-09 23:53:32 -0800762 @param timeout: Command execution timeout in seconds.
beepsadd66d32013-03-04 17:21:51 -0800763 Defaults to 60 seconds.
Philip Chen7ce1e392018-12-09 23:53:32 -0800764 @param connect_timeout: ssh connection timeout in seconds.
beeps46dadc92013-11-07 14:07:10 -0800765 @param base_cmd: The base command to run with the ssh ping.
766 Defaults to true.
beepsadd66d32013-03-04 17:21:51 -0800767 @raise AutoservSSHTimeout: If the ssh ping times out.
768 @raise AutoservSshPermissionDeniedError: If ssh ping fails due to
769 permissions.
770 @raise AutoservSshPingHostError: For other AutoservRunErrors.
771 """
Luigi Semenzato135574c2016-08-31 17:25:08 -0700772 ctimeout = min(timeout, connect_timeout or timeout)
jadmanskica7da372008-10-21 16:26:52 +0000773 try:
Allen Liad719c12017-06-27 23:48:04 +0000774 self.run(base_cmd, timeout=timeout, connect_timeout=ctimeout,
775 ssh_failure_retry_ok=True)
jadmanskica7da372008-10-21 16:26:52 +0000776 except error.AutoservSSHTimeout:
mblighd0e94982009-07-11 00:15:18 +0000777 msg = "Host (ssh) verify timed out (timeout = %d)" % timeout
jadmanskica7da372008-10-21 16:26:52 +0000778 raise error.AutoservSSHTimeout(msg)
mbligh9d738d62009-03-09 21:17:10 +0000779 except error.AutoservSshPermissionDeniedError:
Allen Liad719c12017-06-27 23:48:04 +0000780 #let AutoservSshPermissionDeniedError be visible to the callers
mbligh9d738d62009-03-09 21:17:10 +0000781 raise
Derek Beckettf73baca2020-08-19 15:08:47 -0700782 except error.AutoservRunError as e:
mblighc971c5f2009-06-08 16:48:54 +0000783 # convert the generic AutoservRunError into something more
784 # specific for this context
785 raise error.AutoservSshPingHostError(e.description + '\n' +
786 repr(e.result_obj))
jadmanskica7da372008-10-21 16:26:52 +0000787
788
Luigi Semenzato135574c2016-08-31 17:25:08 -0700789 def is_up(self, timeout=60, connect_timeout=None, base_cmd='true'):
jadmanskica7da372008-10-21 16:26:52 +0000790 """
beeps46dadc92013-11-07 14:07:10 -0800791 Check if the remote host is up by ssh-ing and running a base command.
jadmanskica7da372008-10-21 16:26:52 +0000792
Philip Chen7ce1e392018-12-09 23:53:32 -0800793 @param timeout: command execution timeout in seconds.
794 @param connect_timeout: ssh connection timeout in seconds.
beeps46dadc92013-11-07 14:07:10 -0800795 @param base_cmd: a base command to run with ssh. The default is 'true'.
beepsadd66d32013-03-04 17:21:51 -0800796 @returns True if the remote host is up before the timeout expires,
797 False otherwise.
jadmanskica7da372008-10-21 16:26:52 +0000798 """
799 try:
Luigi Semenzato135574c2016-08-31 17:25:08 -0700800 self.ssh_ping(timeout=timeout,
801 connect_timeout=connect_timeout,
802 base_cmd=base_cmd)
jadmanskica7da372008-10-21 16:26:52 +0000803 except error.AutoservError:
804 return False
805 else:
806 return True
807
808
Otabek Kasimovd48389b2020-12-07 02:38:34 -0800809 def is_up_fast(self, count=1):
810 """Return True if the host can be pinged.
811
812 @param count How many time try to ping before decide that host is not
813 reachable by ping.
