1# Copyright (c) 2012 The Chromium OS Authors. All rights reserved. 2# Use of this source code is governed by a BSD-style license that can be 3# found in the LICENSE file. 4 5import logging 6import os 7import re 8import sys 9import time 10 11import common 12from autotest_lib.client.bin import utils 13from autotest_lib.client.common_lib import autotemp 14from autotest_lib.client.common_lib import error 15from autotest_lib.client.common_lib import global_config 16from autotest_lib.client.common_lib import hosts 17from autotest_lib.client.common_lib import lsbrelease_utils 18from autotest_lib.client.common_lib.cros import autoupdater 19from autotest_lib.client.common_lib.cros import dev_server 20from autotest_lib.client.cros import constants as client_constants 21from autotest_lib.client.cros import cros_ui 22from autotest_lib.client.cros.audio import cras_utils 23from autotest_lib.client.cros.input_playback import input_playback 24from autotest_lib.client.cros.video import constants as video_test_constants 25from autotest_lib.server import afe_utils 26from autotest_lib.server import autoserv_parser 27from autotest_lib.server import autotest 28from autotest_lib.server import constants 29from autotest_lib.server import utils as server_utils 30from autotest_lib.server.cros import provision 31from autotest_lib.server.cros.dynamic_suite import constants as ds_constants 32from autotest_lib.server.cros.dynamic_suite import tools, frontend_wrappers 33from autotest_lib.server.cros.faft.config.config import Config as FAFTConfig 34from autotest_lib.server.cros.servo import plankton 35from autotest_lib.server.hosts import abstract_ssh 36from autotest_lib.server.hosts import base_label 37from autotest_lib.server.hosts import cros_label 38from autotest_lib.server.hosts import chameleon_host 39from autotest_lib.server.hosts import cros_repair 40from autotest_lib.server.hosts import plankton_host 41from autotest_lib.server.hosts import servo_host 42from autotest_lib.site_utils.rpm_control_system import rpm_client 43 44# In case cros_host is being ran via SSP on an older Moblab version with an 45# older chromite version. 46try: 47 from chromite.lib import metrics 48except ImportError: 49 metrics = utils.metrics_mock 50 51 52CONFIG = global_config.global_config 53ENABLE_DEVSERVER_TRIGGER_AUTO_UPDATE = CONFIG.get_config_value( 54 'CROS', 'enable_devserver_trigger_auto_update', type=bool, 55 default=False) 56 57LUCID_SLEEP_BOARDS = ['samus', 'lulu'] 58 59 60class FactoryImageCheckerException(error.AutoservError): 61 """Exception raised when an image is a factory image.""" 62 pass 63 64 65class CrosHost(abstract_ssh.AbstractSSHHost): 66 """Chromium OS specific subclass of Host.""" 67 68 VERSION_PREFIX = provision.CROS_VERSION_PREFIX 69 70 _parser = autoserv_parser.autoserv_parser 71 _AFE = frontend_wrappers.RetryingAFE(timeout_min=5, delay_sec=10) 72 support_devserver_provision = ENABLE_DEVSERVER_TRIGGER_AUTO_UPDATE 73 74 # Timeout values (in seconds) associated with various Chrome OS 75 # state changes. 76 # 77 # In general, a good rule of thumb is that the timeout can be up 78 # to twice the typical measured value on the slowest platform. 79 # The times here have not necessarily been empirically tested to 80 # meet this criterion. 81 # 82 # SLEEP_TIMEOUT: Time to allow for suspend to memory. 83 # RESUME_TIMEOUT: Time to allow for resume after suspend, plus 84 # time to restart the netwowrk. 85 # SHUTDOWN_TIMEOUT: Time to allow for shut down. 86 # BOOT_TIMEOUT: Time to allow for boot from power off. Among 87 # other things, this must account for the 30 second dev-mode 88 # screen delay, time to start the network on the DUT, and the 89 # ssh timeout of 120 seconds. 90 # USB_BOOT_TIMEOUT: Time to allow for boot from a USB device, 91 # including the 30 second dev-mode delay and time to start the 92 # network. 93 # INSTALL_TIMEOUT: Time to allow for chromeos-install. 94 # POWERWASH_BOOT_TIMEOUT: Time to allow for a reboot that 95 # includes powerwash. 96 97 SLEEP_TIMEOUT = 2 98 RESUME_TIMEOUT = 10 99 SHUTDOWN_TIMEOUT = 10 100 BOOT_TIMEOUT = 150 101 USB_BOOT_TIMEOUT = 300 102 INSTALL_TIMEOUT = 480 103 POWERWASH_BOOT_TIMEOUT = 60 104 105 # Minimum OS version that supports server side packaging. Older builds may 106 # not have server side package built or with Autotest code change to support 107 # server-side packaging. 108 MIN_VERSION_SUPPORT_SSP = CONFIG.get_config_value( 109 'AUTOSERV', 'min_version_support_ssp', type=int) 110 111 # REBOOT_TIMEOUT: How long to wait for a reboot. 112 # 113 # We have a long timeout to ensure we don't flakily fail due to other 114 # issues. Shorter timeouts are vetted in platform_RebootAfterUpdate. 115 # TODO(sbasi - crbug.com/276094) Restore to 5 mins once the 'host did not 116 # return from reboot' bug is solved. 117 REBOOT_TIMEOUT = 480 118 119 # _USB_POWER_TIMEOUT: Time to allow for USB to power toggle ON and OFF. 120 # _POWER_CYCLE_TIMEOUT: Time to allow for manual power cycle. 121 _USB_POWER_TIMEOUT = 5 122 _POWER_CYCLE_TIMEOUT = 10 123 124 _RPM_RECOVERY_BOARDS = CONFIG.get_config_value('CROS', 125 'rpm_recovery_boards', type=str).split(',') 126 127 _LAB_MACHINE_FILE = '/mnt/stateful_partition/.labmachine' 128 _RPM_HOSTNAME_REGEX = ('chromeos(\d+)(-row(\d+))?-rack(\d+[a-z]*)' 129 '-host(\d+)') 130 _LIGHTSENSOR_FILES = [ "in_illuminance0_input", 131 "in_illuminance_input", 132 "in_illuminance0_raw", 133 "in_illuminance_raw", 134 "illuminance0_input"] 135 _LIGHTSENSOR_SEARCH_DIR = '/sys/bus/iio/devices' 136 137 # Constants used in ping_wait_up() and ping_wait_down(). 138 # 139 # _PING_WAIT_COUNT is the approximate number of polling 140 # cycles to use when waiting for a host state change. 141 # 142 # _PING_STATUS_DOWN and _PING_STATUS_UP are names used 143 # for arguments to the internal _ping_wait_for_status() 144 # method. 145 _PING_WAIT_COUNT = 40 146 _PING_STATUS_DOWN = False 147 _PING_STATUS_UP = True 148 149 # Allowed values for the power_method argument. 150 151 # POWER_CONTROL_RPM: Passed as default arg for power_off/on/cycle() methods. 152 # POWER_CONTROL_SERVO: Used in set_power() and power_cycle() methods. 153 # POWER_CONTROL_MANUAL: Used in set_power() and power_cycle() methods. 154 POWER_CONTROL_RPM = 'RPM' 155 POWER_CONTROL_SERVO = 'servoj10' 156 POWER_CONTROL_MANUAL = 'manual' 157 158 POWER_CONTROL_VALID_ARGS = (POWER_CONTROL_RPM, 159 POWER_CONTROL_SERVO, 160 POWER_CONTROL_MANUAL) 161 162 _RPM_OUTLET_CHANGED = 'outlet_changed' 163 164 # URL pattern to download firmware image. 165 _FW_IMAGE_URL_PATTERN = CONFIG.get_config_value( 166 'CROS', 'firmware_url_pattern', type=str) 167 168 169 # A flag file to indicate provision failures. The file is created 170 # at the start of any AU procedure (see `machine_install()`). The 171 # file's location in stateful means that on successul update it will 172 # be removed. Thus, if this file exists, it indicates that we've 173 # tried and failed in a previous attempt to update. 174 PROVISION_FAILED = '/var/tmp/provision_failed' 175 176 177 @staticmethod 178 def check_host(host, timeout=10): 179 """ 180 Check if the given host is a chrome-os host. 181 182 @param host: An ssh host representing a device. 183 @param timeout: The timeout for the run command. 184 185 @return: True if the host device is chromeos. 186 187 """ 188 try: 189 result = host.run( 190 'grep -q CHROMEOS /etc/lsb-release && ' 191 '! test -f /mnt/stateful_partition/.android_tester && ' 192 '! grep -q moblab /etc/lsb-release', 193 ignore_status=True, timeout=timeout) 194 if result.exit_status == 0: 195 lsb_release_content = host.run( 196 'grep CHROMEOS_RELEASE_BOARD /etc/lsb-release', 197 timeout=timeout).stdout 198 return not lsbrelease_utils.is_jetstream( 199 lsb_release_content=lsb_release_content) 200 except (error.AutoservRunError, error.AutoservSSHTimeout): 201 return False 202 203 return False 204 205 206 @staticmethod 207 def get_chameleon_arguments(args_dict): 208 """Extract chameleon options from `args_dict` and return the result. 209 210 Recommended usage: 211 ~~~~~~~~ 212 args_dict = utils.args_to_dict(args) 213 chameleon_args = hosts.CrosHost.get_chameleon_arguments(args_dict) 214 host = hosts.create_host(machine, chameleon_args=chameleon_args) 215 ~~~~~~~~ 216 217 @param args_dict Dictionary from which to extract the chameleon 218 arguments. 219 """ 220 return {key: args_dict[key] 221 for key in ('chameleon_host', 'chameleon_port') 222 if key in args_dict} 223 224 225 @staticmethod 226 def get_plankton_arguments(args_dict): 227 """Extract chameleon options from `args_dict` and return the result. 228 229 Recommended usage: 230 ~~~~~~~~ 231 args_dict = utils.args_to_dict(args) 232 plankton_args = hosts.CrosHost.get_plankton_arguments(args_dict) 233 host = hosts.create_host(machine, plankton_args=plankton_args) 234 ~~~~~~~~ 235 236 @param args_dict Dictionary from which to extract the plankton 237 arguments. 238 """ 239 return {key: args_dict[key] 240 for key in ('plankton_host', 'plankton_port') 241 if key in args_dict} 242 243 244 @staticmethod 245 def get_servo_arguments(args_dict): 246 """Extract servo options from `args_dict` and return the result. 247 248 Recommended usage: 249 ~~~~~~~~ 250 args_dict = utils.args_to_dict(args) 251 servo_args = hosts.CrosHost.get_servo_arguments(args_dict) 252 host = hosts.create_host(machine, servo_args=servo_args) 253 ~~~~~~~~ 254 255 @param args_dict Dictionary from which to extract the servo 256 arguments. 257 """ 258 servo_attrs = (servo_host.SERVO_HOST_ATTR, 259 servo_host.SERVO_PORT_ATTR, 260 servo_host.SERVO_BOARD_ATTR) 261 return {key: args_dict[key] 262 for key in servo_attrs 263 if key in args_dict} 264 265 266 def _initialize(self, hostname, chameleon_args=None, servo_args=None, 267 plankton_args=None, try_lab_servo=False, 268 try_servo_repair=False, 269 ssh_verbosity_flag='', ssh_options='', 270 *args, **dargs): 271 """Initialize superclasses, |self.chameleon|, and |self.servo|. 272 273 This method will attempt to create the test-assistant object 274 (chameleon/servo) when it is needed by the test. Check 275 the docstring of chameleon_host.create_chameleon_host and 276 servo_host.create_servo_host for how this is determined. 277 278 @param hostname: Hostname of the dut. 279 @param chameleon_args: A dictionary that contains args for creating 280 a ChameleonHost. See chameleon_host for details. 281 @param servo_args: A dictionary that contains args for creating 282 a ServoHost object. See servo_host for details. 283 @param try_lab_servo: When true, indicates that an attempt should 284 be made to create a ServoHost for a DUT in 285 the test lab, even if not required by 286 `servo_args`. See servo_host for details. 287 @param try_servo_repair: If a servo host is created, check it 288 with `repair()` rather than `verify()`. 289 See servo_host for details. 290 @param ssh_verbosity_flag: String, to pass to the ssh command to control 291 verbosity. 292 @param ssh_options: String, other ssh options to pass to the ssh 293 command. 