814 """
Andrew Luo4be621d2020-03-21 07:01:13 -0700815 if not self._use_icmp:
816 stack = self._get_server_stack_state(lowest_frames=1,
817 highest_frames=7)
818 logging.warning("is_up_fast called with icmp disabled from %s!",
819 stack)
820 return True
Otabek Kasimovd48389b2020-12-07 02:38:34 -0800821 ping_config = ping_runner.PingConfig(self.hostname,
Derek Beckettf7e3d882021-02-12 15:05:16 -0800822 count=1,
Otabek Kasimovd48389b2020-12-07 02:38:34 -0800823 ignore_result=True,
824 ignore_status=True)
Derek Beckettf7e3d882021-02-12 15:05:16 -0800825
826 # Run up to the amount specified, but also exit as soon as the first
827 # reply is found.
828 loops_remaining = count
829 while loops_remaining > 0:
830 loops_remaining -= 1
831 if ping_runner.PingRunner().ping(ping_config).received > 0:
832 return True
833 return False
Dan Shi9f92aa62017-07-27 17:07:05 -0700834
835
Jeremy Bettis657eb412021-02-17 10:40:43 -0700836 def wait_up(self,
837 timeout=_DEFAULT_WAIT_UP_TIME_SECONDS,
838 host_is_down=False):
jadmanskica7da372008-10-21 16:26:52 +0000839 """
840 Wait until the remote host is up or the timeout expires.
841
842 In fact, it will wait until an ssh connection to the remote
843 host can be established, and getty is running.
844
jadmanskic0354912010-01-12 15:57:29 +0000845 @param timeout time limit in seconds before returning even
846 if the host is not up.
Jeremy Bettis657eb412021-02-17 10:40:43 -0700847 @param host_is_down set to True if the host is known to be down before
848 wait_up.
jadmanskica7da372008-10-21 16:26:52 +0000849
beepsadd66d32013-03-04 17:21:51 -0800850 @returns True if the host was found to be up before the timeout expires,
851 False otherwise
jadmanskica7da372008-10-21 16:26:52 +0000852 """
Jeremy Bettis657eb412021-02-17 10:40:43 -0700853 if host_is_down:
854 # Since we expect the host to be down when this is called, if there is
855 # an existing ssh main connection close it.
Jeremy Bettisb4b17ce2021-03-05 11:11:02 -0700856 self.close_main_ssh()
Philip Chen7ce1e392018-12-09 23:53:32 -0800857 current_time = int(time.time())
858 end_time = current_time + timeout
jadmanskica7da372008-10-21 16:26:52 +0000859
Greg Edelstondd827e42021-06-14 14:57:17 -0600860 ssh_success_logged = False
Luigi Semenzato135574c2016-08-31 17:25:08 -0700861 autoserv_error_logged = False
Philip Chen7ce1e392018-12-09 23:53:32 -0800862 while current_time < end_time:
863 ping_timeout = min(_DEFAULT_MAX_PING_TIMEOUT,
864 end_time - current_time)
865 if self.is_up(timeout=ping_timeout, connect_timeout=ping_timeout):
Greg Edelstondd827e42021-06-14 14:57:17 -0600866 if not ssh_success_logged:
867 logging.debug('Successfully pinged host %s',
868 self.host_port)
869 wait_procs = self.get_wait_up_processes()
870 if wait_procs:
871 logging.debug('Waiting for processes: %s', wait_procs)
872 else:
873 logging.debug('No wait_up processes to wait for')
874 ssh_success_logged = True
jadmanskica7da372008-10-21 16:26:52 +0000875 try:
876 if self.are_wait_up_processes_up():
Dean Liaoe3e75f62017-11-14 10:36:43 +0800877 logging.debug('Host %s is now up', self.host_port)
jadmanskica7da372008-10-21 16:26:52 +0000878 return True
Luigi Semenzato135574c2016-08-31 17:25:08 -0700879 except error.AutoservError as e:
880 if not autoserv_error_logged:
881 logging.debug('Ignoring failure to reach %s: %s %s',
Dean Liaoe3e75f62017-11-14 10:36:43 +0800882 self.host_port, e,
Luigi Semenzato135574c2016-08-31 17:25:08 -0700883 '(and further similar failures)')
884 autoserv_error_logged = True
jadmanskica7da372008-10-21 16:26:52 +0000885 time.sleep(1)
beeps46dadc92013-11-07 14:07:10 -0800886 current_time = int(time.time())
jadmanskica7da372008-10-21 16:26:52 +0000887
jadmanski7ebac3d2010-06-17 16:06:31 +0000888 logging.debug('Host %s is still down after waiting %d seconds',
Dean Liaoe3e75f62017-11-14 10:36:43 +0800889 self.host_port, int(timeout + time.time() - end_time))
jadmanskica7da372008-10-21 16:26:52 +0000890 return False
891
892
Lutz Justen043e9c12017-10-27 12:40:47 +0200893 def wait_down(self, timeout=_DEFAULT_WAIT_DOWN_TIME_SECONDS,
894 warning_timer=None, old_boot_id=None,
895 max_ping_timeout=_DEFAULT_MAX_PING_TIMEOUT):
jadmanskica7da372008-10-21 16:26:52 +0000896 """