294 """ 295 super(CrosHost, self)._initialize(hostname=hostname, 296 *args, **dargs) 297 self._repair_strategy = cros_repair.create_cros_repair_strategy() 298 self.labels = base_label.LabelRetriever(cros_label.CROS_LABELS) 299 # self.env is a dictionary of environment variable settings 300 # to be exported for commands run on the host. 301 # LIBC_FATAL_STDERR_ can be useful for diagnosing certain 302 # errors that might happen. 303 self.env['LIBC_FATAL_STDERR_'] = '1' 304 self._ssh_verbosity_flag = ssh_verbosity_flag 305 self._ssh_options = ssh_options 306 # TODO(fdeng): We need to simplify the 307 # process of servo and servo_host initialization. 308 # crbug.com/298432 309 self._servo_host = servo_host.create_servo_host( 310 dut=self, servo_args=servo_args, 311 try_lab_servo=try_lab_servo, 312 try_servo_repair=try_servo_repair) 313 if self._servo_host is not None: 314 self.servo = self._servo_host.get_servo() 315 else: 316 self.servo = None 317 318 # TODO(waihong): Do the simplication on Chameleon too. 319 self._chameleon_host = chameleon_host.create_chameleon_host( 320 dut=self.hostname, chameleon_args=chameleon_args) 321 # Add plankton host if plankton args were added on command line 322 self._plankton_host = plankton_host.create_plankton_host(plankton_args) 323 324 if self._chameleon_host: 325 self.chameleon = self._chameleon_host.create_chameleon_board() 326 else: 327 self.chameleon = None 328 329 if self._plankton_host: 330 self.plankton_servo = self._plankton_host.get_servo() 331 logging.info('plankton_servo: %r', self.plankton_servo) 332 # Create the plankton object used to access the ec uart 333 self.plankton = plankton.Plankton(self.plankton_servo, 334 self._plankton_host.get_servod_server_proxy()) 335 else: 336 self.plankton = None 337 338 339 def _get_cros_repair_image_name(self): 340 info = self.host_info_store.get() 341 if info.board is None: 342 raise error.AutoservError('Cannot obtain repair image name. ' 343 'No board label value found') 344 345 return afe_utils.get_stable_cros_image_name(info.board) 346 347 348 def verify_job_repo_url(self, tag=''): 349 """ 350 Make sure job_repo_url of this host is valid. 351 352 Eg: The job_repo_url "http://lmn.cd.ab.xyx:8080/static/\ 353 lumpy-release/R29-4279.0.0/autotest/packages" claims to have the 354 autotest package for lumpy-release/R29-4279.0.0. If this isn't the case, 355 download and extract it. If the devserver embedded in the url is 356 unresponsive, update the job_repo_url of the host after staging it on 357 another devserver. 358 359 @param job_repo_url: A url pointing to the devserver where the autotest 360 package for this build should be staged. 361 @param tag: The tag from the server job, in the format 362 <job_id>-<user>/<hostname>, or <hostless> for a server job. 363 364 @raises DevServerException: If we could not resolve a devserver. 365 @raises AutoservError: If we're unable to save the new job_repo_url as 366 a result of choosing a new devserver because the old one failed to 367 respond to a health check. 368 @raises urllib2.URLError: If the devserver embedded in job_repo_url 369 doesn't respond within the timeout. 370 """ 371 info = self.host_info_store.get() 372 job_repo_url = info.attributes.get(ds_constants.JOB_REPO_URL, '') 373 if not job_repo_url: 374 logging.warning('No job repo url set on host %s', self.hostname) 375 return 376 377 logging.info('Verifying job repo url %s', job_repo_url) 378 devserver_url, image_name = tools.get_devserver_build_from_package_url( 379 job_repo_url) 380 381 ds = dev_server.ImageServer(devserver_url) 382 383 logging.info('Staging autotest artifacts for %s on devserver %s', 384 image_name, ds.url()) 385 386 start_time = time.time() 387 ds.stage_artifacts(image_name, ['autotest_packages']) 388 stage_time = time.time() - start_time 389 390 # Record how much of the verification time comes from a devserver 391 # restage. If we're doing things right we should not see multiple 392 # devservers for a given board/build/branch path. 393 try: 394 board, build_type, branch = server_utils.ParseBuildName( 395 image_name)[:3] 396 except server_utils.ParseBuildNameException: 397 pass 398 else: 399 devserver = devserver_url[ 400 devserver_url.find('/') + 2:devserver_url.rfind(':')] 401 stats_key = { 402 'board': board, 403 'build_type': build_type, 404 'branch': branch, 405 'devserver': devserver.replace('.', '_'), 406 } 407 408 monarch_fields = { 409 'board': board, 410 'build_type': build_type, 411 # TODO(akeshet): To be consistent with most other metrics, 412 # consider changing the following field to be named 413 # 'milestone'. 414 'branch': branch, 415 'dev_server': devserver, 416 } 417 metrics.Counter( 418 'chromeos/autotest/provision/verify_url' 419 ).increment(fields=monarch_fields) 420 metrics.SecondsDistribution( 421 'chromeos/autotest/provision/verify_url_duration' 422 ).add(stage_time, fields=monarch_fields) 423 424 425 def stage_server_side_package(self, image=None): 426 """Stage autotest server-side package on devserver. 427 428 @param image: Full path of an OS image to install or a build name. 429 430 @return: A url to the autotest server-side package. 431 432 @raise: error.AutoservError if fail to locate the build to test with, or 433 fail to stage server-side package. 434 """ 435 # If enable_drone_in_restricted_subnet is False, do not set hostname 436 # in devserver.resolve call, so a devserver in non-restricted subnet 437 # is picked to stage autotest server package for drone to download. 438 hostname = self.hostname 439 if not server_utils.ENABLE_DRONE_IN_RESTRICTED_SUBNET: 440 hostname = None 441 if image: 442 image_name = tools.get_build_from_image(image) 443 if not image_name: 444 raise error.AutoservError( 445 'Failed to parse build name from %s' % image) 446 ds = dev_server.ImageServer.resolve(image_name, hostname) 447 else: 448 info = self.host_info_store.get() 449 job_repo_url = info.attributes.get(ds_constants.JOB_REPO_URL, '') 450 if job_repo_url: 451 devserver_url, image_name = ( 452 tools.get_devserver_build_from_package_url(job_repo_url)) 453 # If enable_drone_in_restricted_subnet is True, use the 454 # existing devserver. Otherwise, resolve a new one in 455 # non-restricted subnet. 456 if server_utils.ENABLE_DRONE_IN_RESTRICTED_SUBNET: 457 ds = dev_server.ImageServer(devserver_url) 458 else: 459 ds = dev_server.ImageServer.resolve(image_name) 460 elif info.build is not None: 461 ds = dev_server.ImageServer.resolve(info.build, hostname) 462 image_name = info.build 463 else: 464 raise error.AutoservError( 465 'Failed to stage server-side package. The host has ' 466 'no job_report_url attribute or version label.') 467 468 # Get the OS version of the build, for any build older than 469 # MIN_VERSION_SUPPORT_SSP, server side packaging is not supported. 470 match = re.match('.*/R\d+-(\d+)\.', image_name) 471 if match and int(match.group(1)) < self.MIN_VERSION_SUPPORT_SSP: 472 raise error.AutoservError( 473 'Build %s is older than %s. Server side packaging is ' 474 'disabled.' % (image_name, self.MIN_VERSION_SUPPORT_SSP)) 475 476 ds.stage_artifacts(image_name, ['autotest_server_package']) 477 return '%s/static/%s/%s' % (ds.url(), image_name, 478 'autotest_server_package.tar.bz2') 479 480 481 def _try_stateful_update(self, update_url, force_update, updater): 482 """Try to use stateful update to initialize DUT. 483 484 When DUT is already running the same version that machine_install 485 tries to install, stateful update is a much faster way to clean up 486 the DUT for testing, compared to a full reimage. It is implemeted 487 by calling autoupdater.run_update, but skipping updating root, as 488 updating the kernel is time consuming and not necessary. 489 490 @param update_url: url of the image. 491 @param force_update: Set to True to update the image even if the DUT 492 is running the same version. 493 @param updater: ChromiumOSUpdater instance used to update the DUT. 494 @returns: True if the DUT was updated with stateful update. 495 496 """ 497 self.prepare_for_update() 498 499 # TODO(jrbarnette): Yes, I hate this re.match() test case. 500 # It's better than the alternative: see crbug.com/360944. 501 image_name = autoupdater.url_to_image_name(update_url) 502 release_pattern = r'^.*-release/R[0-9]+-[0-9]+\.[0-9]+\.0$' 503 if not re.match(release_pattern, image_name): 504 return False 505 if not updater.check_version(): 506 return False 507 if not force_update: 508 logging.info('Canceling stateful update because the new and ' 509 'old versions are the same.') 510 return False 511 # Following folders should be rebuilt after stateful update. 512 # A test file is used to confirm each folder gets rebuilt after 513 # the stateful update. 514 folders_to_check = ['/var', '/home', '/mnt/stateful_partition'] 515 test_file = '.test_file_to_be_deleted' 516 for folder in folders_to_check: 517 touch_path = os.path.join(folder, test_file) 518 self.run('touch %s' % touch_path) 519 520 updater.run_update(update_root=False) 521 522 # Reboot to complete stateful update. 523 self.reboot(timeout=self.REBOOT_TIMEOUT, wait=True) 524 525 # After stateful update and a reboot, all of the test_files shouldn't 526 # exist any more. Otherwise the stateful update is failed. 527 return not any( 528 self.path_exists(os.path.join(folder, test_file)) 529 for folder in folders_to_check) 530 531 532 def _post_update_processing(self, updater, expected_kernel=None): 533 """After the DUT is updated, confirm machine_install succeeded. 534 535 @param updater: ChromiumOSUpdater instance used to update the DUT. 536 @param expected_kernel: kernel expected to be active after reboot, 537 or `None` to skip rollback checking. 538 539 """ 540 # Touch the lab machine file to leave a marker that 541 # distinguishes this image from other test images. 542 # Afterwards, we must re-run the autoreboot script because 543 # it depends on the _LAB_MACHINE_FILE. 544 autoreboot_cmd = ('FILE="%s" ; [ -f "$FILE" ] || ' 545 '( touch "$FILE" ; start autoreboot )') 546 self.run(autoreboot_cmd % self._LAB_MACHINE_FILE) 547 updater.verify_boot_expectations( 548 expected_kernel, rollback_message= 549 'Build %s failed to boot on %s; system rolled back to previous ' 550 'build' % (updater.update_version, self.hostname)) 551 # Check that we've got the build we meant to install. 552 if not updater.check_version_to_confirm_install(): 553 raise autoupdater.ChromiumOSError( 554 'Failed to update %s to build %s; found build ' 555 '%s instead' % (self.hostname, 556 updater.update_version, 557 self.get_release_version())) 558 559 logging.debug('Cleaning up old autotest directories.') 560 try: 561 installed_autodir = autotest.Autotest.get_installed_autodir(self) 562 self.run('rm -rf ' + installed_autodir) 563 except autotest.AutodirNotFoundError: 564 logging.debug('No autotest installed directory found.') 565 566 567 def _stage_image_for_update(self, image_name=None): 568 """Stage a build on a devserver and return the update_url and devserver. 569 570 @param image_name: a name like lumpy-release/R27-3837.0.0 571 @returns a tuple with an update URL like: 572 http://172.22.50.205:8082/update/lumpy-release/R27-3837.0.0 573 and the devserver instance. 574 """ 575 if not image_name: 576 image_name = self._get_cros_repair_image_name() 577 logging.info('Staging build for AU: %s', image_name) 578 devserver = dev_server.ImageServer.resolve(image_name, self.hostname) 579 devserver.trigger_download(image_name, synchronous=False) 580 return (tools.image_url_pattern() % (devserver.url(), image_name), 581 devserver) 582 583 584 def stage_image_for_servo(self, image_name=None): 585 """Stage a build on a devserver and return the update_url. 586 587 @param image_name: a name like lumpy-release/R27-3837.0.0 588 @returns an update URL like: 589 http://172.22.50.205:8082/update/lumpy-release/R27-3837.0.0 590 """ 591 if not image_name: 592 image_name = self._get_cros_repair_image_name() 593 logging.info('Staging build for servo install: %s', image_name) 594 devserver = dev_server.ImageServer.resolve(image_name, self.hostname) 595 devserver.stage_artifacts(image_name, ['test_image']) 596 return devserver.get_test_image_url(image_name) 597 598 599 def stage_factory_image_for_servo(self, image_name): 600 """Stage a build on a devserver and return the update_url. 601 602 @param image_name: a name like <baord>/4262.204.0 603 604 @return: An update URL, eg: 605 http://<devserver>/static/canary-channel/\ 606 <board>/4262.204.0/factory_test/chromiumos_factory_image.bin 607 608 @raises: ValueError if the factory artifact name is missing from 609 the config. 610 611 """ 612 if not image_name: 613 logging.error('Need an image_name to stage a factory image.') 614 return 615 616 factory_artifact = CONFIG.get_config_value( 617 'CROS', 'factory_artifact', type=str, default='') 618 if not factory_artifact: 619 raise ValueError('Cannot retrieve the factory artifact name from ' 620 'autotest config, and hence cannot stage factory ' 621 'artifacts.') 622 623 logging.info('Staging build for servo install: %s', image_name) 624 devserver = dev_server.ImageServer.resolve(image_name, self.hostname) 625 devserver.stage_artifacts( 626 image_name, 627 [factory_artifact], 628 archive_url=None) 629 630 return tools.factory_image_url_pattern() % (devserver.url(), image_name) 631 632 633 def _get_au_monarch_fields(self, devserver, build): 634 """Form monarch fields by given devserve & build for auto-update. 635 636 @param devserver: the devserver (ImageServer instance) for auto-update. 637 @param build: the build to be updated. 638 639 @return A dictionary of monach fields. 640 """ 641 try: 642 board, build_type, milestone, _ = server_utils.ParseBuildName(build) 643 except server_utils.ParseBuildNameException: 644 logging.warning('Unable to parse build name %s. Something is ' 645 'likely broken, but will continue anyway.', 646 build) 647 board, build_type, milestone = ('', '', '') 648 649 monarch_fields = { 650 'dev_server': devserver.hostname, 651 'board': board, 652 'build_type': build_type, 653 'milestone': milestone 654 } 655 return monarch_fields 656 657 658 def _retry_auto_update_with_new_devserver(self, build, last_devserver, 659 force_update, force_full_update, 660 force_original): 661 """Kick off auto-update by devserver and send metrics. 662 663 @param build: the build to update. 664 @param last_devserver: the last devserver that failed to provision. 665 @param force_update: see |machine_install_by_devserver|'s force_udpate 666 for details. 667 @param force_full_update: see |machine_install_by_devserver|'s 668 force_full_update for details. 669 @param force_original: Whether to force stateful update with the 670 original payload. 671 672 @return the result of |auto_update| in dev_server. 673 """ 674 devserver = dev_server.resolve( 675 build, self.hostname, ban_list=[last_devserver.url()]) 676 devserver.trigger_download(build, synchronous=False) 677 monarch_fields = self._get_au_monarch_fields(devserver, build) 678 logging.debug('Retry auto_update: resolved devserver for ' 679 'auto-update: %s', devserver.url()) 680 681 # Add metrics 682 install_with_dev_counter = metrics.Counter( 683 'chromeos/autotest/provision/install_with_devserver') 684 install_with_dev_counter.increment(fields=monarch_fields) 685 c = metrics.Counter( 686 'chromeos/autotest/provision/retry_by_devserver') 687 monarch_fields['last_devserver'] = last_devserver.hostname 688 monarch_fields['host'] = self.hostname 689 c.increment(fields=monarch_fields) 690 691 # Won't retry auto_update in a retry of auto-update. 692 # In other words, we only retry auto-update once with a different 693 # devservers. 694 devserver.auto_update( 695 self.hostname, build, 696 original_board=self.get_board().replace( 697 ds_constants.BOARD_PREFIX, ''), 698 original_release_version=self.get_release_version(), 699 log_dir=self.job.resultdir, 700 force_update=force_update, 701 full_update=force_full_update, 702 force_original=force_original) 703 704 705 def machine_install_by_devserver(self, update_url=None, force_update=False, 706 local_devserver=False, repair=False, 707 force_full_update=False): 708 """Ultiize devserver to install the DUT. 709 710 (TODO) crbugs.com/627269: The logic in this function has some overlap 711 with those in function machine_install. The merge will be done later, 712 not in the same CL. 713 714 @param update_url: The update_url or build for the host to update. 715 @param force_update: Force an update even if the version installed 716 is the same. Default:False 717 @param local_devserver: Used by test_that to allow people to 718 use their local devserver. Default: False 719 @param repair: Forces update to repair image. Implies force_update. 720 @param force_full_update: If True, do not attempt to run stateful 721 update, force a full reimage. If False, try stateful update 722 first when the dut is already installed with the same version. 723 @raises autoupdater.ChromiumOSError 724 725 @returns A tuple of (image_name, host_attributes). 726 image_name is the name of image installed, e.g., 727 veyron_jerry-release/R50-7871.0.0 728 host_attributes is a dictionary of (attribute, value), which 729 can be saved to afe_host_attributes table in database. This 730 method returns a dictionary with a single entry of 731 `job_repo_url`: repo_url, where repo_url is a devserver url to 732 autotest packages. 733 """ 734 if repair: 735 update_url = self._get_cros_repair_image_name() 736 force_update = True 737 738 if not update_url and not self._parser.options.image: 739 raise error.AutoservError( 740 'There is no update URL, nor a method to get one.') 741 742 if not update_url and self._parser.options.image: 743 update_url = self._parser.options.image 744 745 746 # Get build from parameter or AFE. 747 # If the build is not a URL, let devserver to stage it first. 748 # Otherwise, choose a devserver to trigger auto-update. 749 build = None 750 devserver = None 751 logging.debug('Resolving a devserver for auto-update') 752 previously_resolved = False 753 if update_url.startswith('http://'): 754 build = autoupdater.url_to_image_name(update_url) 755 previously_resolved = True 756 else: 757 build = update_url 758 devserver = dev_server.resolve(build, self.hostname) 759 server_name = devserver.hostname 760 761 monarch_fields = self._get_au_monarch_fields(devserver, build) 762 763 if previously_resolved: 764 # Make sure devserver for Auto-Update has staged the build. 765 if server_name not in update_url: 766 logging.debug('Resolved to devserver that does not match ' 767 'update_url. The previously resolved devserver ' 768 'must be unhealthy. Switching to use devserver %s,' 769 ' and re-staging.', 770 server_name) 771 logging.info('Staging build for AU: %s', update_url) 772 devserver.trigger_download(build, synchronous=False) 773 c = metrics.Counter( 774 'chromeos/autotest/provision/failover_download') 775 c.increment(fields=monarch_fields) 776 else: 777 logging.info('Staging build for AU: %s', update_url) 778 devserver.trigger_download(build, synchronous=False) 779 c = metrics.Counter('chromeos/autotest/provision/trigger_download') 780 c.increment(fields=monarch_fields) 781 782 # Report provision stats. 783 install_with_dev_counter = metrics.Counter( 784 'chromeos/autotest/provision/install_with_devserver') 785 install_with_dev_counter.increment(fields=monarch_fields) 786 logging.debug('Resolved devserver for auto-update: %s', devserver.url()) 787 788 # and other metrics from this function. 789 metrics.Counter('chromeos/autotest/provision/resolve' 790 ).increment(fields=monarch_fields) 791 792 force_original = self.get_chromeos_release_milestone() is None 793 794 try: 795 devserver.auto_update( 796 self.hostname, build, 797 original_board=self.get_board().replace( 798 ds_constants.BOARD_PREFIX, ''), 799 original_release_version=self.get_release_version(), 800 log_dir=self.job.resultdir, 801 force_update=force_update, 802 full_update=force_full_update, 803 force_original=force_original) 804 except dev_server.RetryableProvisionException: 805 # It indicates that last provision failed due to devserver load 806 # issue, so another devserver is resolved to kick off provision 807 # job once again and only once. 808 logging.debug('Provision failed due to devserver issue,' 809 'retry it with another devserver.') 810 811 # Check first whether this DUT is completely offline. If so, skip 812 # the following provision tries. 813 logging.debug('Checking whether host %s is online.', self.hostname) 814 if utils.ping(self.hostname, tries=1, deadline=1) == 0: 815 self._retry_auto_update_with_new_devserver( 816 build, devserver, force_update, force_full_update, 817 force_original) 818 else: 819 raise error.AutoservError( 820 'No answer to ping from %s' % self.hostname) 821 822 # The reason to resolve a new devserver in function machine_install 823 # is mostly because that the update_url there may has a strange format, 824 # and it's hard to parse the devserver url from it. 825 # Since we already resolve a devserver to trigger auto-update, the same 826 # devserver is used to form JOB_REPO_URL here. Verified in local test. 827 repo_url = tools.get_package_url(devserver.url(), build) 828 return build, {ds_constants.JOB_REPO_URL: repo_url} 829 830 831 def prepare_for_update(self): 832 """Prepares the DUT for an update. 833 834 Subclasses may override this to perform any special actions 835 required before updating. 836 """ 837 pass 838 839 840 def machine_install(self, update_url=None, force_update=False, 841 local_devserver=False, repair=False, 842 force_full_update=False): 843 """Install the DUT. 844 845 Use stateful update if the DUT is already running the same build. 846 Stateful update does not update kernel and tends to run much faster 847 than a full reimage. If the DUT is running a different build, or it 848 failed to do a stateful update, full update, including kernel update, 849 will be applied to the DUT. 850 851 Once a host enters machine_install its host attribute job_repo_url 852 (used for package install) will be removed and then updated. 853 854 @param update_url: The url to use for the update 855 pattern: http://$devserver:###/update/$build 856 If update_url is None and repair is True we will install the 857 stable image listed in afe_stable_versions table. If the table 858 is not setup, global_config value under CROS.stable_cros_version 859 will be used instead. 