897 Wait until the remote host is down or the timeout expires.
898
Lutz Justen043e9c12017-10-27 12:40:47 +0200899 If old_boot_id is provided, waits until either the machine is
900 unpingable or self.get_boot_id() returns a value different from
jadmanskic0354912010-01-12 15:57:29 +0000901 old_boot_id. If the boot_id value has changed then the function
Lutz Justen043e9c12017-10-27 12:40:47 +0200902 returns True under the assumption that the machine has shut down
jadmanskic0354912010-01-12 15:57:29 +0000903 and has now already come back up.
jadmanskica7da372008-10-21 16:26:52 +0000904
jadmanskic0354912010-01-12 15:57:29 +0000905 If old_boot_id is None then until the machine becomes unreachable the
906 method assumes the machine has not yet shut down.
jadmanskica7da372008-10-21 16:26:52 +0000907
Lutz Justen043e9c12017-10-27 12:40:47 +0200908 @param timeout Time limit in seconds before returning even if the host
909 is still up.
910 @param warning_timer Time limit in seconds that will generate a warning
911 if the host is not down yet. Can be None for no warning.
jadmanskic0354912010-01-12 15:57:29 +0000912 @param old_boot_id A string containing the result of self.get_boot_id()
913 prior to the host being told to shut down. Can be None if this is
914 not available.
Lutz Justen043e9c12017-10-27 12:40:47 +0200915 @param max_ping_timeout Maximum timeout in seconds for each
916 self.get_boot_id() call. If this timeout is hit, it is assumed that
917 the host went down and became unreachable.
jadmanskic0354912010-01-12 15:57:29 +0000918
Lutz Justen043e9c12017-10-27 12:40:47 +0200919 @returns True if the host was found to be down (max_ping_timeout timeout
920 expired or boot_id changed if provided) and False if timeout
921 expired.
jadmanskica7da372008-10-21 16:26:52 +0000922 """
mblighe5e3cf22010-05-27 23:33:14 +0000923 #TODO: there is currently no way to distinguish between knowing
924 #TODO: boot_id was unsupported and not knowing the boot_id.
beeps46dadc92013-11-07 14:07:10 -0800925 current_time = int(time.time())
Lutz Justen043e9c12017-10-27 12:40:47 +0200926 end_time = current_time + timeout
jadmanskica7da372008-10-21 16:26:52 +0000927
mbligh2ed998f2009-04-08 21:03:47 +0000928 if warning_timer:
929 warn_time = current_time + warning_timer
930
jadmanskic0354912010-01-12 15:57:29 +0000931 if old_boot_id is not None:
932 logging.debug('Host %s pre-shutdown boot_id is %s',
Dean Liaoe3e75f62017-11-14 10:36:43 +0800933 self.host_port, old_boot_id)
jadmanskic0354912010-01-12 15:57:29 +0000934
beepsadd66d32013-03-04 17:21:51 -0800935 # Impose semi real-time deadline constraints, since some clients
936 # (eg: watchdog timer tests) expect strict checking of time elapsed.
937 # Each iteration of this loop is treated as though it atomically
938 # completes within current_time, this is needed because if we used
939 # inline time.time() calls instead then the following could happen:
940 #
Lutz Justen043e9c12017-10-27 12:40:47 +0200941 # while time.time() < end_time: [23 < 30]
beepsadd66d32013-03-04 17:21:51 -0800942 # some code. [takes 10 secs]
943 # try:
944 # new_boot_id = self.get_boot_id(timeout=end_time - time.time())
945 # [30 - 33]
946 # The last step will lead to a return True, when in fact the machine
947 # went down at 32 seconds (>30). Hence we need to pass get_boot_id
948 # the same time that allowed us into that iteration of the loop.