860 @param force_update: Force an update even if the version installed 861 is the same. Default:False 862 @param local_devserver: Used by test_that to allow people to 863 use their local devserver. Default: False 864 @param repair: Forces update to repair image. Implies force_update. 865 @param force_full_update: If True, do not attempt to run stateful 866 update, force a full reimage. If False, try stateful update 867 first when the dut is already installed with the same version. 868 @raises autoupdater.ChromiumOSError 869 870 @returns A tuple of (image_name, host_attributes). 871 image_name is the name of image installed, e.g., 872 veyron_jerry-release/R50-7871.0.0 873 host_attributes is a dictionary of (attribute, value), which 874 can be saved to afe_host_attributes table in database. This 875 method returns a dictionary with a single entry of 876 `job_repo_url`: repo_url, where repo_url is a devserver url to 877 autotest packages. 878 """ 879 devserver = None 880 if repair: 881 update_url, devserver = self._stage_image_for_update() 882 force_update = True 883 884 if not update_url and not self._parser.options.image: 885 raise error.AutoservError( 886 'There is no update URL, nor a method to get one.') 887 888 if not update_url and self._parser.options.image: 889 # This is the base case where we have no given update URL i.e. 890 # dynamic suites logic etc. This is the most flexible case where we 891 # can serve an update from any of our fleet of devservers. 892 requested_build = self._parser.options.image 893 if not requested_build.startswith('http://'): 894 logging.debug('Update will be staged for this installation') 895 update_url, devserver = self._stage_image_for_update( 896 requested_build) 897 else: 898 update_url = requested_build 899 900 logging.debug('Update URL is %s', update_url) 901 902 # Report provision stats. 903 server_name = dev_server.get_hostname(update_url) 904 (metrics.Counter('chromeos/autotest/provision/install') 905 .increment(fields={'devserver': server_name})) 906 907 # Create a file to indicate if provision fails. The file will be removed 908 # by stateful update or full install. 909 self.run('touch %s' % self.PROVISION_FAILED) 910 911 update_complete = False 912 updater = autoupdater.ChromiumOSUpdater( 913 update_url, host=self, local_devserver=local_devserver) 914 if not force_full_update: 915 try: 916 # If the DUT is already running the same build, try stateful 917 # update first as it's much quicker than a full re-image. 918 update_complete = self._try_stateful_update( 919 update_url, force_update, updater) 920 except Exception as e: 921 logging.exception(e) 922 923 inactive_kernel = None 924 if update_complete or (not force_update and updater.check_version()): 925 logging.info('Install complete without full update') 926 else: 927 logging.info('DUT requires full update.') 928 self.reboot(timeout=self.REBOOT_TIMEOUT, wait=True) 929 self.prepare_for_update() 930 931 num_of_attempts = provision.FLAKY_DEVSERVER_ATTEMPTS 932 933 while num_of_attempts > 0: 934 num_of_attempts -= 1 935 try: 936 updater.run_update() 937 except Exception: 938 logging.warn('Autoupdate did not complete.') 939 # Do additional check for the devserver health. Ideally, 940 # the autoupdater.py could raise an exception when it 941 # detected network flake but that would require 942 # instrumenting the update engine and parsing it log. 943 if (num_of_attempts <= 0 or 944 devserver is None or 945 dev_server.ImageServer.devserver_healthy( 946 devserver.url())): 947 raise 948 949 logging.warn('Devserver looks unhealthy. Trying another') 950 update_url, devserver = self._stage_image_for_update( 951 requested_build) 952 logging.debug('New Update URL is %s', update_url) 953 updater = autoupdater.ChromiumOSUpdater( 954 update_url, host=self, 955 local_devserver=local_devserver) 956 else: 957 break 958 959 # Give it some time in case of IO issues. 960 time.sleep(10) 961 962 # Figure out active and inactive kernel. 963 active_kernel, inactive_kernel = updater.get_kernel_state() 964 965 # Ensure inactive kernel has higher priority than active. 966 if (updater.get_kernel_priority(inactive_kernel) 967 < updater.get_kernel_priority(active_kernel)): 968 raise autoupdater.ChromiumOSError( 969 'Update failed. The priority of the inactive kernel' 970 ' partition is less than that of the active kernel' 971 ' partition.') 972 973 # Updater has returned successfully; reboot the host. 974 # 975 # Regarding the 'crossystem' command: In some cases, the 976 # TPM gets into a state such that it fails verification. 977 # We don't know why. However, this call papers over the 978 # problem by clearing the TPM during the reboot. 979 # 980 # We ignore failures from 'crossystem'. Although failure 981 # here is unexpected, and could signal a bug, the point 982 # of the exercise is to paper over problems; allowing 983 # this to fail would defeat the purpose. 984 self.run('crossystem clear_tpm_owner_request=1', 985 ignore_status=True) 986 self.reboot(timeout=self.REBOOT_TIMEOUT, wait=True) 987 988 self._post_update_processing(updater, inactive_kernel) 989 image_name = autoupdater.url_to_image_name(update_url) 990 # update_url is different from devserver url needed to stage autotest 991 # packages, therefore, resolve a new devserver url here. 992 devserver_url = dev_server.ImageServer.resolve(image_name, 993 self.hostname).url() 994 repo_url = tools.get_package_url(devserver_url, image_name) 995 return image_name, {ds_constants.JOB_REPO_URL: repo_url} 996 997 998 def _clear_fw_version_labels(self, rw_only): 999 """Clear firmware version labels from the machine. 1000 1001 @param rw_only: True to only clear fwrw_version; otherewise, clear 1002 both fwro_version and fwrw_version. 1003 """ 1004 labels = self._AFE.get_labels( 1005 name__startswith=provision.FW_RW_VERSION_PREFIX, 1006 host__hostname=self.hostname) 1007 if not rw_only: 1008 labels = labels + self._AFE.get_labels( 1009 name__startswith=provision.FW_RO_VERSION_PREFIX, 1010 host__hostname=self.hostname) 1011 for label in labels: 1012 label.remove_hosts(hosts=[self.hostname]) 1013 1014 1015 def _add_fw_version_label(self, build, rw_only): 1016 """Add firmware version label to the machine. 1017 1018 @param build: Build of firmware. 1019 @param rw_only: True to only add fwrw_version; otherwise, add both 1020 fwro_version and fwrw_version. 1021 1022 """ 1023 fw_label = provision.fwrw_version_to_label(build) 1024 self._AFE.run('label_add_hosts', id=fw_label, hosts=[self.hostname]) 1025 if not rw_only: 1026 fw_label = provision.fwro_version_to_label(build) 1027 self._AFE.run('label_add_hosts', id=fw_label, hosts=[self.hostname]) 1028 1029 1030 def firmware_install(self, build=None, rw_only=False): 1031 """Install firmware to the DUT. 1032 1033 Use stateful update if the DUT is already running the same build. 1034 Stateful update does not update kernel and tends to run much faster 1035 than a full reimage. If the DUT is running a different build, or it 1036 failed to do a stateful update, full update, including kernel update, 1037 will be applied to the DUT. 1038 1039 Once a host enters firmware_install its fw[ro|rw]_version label will 1040 be removed. After the firmware is updated successfully, a new 1041 fw[ro|rw]_version label will be added to the host. 1042 1043 @param build: The build version to which we want to provision the 1044 firmware of the machine, 1045 e.g. 'link-firmware/R22-2695.1.144'. 1046 @param rw_only: True to only install firmware to its RW portions. Keep 1047 the RO portions unchanged. 1048 1049 TODO(dshi): After bug 381718 is fixed, update here with corresponding 1050 exceptions that could be raised. 1051 1052 """ 1053 if not self.servo: 1054 raise error.TestError('Host %s does not have servo.' % 1055 self.hostname) 1056 1057 # Get the DUT board name from servod. 1058 board = self.servo.get_board() 1059 1060 # If build is not set, try to install firmware from stable CrOS. 1061 if not build: 1062 build = afe_utils.get_stable_faft_version(board) 1063 if not build: 1064 raise error.TestError( 1065 'Failed to find stable firmware build for %s.', 1066 self.hostname) 1067 logging.info('Will install firmware from build %s.', build) 1068 1069 config = FAFTConfig(board) 1070 if config.use_u_boot: 1071 ap_image = 'image-%s.bin' % board 1072 else: # Depthcharge platform 1073 ap_image = 'image.bin' 1074 ec_image = 'ec.bin' 1075 ds = dev_server.ImageServer.resolve(build, self.hostname) 1076 ds.stage_artifacts(build, ['firmware']) 1077 1078 tmpd = autotemp.tempdir(unique_id='fwimage') 1079 try: 1080 fwurl = self._FW_IMAGE_URL_PATTERN % (ds.url(), build) 1081 local_tarball = os.path.join(tmpd.name, os.path.basename(fwurl)) 1082 ds.download_file(fwurl, local_tarball) 1083 1084 self._clear_fw_version_labels(rw_only) 1085 if config.chrome_ec: 1086 logging.info('Will re-program EC %snow', 'RW ' if rw_only else '') 1087 server_utils.system('tar xf %s -C %s %s' % 1088 (local_tarball, tmpd.name, ec_image), 1089 timeout=60) 1090 self.servo.program_ec(os.path.join(tmpd.name, ec_image), rw_only) 1091 else: 1092 logging.info('Not a Chrome EC, ignore re-programing it') 1093 logging.info('Will re-program BIOS %snow', 'RW ' if rw_only else '') 1094 server_utils.system('tar xf %s -C %s %s' % 1095 (local_tarball, tmpd.name, ap_image), 1096 timeout=60) 1097 self.servo.program_bios(os.path.join(tmpd.name, ap_image), rw_only) 1098 self.servo.get_power_state_controller().reset() 1099 time.sleep(self.servo.BOOT_DELAY) 1100 if utils.host_is_in_lab_zone(self.hostname): 1101 self._add_fw_version_label(build, rw_only) 1102 finally: 1103 tmpd.clean() 1104 1105 1106 def show_update_engine_log(self): 1107 """Output update engine log.""" 1108 logging.debug('Dumping %s', client_constants.UPDATE_ENGINE_LOG) 1109 self.run('cat %s' % client_constants.UPDATE_ENGINE_LOG) 1110 1111 1112 def _get_board_from_afe(self): 1113 """Retrieve this host's board from its labels stored locally. 1114 1115 Looks for a host label of the form "board:<board>", and 1116 returns the "<board>" part of the label. `None` is returned 1117 if there is not a single, unique label matching the pattern. 1118 1119 @returns board from label, or `None`. 1120 """ 1121 board = afe_utils.get_board(self) 1122 if board is None: 1123 raise error.AutoservError('DUT cannot be repaired, ' 1124 'there is no board attribute.') 1125 return board 1126 1127 1128 def servo_install(self, image_url=None, usb_boot_timeout=USB_BOOT_TIMEOUT, 1129 install_timeout=INSTALL_TIMEOUT): 1130 """ 1131 Re-install the OS on the DUT by: 1132 1) installing a test image on a USB storage device attached to the Servo 1133 board, 1134 2) booting that image in recovery mode, and then 1135 3) installing the image with chromeos-install. 1136 1137 @param image_url: If specified use as the url to install on the DUT. 1138 otherwise boot the currently staged image on the USB stick. 1139 @param usb_boot_timeout: The usb_boot_timeout to use during reimage. 1140 Factory images need a longer usb_boot_timeout than regular 1141 cros images. 1142 @param install_timeout: The timeout to use when installing the chromeos 1143 image. Factory images need a longer install_timeout. 1144 1145 @raises AutoservError if the image fails to boot. 1146 1147 """ 1148 logging.info('Downloading image to USB, then booting from it. Usb boot ' 1149 'timeout = %s', usb_boot_timeout) 1150 with metrics.SecondsTimer( 1151 'chromeos/autotest/provision/servo_install/boot_duration'): 1152 self.servo.install_recovery_image(image_url) 1153 if not self.wait_up(timeout=usb_boot_timeout): 1154 raise hosts.AutoservRepairError( 1155 'DUT failed to boot from USB after %d seconds' % 1156 usb_boot_timeout) 1157 1158 # The new chromeos-tpm-recovery has been merged since R44-7073.0.0. 1159 # In old CrOS images, this command fails. Skip the error. 1160 logging.info('Resetting the TPM status') 1161 try: 1162 self.run('chromeos-tpm-recovery') 1163 except error.AutoservRunError: 1164 logging.warn('chromeos-tpm-recovery is too old.') 1165 1166 1167 with metrics.SecondsTimer( 1168 'chromeos/autotest/provision/servo_install/install_duration'): 1169 logging.info('Installing image through chromeos-install.') 1170 self.run('chromeos-install --yes', timeout=install_timeout) 1171 self.halt() 1172 1173 logging.info('Power cycling DUT through servo.') 1174 self.servo.get_power_state_controller().power_off() 1175 self.servo.switch_usbkey('off') 1176 # N.B. The Servo API requires that we use power_on() here 1177 # for two reasons: 1178 # 1) After turning on a DUT in recovery mode, you must turn 1179 # it off and then on with power_on() once more to 1180 # disable recovery mode (this is a Parrot specific 1181 # requirement). 1182 # 2) After power_off(), the only way to turn on is with 1183 # power_on() (this is a Storm specific requirement). 1184 self.servo.get_power_state_controller().power_on() 1185 1186 logging.info('Waiting for DUT to come back up.') 1187 if not self.wait_up(timeout=self.BOOT_TIMEOUT): 1188 raise error.AutoservError('DUT failed to reboot installed ' 1189 'test image after %d seconds' % 1190 self.BOOT_TIMEOUT) 1191 1192 1193 def repair_servo(self): 1194 """ 1195 Confirm that servo is initialized and verified. 1196 1197 If the servo object is missing, attempt to repair the servo 1198 host. Repair failures are passed back to the caller. 1199 1200 @raise AutoservError: If there is no servo host for this CrOS 1201 host. 1202 """ 1203 if self.servo: 1204 return 1205 if not self._servo_host: 1206 raise error.AutoservError('No servo host for %s.' % 1207 self.hostname) 1208 self._servo_host.repair() 1209 self.servo = self._servo_host.get_servo() 1210 1211 1212 def repair(self): 1213 """Attempt to get the DUT to pass `self.verify()`. 1214 1215 This overrides the base class function for repair; it does 1216 not call back to the parent class, but instead relies on 1217 `self._repair_strategy` to coordinate the verification and 1218 repair steps needed to get the DUT working. 1219 """ 1220 self._repair_strategy.repair(self) 1221 1222 1223 def close(self): 1224 super(CrosHost, self).close() 1225 if self._chameleon_host: 1226 self._chameleon_host.close() 1227 1228 if self._servo_host: 1229 self._servo_host.close() 1230 1231 1232 def get_power_supply_info(self): 1233 """Get the output of power_supply_info. 1234 1235 power_supply_info outputs the info of each power supply, e.g., 1236 Device: Line Power 1237 online: no 1238 type: Mains 1239 voltage (V): 0 1240 current (A): 0 1241 Device: Battery 1242 state: Discharging 1243 percentage: 95.9276 1244 technology: Li-ion 1245 1246 Above output shows two devices, Line Power and Battery, with details of 1247 each device listed. This function parses the output into a dictionary, 1248 with key being the device name, and value being a dictionary of details 1249 of the device info. 1250 1251 @return: The dictionary of power_supply_info, e.g., 1252 {'Line Power': {'online': 'yes', 'type': 'main'}, 1253 'Battery': {'vendor': 'xyz', 'percentage': '100'}} 1254 @raise error.AutoservRunError if power_supply_info tool is not found in 1255 the DUT. Caller should handle this error to avoid false failure 1256 on verification. 1257 """ 1258 result = self.run('power_supply_info').stdout.strip() 1259 info = {} 1260 device_name = None 1261 device_info = {} 1262 for line in result.split('\n'): 1263 pair = [v.strip() for v in line.split(':')] 1264 if len(pair) != 2: 1265 continue 1266 if pair[0] == 'Device': 1267 if device_name: 1268 info[device_name] = device_info 1269 device_name = pair[1] 1270 device_info = {} 1271 else: 1272 device_info[pair[0]] = pair[1] 1273 if device_name and not device_name in info: 1274 info[device_name] = device_info 1275 return info 1276 1277 1278 def get_battery_percentage(self): 1279 """Get the battery percentage. 1280 1281 @return: The percentage of battery level, value range from 0-100. Return 1282 None if the battery info cannot be retrieved. 1283 """ 1284 try: 1285 info = self.get_power_supply_info() 1286 logging.info(info) 1287 return float(info['Battery']['percentage']) 1288 except (KeyError, ValueError, error.AutoservRunError): 1289 return None 1290 1291 1292 def is_ac_connected(self): 1293 """Check if the dut has power adapter connected and charging. 1294 1295 @return: True if power adapter is connected and charging. 1296 """ 1297 try: 1298 info = self.get_power_supply_info() 1299 return info['Line Power']['online'] == 'yes' 1300 except (KeyError, error.AutoservRunError): 1301 return None 1302 1303 1304 def _cleanup_poweron(self): 1305 """Special cleanup method to make sure hosts always get power back.""" 1306 afe = frontend_wrappers.RetryingAFE(timeout_min=5, delay_sec=10) 1307 hosts = afe.get_hosts(hostname=self.hostname) 1308 if not hosts or not (self._RPM_OUTLET_CHANGED in 1309 hosts[0].attributes): 1310 return 1311 logging.debug('This host has recently interacted with the RPM' 1312 ' Infrastructure. Ensuring power is on.') 1313 try: 1314 self.power_on() 1315 afe.set_host_attribute(self._RPM_OUTLET_CHANGED, None, 1316 hostname=self.hostname) 1317 except rpm_client.RemotePowerException: 1318 logging.error('Failed to turn Power On for this host after ' 1319 'cleanup through the RPM Infrastructure.') 1320 1321 battery_percentage = self.get_battery_percentage() 1322 if battery_percentage and battery_percentage < 50: 1323 raise 1324 elif self.is_ac_connected(): 1325 logging.info('The device has power adapter connected and ' 1326 'charging. No need to try to turn RPM on ' 1327 'again.') 1328 afe.set_host_attribute(self._RPM_OUTLET_CHANGED, None, 1329 hostname=self.hostname) 1330 logging.info('Battery level is now at %s%%. The device may ' 1331 'still have enough power to run test, so no ' 1332 'exception will be raised.', battery_percentage) 1333 1334 1335 def _is_factory_image(self): 1336 """Checks if the image on the DUT is a factory image. 1337 1338 @return: True if the image on the DUT is a factory image. 1339 False otherwise. 1340 """ 1341 result = self.run('[ -f /root/.factory_test ]', ignore_status=True) 1342 return result.exit_status == 0 1343 1344 1345 def _restart_ui(self): 1346 """Restart the Chrome UI. 1347 1348 @raises: FactoryImageCheckerException for factory images, since 1349 we cannot attempt to restart ui on them. 1350 error.AutoservRunError for any other type of error that 1351 occurs while restarting ui. 1352 """ 1353 if self._is_factory_image(): 1354 raise FactoryImageCheckerException('Cannot restart ui on factory ' 1355 'images') 1356 1357 # TODO(jrbarnette): The command to stop/start the ui job 1358 # should live inside cros_ui, too. However that would seem 1359 # to imply interface changes to the existing start()/restart() 1360 # functions, which is a bridge too far (for now). 1361 prompt = cros_ui.get_chrome_session_ident(self) 1362 self.run('stop ui; start ui') 1363 cros_ui.wait_for_chrome_ready(prompt, self) 1364 1365 1366 def _get_lsb_release_content(self): 1367 """Return the content of lsb-release file of host.""" 1368 return self.run( 1369 'cat "%s"' % client_constants.LSB_RELEASE).stdout.strip() 1370 1371 1372 def get_release_version(self): 1373 """Get the value of attribute CHROMEOS_RELEASE_VERSION from lsb-release. 1374 1375 @returns The version string in lsb-release, under attribute 1376 CHROMEOS_RELEASE_VERSION. 1377 """ 1378 return lsbrelease_utils.get_chromeos_release_version( 1379 lsb_release_content=self._get_lsb_release_content()) 1380 1381 1382 def get_chromeos_release_milestone(self): 1383 """Get the value of attribute CHROMEOS_RELEASE_BUILD_TYPE 1384 from lsb-release. 1385 1386 @returns The version string in lsb-release, under attribute 1387 CHROMEOS_RELEASE_BUILD_TYPE. 1388 """ 1389 return lsbrelease_utils.get_chromeos_release_milestone( 1390 lsb_release_content=self._get_lsb_release_content()) 1391 1392 1393 def verify_cros_version_label(self): 1394 """ Make sure host's cros-version label match the actual image in dut. 1395 1396 Remove any cros-version: label that doesn't match that installed in 1397 the dut. 1398 1399 @param raise_error: Set to True to raise exception if any mismatch found 1400 1401 @raise error.AutoservError: If any mismatch between cros-version label 1402 and the build installed in dut is found. 1403 """ 1404 labels = self._AFE.get_labels( 1405 name__startswith=ds_constants.VERSION_PREFIX, 1406 host__hostname=self.hostname) 1407 mismatch_found = False 1408 if labels: 1409 # Get CHROMEOS_RELEASE_VERSION from lsb-release, e.g., 6908.0.0. 1410 # Note that it's different from cros-version label, which has 1411 # builder and branch info, e.g., 1412 # cros-version:peppy-release/R43-6908.0.0 1413 release_version = self.get_release_version() 1414 host_list = [self.hostname] 1415 for label in labels: 1416 # Remove any cros-version label that does not match 1417 # release_version. 1418 build_version = label.name[len(ds_constants.VERSION_PREFIX):] 1419 if not utils.version_match(build_version, release_version): 1420 logging.warn('cros-version label "%s" does not match ' 1421 'release version %s. Removing the label.', 1422 label.name, release_version) 1423 label.remove_hosts(hosts=host_list) 1424 mismatch_found = True 1425 if mismatch_found: 1426 raise error.AutoservError('The host has wrong cros-version label.') 1427 1428 1429 def cleanup_services(self): 1430 """Reinitializes the device for cleanup. 1431 1432 Subclasses may override this to customize the cleanup method. 1433 1434 To indicate failure of the reset, the implementation may raise 1435 any of: 1436 error.AutoservRunError 1437 error.AutotestRunError 1438 FactoryImageCheckerException 1439 1440 @raises error.AutoservRunError 1441 @raises error.AutotestRunError 1442 @raises error.FactoryImageCheckerException 1443 """ 1444 self._restart_ui() 1445 1446 1447 def cleanup(self): 1448 self.run('rm -f %s' % client_constants.CLEANUP_LOGS_PAUSED_FILE) 1449 try: 1450 self.cleanup_services() 1451 except (error.AutotestRunError, error.AutoservRunError, 1452 FactoryImageCheckerException): 1453 logging.warning('Unable to restart ui, rebooting device.') 1454 # Since restarting the UI fails fall back to normal Autotest 1455 # cleanup routines, i.e. reboot the machine. 1456 super(CrosHost, self).cleanup() 1457 # Check if the rpm outlet was manipulated. 