Lutz Justen043e9c12017-10-27 12:40:47 +0200949 while current_time < end_time:
950 ping_timeout = min(end_time - current_time, max_ping_timeout)
jadmanskic0354912010-01-12 15:57:29 +0000951 try:
Lutz Justen043e9c12017-10-27 12:40:47 +0200952 new_boot_id = self.get_boot_id(timeout=ping_timeout)
mblighdbc7e4a2010-01-15 20:34:20 +0000953 except error.AutoservError:
jadmanskic0354912010-01-12 15:57:29 +0000954 logging.debug('Host %s is now unreachable over ssh, is down',
Dean Liaoe3e75f62017-11-14 10:36:43 +0800955 self.host_port)
jadmanskica7da372008-10-21 16:26:52 +0000956 return True
jadmanskic0354912010-01-12 15:57:29 +0000957 else:
958 # if the machine is up but the boot_id value has changed from
959 # old boot id, then we can assume the machine has gone down
960 # and then already come back up
961 if old_boot_id is not None and old_boot_id != new_boot_id:
962 logging.debug('Host %s now has boot_id %s and so must '
Dean Liaoe3e75f62017-11-14 10:36:43 +0800963 'have rebooted', self.host_port, new_boot_id)
jadmanskic0354912010-01-12 15:57:29 +0000964 return True
mbligh2ed998f2009-04-08 21:03:47 +0000965
966 if warning_timer and current_time > warn_time:
Scott Zawalskic86fdeb2013-10-23 10:24:04 -0400967 self.record("INFO", None, "shutdown",
mbligh2ed998f2009-04-08 21:03:47 +0000968 "Shutdown took longer than %ds" % warning_timer)
969 # Print the warning only once.
970 warning_timer = None
mbligha4464402009-04-17 20:13:41 +0000971 # If a machine is stuck switching runlevels
972 # This may cause the machine to reboot.
973 self.run('kill -HUP 1', ignore_status=True)
mbligh2ed998f2009-04-08 21:03:47 +0000974
jadmanskica7da372008-10-21 16:26:52 +0000975 time.sleep(1)
beeps46dadc92013-11-07 14:07:10 -0800976 current_time = int(time.time())
jadmanskica7da372008-10-21 16:26:52 +0000977
978 return False
jadmanskif6562912008-10-21 17:59:01 +0000979
mbligha0a27592009-01-24 01:41:36 +0000980
jadmanskif6562912008-10-21 17:59:01 +0000981 # tunable constants for the verify & repair code
mblighb86bfa12010-02-12 20:22:21 +0000982 AUTOTEST_GB_DISKSPACE_REQUIRED = get_value("SERVER",
983 "gb_diskspace_required",
Fang Deng6b05f5b2013-03-20 13:42:11 -0700984 type=float,
985 default=20.0)
mbligha0a27592009-01-24 01:41:36 +0000986
jadmanskif6562912008-10-21 17:59:01 +0000987
showardca572982009-09-18 21:20:01 +0000988 def verify_connectivity(self):
989 super(AbstractSSHHost, self).verify_connectivity()
jadmanskif6562912008-10-21 17:59:01 +0000990
Andrew Luo4be621d2020-03-21 07:01:13 -0700991 logging.info('Pinging host %s', self.host_port)
jadmanskif6562912008-10-21 17:59:01 +0000992 self.ssh_ping()
Dean Liaoe3e75f62017-11-14 10:36:43 +0800993 logging.info("Host (ssh) %s is alive", self.host_port)
jadmanskif6562912008-10-21 17:59:01 +0000994
jadmanski80deb752009-01-21 17:14:16 +0000995 if self.is_shutting_down():
mblighc971c5f2009-06-08 16:48:54 +0000996 raise error.AutoservHostIsShuttingDownError("Host is shutting down")
jadmanski80deb752009-01-21 17:14:16 +0000997
mblighb49b5232009-02-12 21:54:49 +0000998
showardca572982009-09-18 21:20:01 +0000999 def verify_software(self):
1000 super(AbstractSSHHost, self).verify_software()
jadmanskif6562912008-10-21 17:59:01 +00001001 try:
showardad812bf2009-10-20 23:49:56 +00001002 self.check_diskspace(autotest.Autotest.get_install_dir(self),
1003 self.AUTOTEST_GB_DISKSPACE_REQUIRED)
Keith Haddow07f1d3e2017-08-03 17:40:41 -07001004 except error.AutoservDiskFullHostError:
1005 # only want to raise if it's a space issue
1006 raise
1007 except (error.AutoservHostError, autotest.AutodirNotFoundError):
Lutz Justen043e9c12017-10-27 12:40:47 +02001008 logging.exception('autodir space check exception, this is probably '
Keith Haddow07f1d3e2017-08-03 17:40:41 -07001009 'safe to ignore\n')
mblighefccc1b2010-01-11 19:08:42 +00001010
mblighefccc1b2010-01-11 19:08:42 +00001011 def close(self):
1012 super(AbstractSSHHost, self).close()
Godofredo Contreras773179e2016-05-24 10:17:48 -07001013 self.rpc_server_tracker.disconnect_all()
Hidehiko Abe06893302017-06-24 07:32:38 +09001014 if not self._connection_pool:
Derek Beckett4d102242020-12-01 14:24:37 -08001015 self._main_ssh.close()
xixuand6011f12016-12-08 15:01:58 -08001016 if os.path.exists(self.known_hosts_file):
1017 os.remove(self.known_hosts_file)
Derek Beckettfccbb622021-02-08 16:44:53 -08001018 self.tls_exec_dut_command = None
mblighefccc1b2010-01-11 19:08:42 +00001019
Jeremy Bettisb4b17ce2021-03-05 11:11:02 -07001020 def close_main_ssh(self):
1021 """Stop the ssh main connection.
1022
1023 Intended for situations when the host is known to be down and we don't
1024 need a ssh timeout to tell us it is down. For example, if you just
1025 instructed the host to shutdown or hibernate.
1026 """
1027 logging.debug("Stopping main ssh connection")
1028 self._main_ssh.close()
1029
Derek Beckett4d102242020-12-01 14:24:37 -08001030 def restart_main_ssh(self):
Luigi Semenzato3b95ede2016-12-09 11:51:01 -08001031 """
Derek Beckett4d102242020-12-01 14:24:37 -08001032 Stop and restart the ssh main connection. This is meant as a last
Luigi Semenzato3b95ede2016-12-09 11:51:01 -08001033 resort when ssh commands fail and we don't understand why.
1034 """
Congbin Guo306cdbc2021-02-08 13:37:41 -08001035 logging.debug("Restarting main ssh connection")
Derek Beckett4d102242020-12-01 14:24:37 -08001036 self._main_ssh.close()
1037 self._main_ssh.maybe_start(timeout=30)
Luigi Semenzato3b95ede2016-12-09 11:51:01 -08001038
Derek Beckett4d102242020-12-01 14:24:37 -08001039 def start_main_ssh(self, timeout=DEFAULT_START_MAIN_SSH_TIMEOUT_S):
mblighefccc1b2010-01-11 19:08:42 +00001040 """
Derek Beckett4d102242020-12-01 14:24:37 -08001041 Called whenever a non-main SSH connection needs to be initiated (e.g.,
1042 by run, rsync, scp). If main SSH support is enabled and a main SSH
mblighefccc1b2010-01-11 19:08:42 +00001043 connection is not active already, start a new one in the background.
Derek Beckett4d102242020-12-01 14:24:37 -08001044 Also, cleanup any zombie main SSH connections (e.g., dead due to
mblighefccc1b2010-01-11 19:08:42 +00001045 reboot).