1458 if self.has_power(): 1459 self._cleanup_poweron() 1460 self.verify_cros_version_label() 1461 1462 1463 def reboot(self, **dargs): 1464 """ 1465 This function reboots the site host. The more generic 1466 RemoteHost.reboot() performs sync and sleeps for 5 1467 seconds. This is not necessary for Chrome OS devices as the 1468 sync should be finished in a short time during the reboot 1469 command. 1470 """ 1471 if 'reboot_cmd' not in dargs: 1472 reboot_timeout = dargs.get('reboot_timeout', 10) 1473 dargs['reboot_cmd'] = ('sleep 1; ' 1474 'reboot & sleep %d; ' 1475 'reboot -f' % reboot_timeout) 1476 # Enable fastsync to avoid running extra sync commands before reboot. 1477 if 'fastsync' not in dargs: 1478 dargs['fastsync'] = True 1479 1480 # For purposes of logging reboot times: 1481 # Get the board name i.e. 'daisy_spring' 1482 board_fullname = self.get_board() 1483 1484 # Strip the prefix and add it to dargs. 1485 dargs['board'] = board_fullname[board_fullname.find(':')+1:] 1486 # Record who called us 1487 orig = sys._getframe(1).f_code 1488 metric_fields = {'board' : dargs['board'], 1489 'dut_host_name' : self.hostname, 1490 'success' : True} 1491 metric_debug_fields = {'board' : dargs['board'], 1492 'caller' : "%s:%s" % (orig.co_filename, orig.co_name), 1493 'success' : True, 1494 'error' : ''} 1495 1496 t0 = time.time() 1497 try: 1498 super(CrosHost, self).reboot(**dargs) 1499 except Exception as e: 1500 metric_fields['success'] = False 1501 metric_debug_fields['success'] = False 1502 metric_debug_fields['error'] = type(e).__name__ 1503 raise 1504 finally: 1505 duration = int(time.time() - t0) 1506 metrics.Counter( 1507 'chromeos/autotest/autoserv/reboot_count').increment( 1508 fields=metric_fields) 1509 metrics.Counter( 1510 'chromeos/autotest/autoserv/reboot_debug').increment( 1511 fields=metric_debug_fields) 1512 metrics.SecondsDistribution( 1513 'chromeos/autotest/autoserv/reboot_duration').add( 1514 duration, fields=metric_fields) 1515 1516 1517 def suspend(self, **dargs): 1518 """ 1519 This function suspends the site host. 1520 """ 1521 suspend_time = dargs.get('suspend_time', 60) 1522 dargs['timeout'] = suspend_time 1523 if 'suspend_cmd' not in dargs: 1524 dargs['suspend_cmd'] = ' && '.join([ 1525 'echo 0 > /sys/class/rtc/rtc0/wakealarm', 1526 'echo +%d > /sys/class/rtc/rtc0/wakealarm' % suspend_time, 1527 'powerd_dbus_suspend --delay=0']) 1528 super(CrosHost, self).suspend(**dargs) 1529 1530 1531 def upstart_status(self, service_name): 1532 """Check the status of an upstart init script. 1533 1534 @param service_name: Service to look up. 1535 1536 @returns True if the service is running, False otherwise. 1537 """ 1538 return self.run('status %s | grep start/running' % 1539 service_name).stdout.strip() != '' 1540 1541 1542 def verify_software(self): 1543 """Verify working software on a Chrome OS system. 1544 1545 Tests for the following conditions: 1546 1. All conditions tested by the parent version of this 1547 function. 1548 2. Sufficient space in /mnt/stateful_partition. 1549 3. Sufficient space in /mnt/stateful_partition/encrypted. 1550 4. update_engine answers a simple status request over DBus. 1551 1552 """ 1553 super(CrosHost, self).verify_software() 1554 default_kilo_inodes_required = CONFIG.get_config_value( 1555 'SERVER', 'kilo_inodes_required', type=int, default=100) 1556 board = self.get_board().replace(ds_constants.BOARD_PREFIX, '') 1557 kilo_inodes_required = CONFIG.get_config_value( 1558 'SERVER', 'kilo_inodes_required_%s' % board, 1559 type=int, default=default_kilo_inodes_required) 1560 self.check_inodes('/mnt/stateful_partition', kilo_inodes_required) 1561 self.check_diskspace( 1562 '/mnt/stateful_partition', 1563 CONFIG.get_config_value( 1564 'SERVER', 'gb_diskspace_required', type=float, 1565 default=20.0)) 1566 encrypted_stateful_path = '/mnt/stateful_partition/encrypted' 1567 # Not all targets build with encrypted stateful support. 1568 if self.path_exists(encrypted_stateful_path): 1569 self.check_diskspace( 1570 encrypted_stateful_path, 1571 CONFIG.get_config_value( 1572 'SERVER', 'gb_encrypted_diskspace_required', type=float, 1573 default=0.1)) 1574 1575 if not self.upstart_status('system-services'): 1576 raise error.AutoservError('Chrome failed to reach login. ' 1577 'System services not running.') 1578 1579 # Factory images don't run update engine, 1580 # goofy controls dbus on these DUTs. 1581 if not self._is_factory_image(): 1582 self.run('update_engine_client --status') 1583 1584 self.verify_cros_version_label() 1585 1586 1587 def verify(self): 1588 self._repair_strategy.verify(self) 1589 1590 1591 def make_ssh_command(self, user='root', port=22, opts='', hosts_file=None, 1592 connect_timeout=None, alive_interval=None): 1593 """Override default make_ssh_command to use options tuned for Chrome OS. 1594 1595 Tuning changes: 1596 - ConnectTimeout=30; maximum of 30 seconds allowed for an SSH 1597 connection failure. Consistency with remote_access.sh. 1598 1599 - ServerAliveInterval=900; which causes SSH to ping connection every 1600 900 seconds. In conjunction with ServerAliveCountMax ensures 1601 that if the connection dies, Autotest will bail out. 1602 Originally tried 60 secs, but saw frequent job ABORTS where 1603 the test completed successfully. Later increased from 180 seconds to 1604 900 seconds to account for tests where the DUT is suspended for 1605 longer periods of time. 1606 1607 - ServerAliveCountMax=3; consistency with remote_access.sh. 1608 1609 - ConnectAttempts=4; reduce flakiness in connection errors; 1610 consistency with remote_access.sh. 1611 1612 - UserKnownHostsFile=/dev/null; we don't care about the keys. 1613 Host keys change with every new installation, don't waste 1614 memory/space saving them. 1615 1616 - SSH protocol forced to 2; needed for ServerAliveInterval. 1617 1618 @param user User name to use for the ssh connection. 1619 @param port Port on the target host to use for ssh connection. 1620 @param opts Additional options to the ssh command. 1621 @param hosts_file Ignored. 1622 @param connect_timeout Ignored. 1623 @param alive_interval Ignored. 1624 """ 1625 base_command = ('/usr/bin/ssh -a -x %s %s %s' 1626 ' -o StrictHostKeyChecking=no' 1627 ' -o UserKnownHostsFile=/dev/null -o BatchMode=yes' 1628 ' -o ConnectTimeout=30 -o ServerAliveInterval=900' 1629 ' -o ServerAliveCountMax=3 -o ConnectionAttempts=4' 1630 ' -o Protocol=2 -l %s -p %d') 1631 return base_command % (self._ssh_verbosity_flag, self._ssh_options, 1632 opts, user, port) 1633 def syslog(self, message, tag='autotest'): 1634 """Logs a message to syslog on host. 1635 1636 @param message String message to log into syslog 1637 @param tag String tag prefix for syslog 1638 1639 """ 1640 self.run('logger -t "%s" "%s"' % (tag, message)) 1641 1642 1643 def _ping_check_status(self, status): 1644 """Ping the host once, and return whether it has a given status. 1645 1646 @param status Check the ping status against this value. 1647 @return True iff `status` and the result of ping are the same 1648 (i.e. both True or both False). 1649 1650 """ 1651 ping_val = utils.ping(self.hostname, tries=1, deadline=1) 1652 return not (status ^ (ping_val == 0)) 1653 1654 def _ping_wait_for_status(self, status, timeout): 1655 """Wait for the host to have a given status (UP or DOWN). 1656 1657 Status is checked by polling. Polling will not last longer 1658 than the number of seconds in `timeout`. The polling 1659 interval will be long enough that only approximately 1660 _PING_WAIT_COUNT polling cycles will be executed, subject 1661 to a maximum interval of about one minute. 1662 1663 @param status Waiting will stop immediately if `ping` of the 1664 host returns this status. 1665 @param timeout Poll for at most this many seconds. 1666 @return True iff the host status from `ping` matched the 1667 requested status at the time of return. 1668 1669 """ 1670 # _ping_check_status() takes about 1 second, hence the 1671 # "- 1" in the formula below. 1672 # FIXME: if the ping command errors then _ping_check_status() 1673 # returns instantly. If timeout is also smaller than twice 1674 # _PING_WAIT_COUNT then the while loop below forks many 1675 # thousands of ping commands (see /tmp/test_that_results_XXXXX/ 1676 # /results-1-logging_YYY.ZZZ/debug/autoserv.DEBUG) and hogs one 1677 # CPU core for 60 seconds. 1678 poll_interval = min(int(timeout / self._PING_WAIT_COUNT), 60) - 1 1679 end_time = time.time() + timeout 1680 while time.time() <= end_time: 1681 if self._ping_check_status(status): 1682 return True 1683 if poll_interval > 0: 1684 time.sleep(poll_interval) 1685 1686 # The last thing we did was sleep(poll_interval), so it may 1687 # have been too long since the last `ping`. Check one more 1688 # time, just to be sure. 1689 return self._ping_check_status(status) 1690 1691 def ping_wait_up(self, timeout): 1692 """Wait for the host to respond to `ping`. 1693 1694 N.B. This method is not a reliable substitute for 1695 `wait_up()`, because a host that responds to ping will not 1696 necessarily respond to ssh. This method should only be used 1697 if the target DUT can be considered functional even if it 1698 can't be reached via ssh. 1699 1700 @param timeout Minimum time to allow before declaring the 1701 host to be non-responsive. 1702 @return True iff the host answered to ping before the timeout. 1703 1704 """ 1705 return self._ping_wait_for_status(self._PING_STATUS_UP, timeout) 1706 1707 def ping_wait_down(self, timeout): 1708 """Wait until the host no longer responds to `ping`. 1709 1710 This function can be used as a slightly faster version of 1711 `wait_down()`, by avoiding potentially long ssh timeouts. 1712 1713 @param timeout Minimum time to allow for the host to become 1714 non-responsive. 1715 @return True iff the host quit answering ping before the 1716 timeout. 1717 1718 """ 1719 return self._ping_wait_for_status(self._PING_STATUS_DOWN, timeout) 1720 1721 def test_wait_for_sleep(self, sleep_timeout=None): 1722 """Wait for the client to enter low-power sleep mode. 1723 1724 The test for "is asleep" can't distinguish a system that is 1725 powered off; to confirm that the unit was asleep, it is 1726 necessary to force resume, and then call 1727 `test_wait_for_resume()`. 1728 1729 This function is expected to be called from a test as part 1730 of a sequence like the following: 1731 1732 ~~~~~~~~ 1733 boot_id = host.get_boot_id() 1734 # trigger sleep on the host 1735 host.test_wait_for_sleep() 1736 # trigger resume on the host 1737 host.test_wait_for_resume(boot_id) 1738 ~~~~~~~~ 1739 1740 @param sleep_timeout time limit in seconds to allow the host sleep. 1741 1742 @exception TestFail The host did not go to sleep within 1743 the allowed time. 1744 """ 1745 if sleep_timeout is None: 1746 sleep_timeout = self.SLEEP_TIMEOUT 1747 1748 if not self.ping_wait_down(timeout=sleep_timeout): 1749 raise error.TestFail( 1750 'client failed to sleep after %d seconds' % sleep_timeout) 1751 1752 1753 def test_wait_for_resume(self, old_boot_id, resume_timeout=None): 1754 """Wait for the client to resume from low-power sleep mode. 1755 1756 The `old_boot_id` parameter should be the value from 1757 `get_boot_id()` obtained prior to entering sleep mode. A 1758 `TestFail` exception is raised if the boot id changes. 