Aviv Keshet0749a822013-10-17 09:53:26 -07001046
Derek Beckett4d102242020-12-01 14:24:37 -08001047 timeout: timeout in seconds (default 5) to wait for main ssh
Aviv Keshet0749a822013-10-17 09:53:26 -07001048 connection to be established. If timeout is reached, a
1049 warning message is logged, but no other action is taken.
mblighefccc1b2010-01-11 19:08:42 +00001050 """
Derek Beckett4d102242020-12-01 14:24:37 -08001051 if not enable_main_ssh:
mblighefccc1b2010-01-11 19:08:42 +00001052 return
Derek Beckett4d102242020-12-01 14:24:37 -08001053 self._main_ssh.maybe_start(timeout=timeout)
mbligh0a883702010-04-21 01:58:34 +00001054
Derek Beckettfccbb622021-02-08 16:44:53 -08001055 @property
1056 def tls_unstable(self):
1057 # A single test will rebuild remote many times. Its safe to assume if
1058 # TLS unstable for one try, it will be for others. If we check each,
1059 # it adds ~60 seconds per test (if its dead).
1060 if os.getenv('TLS_UNSTABLE'):
1061 return bool(os.getenv('TLS_UNSTABLE'))
1062 if self._tls_unstable is not None:
1063 return self._tls_unstable
Congbin Guo306cdbc2021-02-08 13:37:41 -08001064
Derek Beckettfccbb622021-02-08 16:44:53 -08001065 @tls_unstable.setter
1066 def tls_unstable(self, v):
1067 if not isinstance(v, bool):
1068 raise error.AutoservError('tls_stable setting must be bool, got %s'
1069 % (type(v)))
1070 os.environ['TLS_UNSTABLE'] = str(v)
1071 self._tls_unstable = v
Congbin Guo306cdbc2021-02-08 13:37:41 -08001072
Derek Beckettfccbb622021-02-08 16:44:53 -08001073 @property
1074 def tls_exec_dut_command_client(self):
1075 # If client is already initialized, return that.
Derek Beckett3b9974a2021-03-18 11:16:00 -07001076 if not ENABLE_EXEC_DUT_COMMAND:
1077 return None
Derek Beckettfccbb622021-02-08 16:44:53 -08001078 if self.tls_unstable:
1079 return None
1080 if self._tls_exec_dut_command_client is not None:
1081 return self._tls_exec_dut_command_client
1082 # If the TLS connection is alive, create a new client.
1083 if self.tls_connection is None:
1084 return None
1085 return exec_dut_command.TLSExecDutCommandClient(
1086 tlsconnection=self.tls_connection,
1087 hostname=self.hostname)
mbligh0a883702010-04-21 01:58:34 +00001088
1089 def clear_known_hosts(self):
1090 """Clears out the temporary ssh known_hosts file.
1091
1092 This is useful if the test SSHes to the machine, then reinstalls it,
1093 then SSHes to it again. It can be called after the reinstall to
1094 reduce the spam in the logs.
1095 """
1096 logging.info("Clearing known hosts for host '%s', file '%s'.",
Dean Liaoe3e75f62017-11-14 10:36:43 +08001097 self.host_port, self.known_hosts_file)
mbligh0a883702010-04-21 01:58:34 +00001098 # Clear out the file by opening it for writing and then closing.
Fang Deng3af66202013-08-16 15:19:25 -07001099 fh = open(self.known_hosts_file, "w")
mbligh0a883702010-04-21 01:58:34 +00001100 fh.close()
Prashanth B98509c72014-04-04 16:01:34 -07001101
1102
1103 def collect_logs(self, remote_src_dir, local_dest_dir, ignore_errors=True):
1104 """Copy log directories from a host to a local directory.
1105
1106 @param remote_src_dir: A destination directory on the host.
1107 @param local_dest_dir: A path to a local destination directory.
1108 If it doesn't exist it will be created.
1109 @param ignore_errors: If True, ignore exceptions.
1110
1111 @raises OSError: If there were problems creating the local_dest_dir and
1112 ignore_errors is False.
1113 @raises AutoservRunError, AutotestRunError: If something goes wrong
1114 while copying the directories and ignore_errors is False.