1759 1760 See @ref test_wait_for_sleep for more on this function's 1761 usage. 1762 1763 @param old_boot_id A boot id value obtained before the 1764 target host went to sleep. 1765 @param resume_timeout time limit in seconds to allow the host up. 1766 1767 @exception TestFail The host did not respond within the 1768 allowed time. 1769 @exception TestFail The host responded, but the boot id test 1770 indicated a reboot rather than a sleep 1771 cycle. 1772 """ 1773 if resume_timeout is None: 1774 resume_timeout = self.RESUME_TIMEOUT 1775 1776 if not self.wait_up(timeout=resume_timeout): 1777 raise error.TestFail( 1778 'client failed to resume from sleep after %d seconds' % 1779 resume_timeout) 1780 else: 1781 new_boot_id = self.get_boot_id() 1782 if new_boot_id != old_boot_id: 1783 logging.error('client rebooted (old boot %s, new boot %s)', 1784 old_boot_id, new_boot_id) 1785 raise error.TestFail( 1786 'client rebooted, but sleep was expected') 1787 1788 1789 def test_wait_for_shutdown(self, shutdown_timeout=None): 1790 """Wait for the client to shut down. 1791 1792 The test for "has shut down" can't distinguish a system that 1793 is merely asleep; to confirm that the unit was down, it is 1794 necessary to force boot, and then call test_wait_for_boot(). 1795 1796 This function is expected to be called from a test as part 1797 of a sequence like the following: 1798 1799 ~~~~~~~~ 1800 boot_id = host.get_boot_id() 1801 # trigger shutdown on the host 1802 host.test_wait_for_shutdown() 1803 # trigger boot on the host 1804 host.test_wait_for_boot(boot_id) 1805 ~~~~~~~~ 1806 1807 @param shutdown_timeout time limit in seconds to allow the host down. 1808 @exception TestFail The host did not shut down within the 1809 allowed time. 1810 """ 1811 if shutdown_timeout is None: 1812 shutdown_timeout = self.SHUTDOWN_TIMEOUT 1813 1814 if not self.ping_wait_down(timeout=shutdown_timeout): 1815 raise error.TestFail( 1816 'client failed to shut down after %d seconds' % 1817 shutdown_timeout) 1818 1819 1820 def test_wait_for_boot(self, old_boot_id=None): 1821 """Wait for the client to boot from cold power. 1822 1823 The `old_boot_id` parameter should be the value from 1824 `get_boot_id()` obtained prior to shutting down. A 1825 `TestFail` exception is raised if the boot id does not 1826 change. The boot id test is omitted if `old_boot_id` is not 1827 specified. 1828 1829 See @ref test_wait_for_shutdown for more on this function's 1830 usage. 1831 1832 @param old_boot_id A boot id value obtained before the 1833 shut down. 1834 1835 @exception TestFail The host did not respond within the 1836 allowed time. 1837 @exception TestFail The host responded, but the boot id test 1838 indicated that there was no reboot. 1839 """ 1840 if not self.wait_up(timeout=self.REBOOT_TIMEOUT): 1841 raise error.TestFail( 1842 'client failed to reboot after %d seconds' % 1843 self.REBOOT_TIMEOUT) 1844 elif old_boot_id: 1845 if self.get_boot_id() == old_boot_id: 1846 logging.error('client not rebooted (boot %s)', 1847 old_boot_id) 1848 raise error.TestFail( 1849 'client is back up, but did not reboot') 1850 1851 1852 @staticmethod 1853 def check_for_rpm_support(hostname): 1854 """For a given hostname, return whether or not it is powered by an RPM. 1855 1856 @param hostname: hostname to check for rpm support. 1857 1858 @return None if this host does not follows the defined naming format 1859 for RPM powered DUT's in the lab. If it does follow the format, 1860 it returns a regular expression MatchObject instead. 1861 """ 1862 return re.match(CrosHost._RPM_HOSTNAME_REGEX, hostname) 1863 1864 1865 def has_power(self): 1866 """For this host, return whether or not it is powered by an RPM. 1867 1868 @return True if this host is in the CROS lab and follows the defined 1869 naming format. 1870 """ 1871 return CrosHost.check_for_rpm_support(self.hostname) 1872 1873 1874 def _set_power(self, state, power_method): 1875 """Sets the power to the host via RPM, Servo or manual. 1876 1877 @param state Specifies which power state to set to DUT 1878 @param power_method Specifies which method of power control to 1879 use. By default "RPM" will be used. Valid values 1880 are the strings "RPM", "manual", "servoj10". 1881 1882 """ 1883 ACCEPTABLE_STATES = ['ON', 'OFF'] 1884 1885 if state.upper() not in ACCEPTABLE_STATES: 1886 raise error.TestError('State must be one of: %s.' 1887 % (ACCEPTABLE_STATES,)) 1888 1889 if power_method == self.POWER_CONTROL_SERVO: 1890 logging.info('Setting servo port J10 to %s', state) 1891 self.servo.set('prtctl3_pwren', state.lower()) 1892 time.sleep(self._USB_POWER_TIMEOUT) 1893 elif power_method == self.POWER_CONTROL_MANUAL: 1894 logging.info('You have %d seconds to set the AC power to %s.', 1895 self._POWER_CYCLE_TIMEOUT, state) 1896 time.sleep(self._POWER_CYCLE_TIMEOUT) 1897 else: 1898 if not self.has_power(): 1899 raise error.TestFail('DUT does not have RPM connected.') 1900 afe = frontend_wrappers.RetryingAFE(timeout_min=5, delay_sec=10) 1901 afe.set_host_attribute(self._RPM_OUTLET_CHANGED, True, 1902 hostname=self.hostname) 1903 rpm_client.set_power(self.hostname, state.upper(), timeout_mins=5) 1904 1905 1906 def power_off(self, power_method=POWER_CONTROL_RPM): 1907 """Turn off power to this host via RPM, Servo or manual. 1908 1909 @param power_method Specifies which method of power control to 1910 use. By default "RPM" will be used. Valid values 1911 are the strings "RPM", "manual", "servoj10". 1912 1913 """ 1914 self._set_power('OFF', power_method) 1915 1916 1917 def power_on(self, power_method=POWER_CONTROL_RPM): 1918 """Turn on power to this host via RPM, Servo or manual. 1919 1920 @param power_method Specifies which method of power control to 1921 use. By default "RPM" will be used. Valid values 1922 are the strings "RPM", "manual", "servoj10". 1923 1924 """ 1925 self._set_power('ON', power_method) 1926 1927 1928 def power_cycle(self, power_method=POWER_CONTROL_RPM): 1929 """Cycle power to this host by turning it OFF, then ON. 1930 1931 @param power_method Specifies which method of power control to 1932 use. By default "RPM" will be used. Valid values 1933 are the strings "RPM", "manual", "servoj10". 1934 1935 """ 1936 if power_method in (self.POWER_CONTROL_SERVO, 1937 self.POWER_CONTROL_MANUAL): 1938 self.power_off(power_method=power_method) 1939 time.sleep(self._POWER_CYCLE_TIMEOUT) 1940 self.power_on(power_method=power_method) 1941 else: 1942 rpm_client.set_power(self.hostname, 'CYCLE') 1943 1944 1945 def get_platform(self): 1946 """Determine the correct platform label for this host. 1947 1948 @returns a string representing this host's platform. 1949 """ 1950 crossystem = utils.Crossystem(self) 1951 crossystem.init() 1952 # Extract fwid value and use the leading part as the platform id. 1953 # fwid generally follow the format of {platform}.{firmware version} 1954 # Example: Alex.X.YYY.Z or Google_Alex.X.YYY.Z 1955 platform = crossystem.fwid().split('.')[0].lower() 1956 # Newer platforms start with 'Google_' while the older ones do not. 1957 return platform.replace('google_', '') 1958 1959 1960 def get_architecture(self): 1961 """Determine the correct architecture label for this host. 1962 1963 @returns a string representing this host's architecture. 1964 """ 1965 crossystem = utils.Crossystem(self) 1966 crossystem.init() 1967 return crossystem.arch() 1968 1969 1970 def get_chrome_version(self): 1971 """Gets the Chrome version number and milestone as strings. 1972 1973 Invokes "chrome --version" to get the version number and milestone. 1974 1975 @return A tuple (chrome_ver, milestone) where "chrome_ver" is the 1976 current Chrome version number as a string (in the form "W.X.Y.Z") 1977 and "milestone" is the first component of the version number 1978 (the "W" from "W.X.Y.Z"). If the version number cannot be parsed 1979 in the "W.X.Y.Z" format, the "chrome_ver" will be the full output 1980 of "chrome --version" and the milestone will be the empty string. 1981 1982 """ 1983 version_string = self.run(client_constants.CHROME_VERSION_COMMAND).stdout 1984 return utils.parse_chrome_version(version_string) 1985 1986 1987 def is_chrome_switch_present(self, switch): 1988 """Returns True if the specified switch was provided to Chrome. 1989 1990 @param switch The chrome switch to search for. 1991 """ 1992 1993 command = 'pgrep -x -f -c "/opt/google/chrome/chrome.*%s.*"' % switch 1994 return self.run(command, ignore_status=True).exit_status == 0 1995 1996 1997 def oobe_triggers_update(self): 1998 """Returns True if this host has an OOBE flow during which 1999 it will perform an update check and perhaps an update. 2000 One example of such a flow is Hands-Off Zero-Touch Enrollment. 2001 As more such flows are developed, code handling them needs 2002 to be added here. 2003 2004 @return Boolean indicating whether this host's OOBE triggers an update. 2005 """ 2006 return self.is_chrome_switch_present( 2007 '--enterprise-enable-zero-touch-enrollment=hands-off') 2008 2009 2010 # TODO(kevcheng): change this to just return the board without the 2011 # 'board:' prefix and fix up all the callers. Also look into removing the 2012 # need for this method. 2013 def get_board(self): 2014 """Determine the correct board label for this host. 2015 2016 @returns a string representing this host's board. 2017 """ 2018 release_info = utils.parse_cmd_output('cat /etc/lsb-release', 2019 run_method=self.run) 2020 return (ds_constants.BOARD_PREFIX + 2021 release_info['CHROMEOS_RELEASE_BOARD']) 2022 2023 2024 2025 def has_lightsensor(self): 2026 """Determine the correct board label for this host. 2027 2028 @returns the string 'lightsensor' if this host has a lightsensor or 2029 None if it does not. 2030 """ 2031 search_cmd = "find -L %s -maxdepth 4 | egrep '%s'" % ( 2032 self._LIGHTSENSOR_SEARCH_DIR, '|'.join(self._LIGHTSENSOR_FILES)) 2033 try: 2034 # Run the search cmd following the symlinks. Stderr_tee is set to 2035 # None as there can be a symlink loop, but the command will still 2036 # execute correctly with a few messages printed to stderr. 2037 self.run(search_cmd, stdout_tee=None, stderr_tee=None) 2038 return 'lightsensor' 2039 except error.AutoservRunError: 2040 # egrep exited with a return code of 1 meaning none of the possible 2041 # lightsensor files existed. 2042 return None 2043 2044 2045 def has_bluetooth(self): 2046 """Determine the correct board label for this host. 2047 2048 @returns the string 'bluetooth' if this host has bluetooth or 2049 None if it does not. 2050 """ 2051 try: 2052 self.run('test -d /sys/class/bluetooth/hci0') 2053 # test exited with a return code of 0. 2054 return 'bluetooth' 2055 except error.AutoservRunError: 2056 # test exited with a return code 1 meaning the directory did not 2057 # exist. 2058 return None 2059 2060 2061 def get_accels(self): 2062 """ 2063 Determine the type of accelerometers on this host. 2064 2065 @returns a string representing this host's accelerometer type. 2066 At present, it only returns "accel:cros-ec", for accelerometers 2067 attached to a Chrome OS EC, or none, if no accelerometers. 