1115 """
Dan Shi9f92aa62017-07-27 17:07:05 -07001116 if not self.check_cached_up_status():
1117 logging.warning('Host %s did not answer to ping, skip collecting '
Dean Liaoe3e75f62017-11-14 10:36:43 +08001118 'logs.', self.host_port)
Dan Shi9f92aa62017-07-27 17:07:05 -07001119 return
1120
Prashanth B98509c72014-04-04 16:01:34 -07001121 locally_created_dest = False
1122 if (not os.path.exists(local_dest_dir)
1123 or not os.path.isdir(local_dest_dir)):
1124 try:
1125 os.makedirs(local_dest_dir)
1126 locally_created_dest = True
1127 except OSError as e:
1128 logging.warning('Unable to collect logs from host '
Dean Liaoe3e75f62017-11-14 10:36:43 +08001129 '%s: %s', self.host_port, e)
Prashanth B98509c72014-04-04 16:01:34 -07001130 if not ignore_errors:
1131 raise
1132 return
Dan Shi4f8c0242017-07-07 15:34:49 -07001133
1134 # Build test result directory summary
1135 try:
1136 result_tools_runner.run_on_client(self, remote_src_dir)
1137 except (error.AutotestRunError, error.AutoservRunError,
1138 error.AutoservSSHTimeout) as e:
1139 logging.exception(
1140 'Non-critical failure: Failed to collect and throttle '
Dean Liaoe3e75f62017-11-14 10:36:43 +08001141 'results at %s from host %s', remote_src_dir,
1142 self.host_port)
Dan Shi4f8c0242017-07-07 15:34:49 -07001143
Prashanth B98509c72014-04-04 16:01:34 -07001144 try:
Luigi Semenzato9b083072016-12-19 16:50:40 -08001145 self.get_file(remote_src_dir, local_dest_dir, safe_symlinks=True)
Prashanth B98509c72014-04-04 16:01:34 -07001146 except (error.AutotestRunError, error.AutoservRunError,
1147 error.AutoservSSHTimeout) as e:
1148 logging.warning('Collection of %s to local dir %s from host %s '
1149 'failed: %s', remote_src_dir, local_dest_dir,
Dean Liaoe3e75f62017-11-14 10:36:43 +08001150 self.host_port, e)
Prashanth B98509c72014-04-04 16:01:34 -07001151 if locally_created_dest:
1152 shutil.rmtree(local_dest_dir, ignore_errors=ignore_errors)
1153 if not ignore_errors:
1154 raise
Cheng-Yi Chianga155e7e2015-08-20 20:42:04 +08001155
Dan Shi4f8c0242017-07-07 15:34:49 -07001156 # Clean up directory summary file on the client side.
1157 try:
1158 result_tools_runner.run_on_client(self, remote_src_dir,
1159 cleanup_only=True)
1160 except (error.AutotestRunError, error.AutoservRunError,
1161 error.AutoservSSHTimeout) as e:
1162 logging.exception(
1163 'Non-critical failure: Failed to cleanup result summary '
Lutz Justen043e9c12017-10-27 12:40:47 +02001164 'files at %s in host %s', remote_src_dir, self.hostname)
Dan Shi4f8c0242017-07-07 15:34:49 -07001165
Cheng-Yi Chianga155e7e2015-08-20 20:42:04 +08001166
xixuan6cf6d2f2016-01-29 15:29:00 -08001167 def create_ssh_tunnel(self, port, local_port):
Cheng-Yi Chianga155e7e2015-08-20 20:42:04 +08001168 """Create an ssh tunnel from local_port to port.
1169
xixuan6cf6d2f2016-01-29 15:29:00 -08001170 This is used to forward a port securely through a tunnel process from
1171 the server to the DUT for RPC server connection.
1172
Cheng-Yi Chianga155e7e2015-08-20 20:42:04 +08001173 @param port: remote port on the host.
1174 @param local_port: local forwarding port.
1175
1176 @return: the tunnel process.
1177 """
1178 tunnel_options = '-n -N -q -L %d:localhost:%d' % (local_port, port)
Prathmesh Prabhu817b3f12017-07-31 17:08:41 -07001179 ssh_cmd = self.make_ssh_command(opts=tunnel_options, port=self.port)
Cheng-Yi Chianga155e7e2015-08-20 20:42:04 +08001180 tunnel_cmd = '%s %s' % (ssh_cmd, self.hostname)
1181 logging.debug('Full tunnel command: %s', tunnel_cmd)
xixuan6cf6d2f2016-01-29 15:29:00 -08001182 # Exec the ssh process directly here rather than using a shell.