2068 """ 2069 # Check to make sure we have ectool 2070 rv = self.run('which ectool', ignore_status=True) 2071 if rv.exit_status: 2072 logging.info("No ectool cmd found, assuming no EC accelerometers") 2073 return None 2074 2075 # Check that the EC supports the motionsense command 2076 rv = self.run('ectool motionsense', ignore_status=True) 2077 if rv.exit_status: 2078 logging.info("EC does not support motionsense command " 2079 "assuming no EC accelerometers") 2080 return None 2081 2082 # Check that EC motion sensors are active 2083 active = self.run('ectool motionsense active').stdout.split('\n') 2084 if active[0] == "0": 2085 logging.info("Motion sense inactive, assuming no EC accelerometers") 2086 return None 2087 2088 logging.info("EC accelerometers found") 2089 return 'accel:cros-ec' 2090 2091 2092 def has_chameleon(self): 2093 """Determine if a Chameleon connected to this host. 2094 2095 @returns a list containing two strings ('chameleon' and 2096 'chameleon:' + label, e.g. 'chameleon:hdmi') if this host 2097 has a Chameleon or None if it has not. 2098 """ 2099 if self._chameleon_host: 2100 return ['chameleon', 'chameleon:' + self.chameleon.get_label()] 2101 else: 2102 return None 2103 2104 2105 def has_loopback_dongle(self): 2106 """Determine if an audio loopback dongle is plugged to this host. 2107 2108 @returns 'audio_loopback_dongle' when there is an audio loopback dongle 2109 plugged to this host. 2110 None when there is no audio loopback dongle 2111 plugged to this host. 2112 """ 2113 nodes_info = self.run(command=cras_utils.get_cras_nodes_cmd(), 2114 ignore_status=True).stdout 2115 if (cras_utils.node_type_is_plugged('HEADPHONE', nodes_info) and 2116 cras_utils.node_type_is_plugged('MIC', nodes_info)): 2117 return 'audio_loopback_dongle' 2118 else: 2119 return None 2120 2121 2122 def get_power_supply(self): 2123 """ 2124 Determine what type of power supply the host has 2125 2126 @returns a string representing this host's power supply. 2127 'power:battery' when the device has a battery intended for 2128 extended use 2129 'power:AC_primary' when the device has a battery not intended 2130 for extended use (for moving the machine, etc) 2131 'power:AC_only' when the device has no battery at all. 2132 """ 2133 psu = self.run(command='mosys psu type', ignore_status=True) 2134 if psu.exit_status: 2135 # The psu command for mosys is not included for all platforms. The 2136 # assumption is that the device will have a battery if the command 2137 # is not found. 2138 return 'power:battery' 2139 2140 psu_str = psu.stdout.strip() 2141 if psu_str == 'unknown': 2142 return None 2143 2144 return 'power:%s' % psu_str 2145 2146 2147 def get_storage(self): 2148 """ 2149 Determine the type of boot device for this host. 2150 2151 Determine if the internal device is SCSI or dw_mmc device. 2152 Then check that it is SSD or HDD or eMMC or something else. 2153 2154 @returns a string representing this host's internal device type. 2155 'storage:ssd' when internal device is solid state drive 2156 'storage:hdd' when internal device is hard disk drive 2157 'storage:mmc' when internal device is mmc drive 2158 None When internal device is something else or 2159 when we are unable to determine the type 2160 """ 2161 # The output should be /dev/mmcblk* for SD/eMMC or /dev/sd* for scsi 2162 rootdev_cmd = ' '.join(['. /usr/sbin/write_gpt.sh;', 2163 '. /usr/share/misc/chromeos-common.sh;', 2164 'load_base_vars;', 2165 'get_fixed_dst_drive']) 2166 rootdev = self.run(command=rootdev_cmd, ignore_status=True) 2167 if rootdev.exit_status: 2168 logging.info("Fail to run %s", rootdev_cmd) 2169 return None 2170 rootdev_str = rootdev.stdout.strip() 2171 2172 if not rootdev_str: 2173 return None 2174 2175 rootdev_base = os.path.basename(rootdev_str) 2176 2177 mmc_pattern = '/dev/mmcblk[0-9]' 2178 if re.match(mmc_pattern, rootdev_str): 2179 # Use type to determine if the internal device is eMMC or somthing 2180 # else. We can assume that MMC is always an internal device. 2181 type_cmd = 'cat /sys/block/%s/device/type' % rootdev_base 2182 type = self.run(command=type_cmd, ignore_status=True) 2183 if type.exit_status: 2184 logging.info("Fail to run %s", type_cmd) 2185 return None 2186 type_str = type.stdout.strip() 2187 2188 if type_str == 'MMC': 2189 return 'storage:mmc' 2190 2191 scsi_pattern = '/dev/sd[a-z]+' 2192 if re.match(scsi_pattern, rootdev.stdout): 2193 # Read symlink for /sys/block/sd* to determine if the internal 2194 # device is connected via ata or usb. 2195 link_cmd = 'readlink /sys/block/%s' % rootdev_base 2196 link = self.run(command=link_cmd, ignore_status=True) 2197 if link.exit_status: 2198 logging.info("Fail to run %s", link_cmd) 2199 return None 2200 link_str = link.stdout.strip() 2201 if 'usb' in link_str: 2202 return None 2203 2204 # Read rotation to determine if the internal device is ssd or hdd. 2205 rotate_cmd = str('cat /sys/block/%s/queue/rotational' 2206 % rootdev_base) 2207 rotate = self.run(command=rotate_cmd, ignore_status=True) 2208 if rotate.exit_status: 2209 logging.info("Fail to run %s", rotate_cmd) 2210 return None 2211 rotate_str = rotate.stdout.strip() 2212 2213 rotate_dict = {'0':'storage:ssd', '1':'storage:hdd'} 2214 return rotate_dict.get(rotate_str) 2215 2216 # All other internal device / error case will always fall here 2217 return None 2218 2219 2220 def get_servo(self): 2221 """Determine if the host has a servo attached. 2222 2223 If the host has a working servo attached, it should have a servo label. 2224 2225 @return: string 'servo' if the host has servo attached. Otherwise, 2226 returns None. 2227 """ 2228 return 'servo' if self._servo_host else None 2229 2230 2231 def get_video_labels(self): 2232 """Run /usr/local/bin/avtest_label_detect to get a list of video labels. 2233 2234 Sample output of avtest_label_detect: 2235 Detected label: hw_video_acc_vp8 2236 Detected label: webcam 2237 2238 @return: A list of labels detected by tool avtest_label_detect. 2239 """ 2240 try: 2241 result = self.run('/usr/local/bin/avtest_label_detect').stdout 2242 return re.findall('^Detected label: (\w+)$', result, re.M) 2243 except error.AutoservRunError: 2244 # The tool is not installed. 2245 return [] 2246 2247 2248 def is_video_glitch_detection_supported(self): 2249 """ Determine if a board under test is supported for video glitch 2250 detection tests. 2251 2252 @return: 'video_glitch_detection' if board is supported, None otherwise. 2253 """ 2254 board = self.get_board().replace(ds_constants.BOARD_PREFIX, '') 2255 2256 if board in video_test_constants.SUPPORTED_BOARDS: 2257 return 'video_glitch_detection' 2258 2259 return None 2260 2261 2262 def get_touch(self): 2263 """ 2264 Determine whether board under test has a touchpad or touchscreen. 2265 2266 @return: A list of some combination of 'touchscreen' and 'touchpad', 2267 depending on what is present on the device. 2268 2269 """ 2270 labels = [] 2271 looking_for = ['touchpad', 'touchscreen'] 2272 player = input_playback.InputPlayback() 2273 input_events = self.run('ls /dev/input/event*').stdout.strip().split() 2274 filename = '/tmp/touch_labels' 2275 for event in input_events: 2276 self.run('evtest %s > %s' % (event, filename), timeout=1, 2277 ignore_timeout=True) 2278 properties = self.run('cat %s' % filename).stdout 2279 input_type = player._determine_input_type(properties) 2280 if input_type in looking_for: 2281 labels.append(input_type) 2282 looking_for.remove(input_type) 2283 if len(looking_for) == 0: 2284 break 2285 self.run('rm %s' % filename) 2286 2287 return labels 2288 2289 2290 def has_internal_display(self): 2291 """Determine if the device under test is equipped with an internal 2292 display. 2293 2294 @return: 'internal_display' if one is present; None otherwise. 2295 """ 2296 from autotest_lib.client.cros.graphics import graphics_utils 2297 from autotest_lib.client.common_lib import utils as common_utils 2298 2299 def __system_output(cmd): 2300 return self.run(cmd).stdout 2301 2302 def __read_file(remote_path): 2303 return self.run('cat %s' % remote_path).stdout 2304 2305 # Hijack the necessary client functions so that we can take advantage 2306 # of the client lib here. 2307 # FIXME: find a less hacky way than this 2308 original_system_output = utils.system_output 2309 original_read_file = common_utils.read_file 2310 utils.system_output = __system_output 2311 common_utils.read_file = __read_file 2312 try: 2313 return ('internal_display' if graphics_utils.has_internal_display() 2314 else None) 2315 finally: 2316 utils.system_output = original_system_output 2317 common_utils.read_file = original_read_file 2318 2319 2320 def has_lucid_sleep_support(self): 2321 """Determine if the device under test has support for lucid sleep. 2322 2323 @return 'lucidsleep' if this board supports lucid sleep; None otherwise 2324 """ 2325 board = self.get_board().replace(ds_constants.BOARD_PREFIX, '') 2326 return 'lucidsleep' if board in LUCID_SLEEP_BOARDS else None 2327 2328 2329 def is_boot_from_usb(self): 2330 """Check if DUT is boot from USB. 2331 2332 @return: True if DUT is boot from usb. 2333 """ 2334 device = self.run('rootdev -s -d').stdout.strip() 2335 removable = int(self.run('cat /sys/block/%s/removable' % 2336 os.path.basename(device)).stdout.strip()) 2337 return removable == 1 2338 2339 2340 def read_from_meminfo(self, key): 2341 """Return the memory info from /proc/meminfo 2342 2343 @param key: meminfo requested 2344 2345 @return the memory value as a string 2346 2347 """ 2348 meminfo = self.run('grep %s /proc/meminfo' % key).stdout.strip() 2349 logging.debug('%s', meminfo) 2350 return int(re.search(r'\d+', meminfo).group(0)) 2351 2352 2353 def get_cpu_arch(self): 2354 """Returns CPU arch of the device. 2355 2356 @return CPU architecture of the DUT. 2357 """ 2358 # Add CPUs by following logic in client/bin/utils.py. 2359 if self.run("grep '^flags.*:.* lm .*' /proc/cpuinfo", 2360 ignore_status=True).stdout: 2361 return 'x86_64' 2362 if self.run("grep -Ei 'ARM|CPU implementer' /proc/cpuinfo", 2363 ignore_status=True).stdout: 2364 return 'arm' 2365 return 'i386' 2366 2367 2368 def get_board_type(self): 2369 """ 2370 Get the DUT's device type from /etc/lsb-release. 2371 DEVICETYPE can be one of CHROMEBOX, CHROMEBASE, CHROMEBOOK or more. 2372 2373 @return value of DEVICETYPE param from lsb-release. 2374 """ 2375 device_type = self.run('grep DEVICETYPE /etc/lsb-release', 2376 ignore_status=True).stdout 2377 if device_type: 2378 return device_type.split('=')[-1].strip() 2379 return '' 2380 2381 2382 def get_os_type(self): 2383 return 'cros' 2384 2385 2386 def enable_adb_testing(self): 2387 """Mark this host as an adb tester.""" 2388 self.run('touch %s' % constants.ANDROID_TESTER_FILEFLAG) 2389 2390 2391 def get_labels(self): 2392 """Return the detected labels on the host.""" 2393 return self.labels.get_labels(self) 2394 2395 2396 def update_labels(self): 2397 """Update the labels on the host.""" 2398 self.labels.update_labels(self) 2399