1183 # Using a shell leaves a dangling ssh process, because we deliver
1184 # signals to the shell wrapping ssh, not the ssh process itself.
1185 args = shlex.split(tunnel_cmd)
Kuang-che Wu0ea03232019-08-31 10:52:31 +08001186 with open('/dev/null', 'w') as devnull:
1187 tunnel_proc = subprocess.Popen(args, stdout=devnull, stderr=devnull,
1188 close_fds=True)
Cheng-Yi Chianga155e7e2015-08-20 20:42:04 +08001189 logging.debug('Started ssh tunnel, local = %d'
1190 ' remote = %d, pid = %d',
1191 local_port, port, tunnel_proc.pid)
1192 return tunnel_proc
Gilad Arnolda76bef02015-09-29 13:55:15 -07001193
1194
Oleg Loskutoff1199bbb2019-10-21 12:27:13 -07001195 def disconnect_ssh_tunnel(self, tunnel_proc):
Roshan Pius58e5dd32015-10-16 15:16:42 -07001196 """
1197 Disconnects a previously forwarded port from the server to the DUT for
1198 RPC server connection.
1199
xixuan6cf6d2f2016-01-29 15:29:00 -08001200 @param tunnel_proc: a tunnel process returned from |create_ssh_tunnel|.
Roshan Pius58e5dd32015-10-16 15:16:42 -07001201 """
1202 if tunnel_proc.poll() is None:
1203 tunnel_proc.terminate()
1204 logging.debug('Terminated tunnel, pid %d', tunnel_proc.pid)
1205 else:
1206 logging.debug('Tunnel pid %d terminated early, status %d',
1207 tunnel_proc.pid, tunnel_proc.returncode)
1208
1209
Gilad Arnolda76bef02015-09-29 13:55:15 -07001210 def get_os_type(self):
1211 """Returns the host OS descriptor (to be implemented in subclasses).
1212
1213 @return A string describing the OS type.
1214 """
Gwendal Grignou36b61702016-02-10 11:57:53 -08001215 raise NotImplementedError
Dan Shi9f92aa62017-07-27 17:07:05 -07001216
1217
1218 def check_cached_up_status(
1219 self, expiration_seconds=_DEFAULT_UP_STATUS_EXPIRATION_SECONDS):
1220 """Check if the DUT responded to ping in the past `expiration_seconds`.
1221
1222 @param expiration_seconds: The number of seconds to keep the cached
1223 status of whether the DUT responded to ping.
1224 @return: True if the DUT has responded to ping during the past
1225 `expiration_seconds`.
1226 """
1227 # Refresh the up status if any of following conditions is true:
1228 # * cached status is never set
1229 # * cached status is False, so the method can check if the host is up
1230 # again.
1231 # * If the cached status is older than `expiration_seconds`
Andrew Luo4be621d2020-03-21 07:01:13 -07001232 # If we have icmp disabled, treat that as a cached ping.
1233 if not self._use_icmp:
1234 return True
Dan Shi9f92aa62017-07-27 17:07:05 -07001235 expire_time = time.time() - expiration_seconds
1236 if (self._cached_up_status_updated is None or
1237 not self._cached_up_status or
1238 self._cached_up_status_updated < expire_time):
1239 self._cached_up_status = self.is_up_fast()
1240 self._cached_up_status_updated = time.time()
1241 return self._cached_up_status
Otabek Kasimovf5e0f102020-06-30 19:41:02 -07001242
Garry Wang81bea592020-08-27 17:25:25 -07001243 def is_file_exists(self, file_path):
1244 """Check whether a given file is exist on the host.
1245 """
1246 result = self.run('test -f ' + file_path,
1247 timeout=30,
1248 ignore_status=True)
1249 return result.exit_status == 0
Derek Beckettfc04fbc2020-12-14 16:37:31 -08001250
1251
1252def _client_symlink(sources):
1253 """Return the client symlink if in sources."""
1254 for source in sources:
1255 if source.endswith(AUTOTEST_CLIENT_SYMLINK_END):
1256 return source
1257 return None