• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1# Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
2# Use of this source code is governed by a BSD-style license that can be
3# found in the LICENSE file.
4
5import logging
6import os
7import re
8import sys
9import time
10
11import common
12from autotest_lib.client.bin import utils
13from autotest_lib.client.common_lib import autotemp
14from autotest_lib.client.common_lib import error
15from autotest_lib.client.common_lib import global_config
16from autotest_lib.client.common_lib import hosts
17from autotest_lib.client.common_lib import lsbrelease_utils
18from autotest_lib.client.common_lib.cros import autoupdater
19from autotest_lib.client.common_lib.cros import dev_server
20from autotest_lib.client.cros import constants as client_constants
21from autotest_lib.client.cros import cros_ui
22from autotest_lib.client.cros.audio import cras_utils
23from autotest_lib.client.cros.input_playback import input_playback
24from autotest_lib.client.cros.video import constants as video_test_constants
25from autotest_lib.server import afe_utils
26from autotest_lib.server import autoserv_parser
27from autotest_lib.server import autotest
28from autotest_lib.server import constants
29from autotest_lib.server import utils as server_utils
30from autotest_lib.server.cros import provision
31from autotest_lib.server.cros.dynamic_suite import constants as ds_constants
32from autotest_lib.server.cros.dynamic_suite import tools, frontend_wrappers
33from autotest_lib.server.cros.faft.config.config import Config as FAFTConfig
34from autotest_lib.server.cros.servo import plankton
35from autotest_lib.server.hosts import abstract_ssh
36from autotest_lib.server.hosts import base_label
37from autotest_lib.server.hosts import cros_label
38from autotest_lib.server.hosts import chameleon_host
39from autotest_lib.server.hosts import cros_repair
40from autotest_lib.server.hosts import plankton_host
41from autotest_lib.server.hosts import servo_host
42from autotest_lib.site_utils.rpm_control_system import rpm_client
43
44# In case cros_host is being ran via SSP on an older Moblab version with an
45# older chromite version.
46try:
47    from chromite.lib import metrics
48except ImportError:
49    metrics =  utils.metrics_mock
50
51
52CONFIG = global_config.global_config
53ENABLE_DEVSERVER_TRIGGER_AUTO_UPDATE = CONFIG.get_config_value(
54        'CROS', 'enable_devserver_trigger_auto_update', type=bool,
55        default=False)
56
57LUCID_SLEEP_BOARDS = ['samus', 'lulu']
58
59
60class FactoryImageCheckerException(error.AutoservError):
61    """Exception raised when an image is a factory image."""
62    pass
63
64
65class CrosHost(abstract_ssh.AbstractSSHHost):
66    """Chromium OS specific subclass of Host."""
67
68    VERSION_PREFIX = provision.CROS_VERSION_PREFIX
69
70    _parser = autoserv_parser.autoserv_parser
71    _AFE = frontend_wrappers.RetryingAFE(timeout_min=5, delay_sec=10)
72    support_devserver_provision = ENABLE_DEVSERVER_TRIGGER_AUTO_UPDATE
73
74    # Timeout values (in seconds) associated with various Chrome OS
75    # state changes.
76    #
77    # In general, a good rule of thumb is that the timeout can be up
78    # to twice the typical measured value on the slowest platform.
79    # The times here have not necessarily been empirically tested to
80    # meet this criterion.
81    #
82    # SLEEP_TIMEOUT:  Time to allow for suspend to memory.
83    # RESUME_TIMEOUT: Time to allow for resume after suspend, plus
84    #   time to restart the netwowrk.
85    # SHUTDOWN_TIMEOUT: Time to allow for shut down.
86    # BOOT_TIMEOUT: Time to allow for boot from power off.  Among
87    #   other things, this must account for the 30 second dev-mode
88    #   screen delay, time to start the network on the DUT, and the
89    #   ssh timeout of 120 seconds.
90    # USB_BOOT_TIMEOUT: Time to allow for boot from a USB device,
91    #   including the 30 second dev-mode delay and time to start the
92    #   network.
93    # INSTALL_TIMEOUT: Time to allow for chromeos-install.
94    # POWERWASH_BOOT_TIMEOUT: Time to allow for a reboot that
95    #   includes powerwash.
96
97    SLEEP_TIMEOUT = 2
98    RESUME_TIMEOUT = 10
99    SHUTDOWN_TIMEOUT = 10
100    BOOT_TIMEOUT = 150
101    USB_BOOT_TIMEOUT = 300
102    INSTALL_TIMEOUT = 480
103    POWERWASH_BOOT_TIMEOUT = 60
104
105    # Minimum OS version that supports server side packaging. Older builds may
106    # not have server side package built or with Autotest code change to support
107    # server-side packaging.
108    MIN_VERSION_SUPPORT_SSP = CONFIG.get_config_value(
109            'AUTOSERV', 'min_version_support_ssp', type=int)
110
111    # REBOOT_TIMEOUT: How long to wait for a reboot.
112    #
113    # We have a long timeout to ensure we don't flakily fail due to other
114    # issues. Shorter timeouts are vetted in platform_RebootAfterUpdate.
115    # TODO(sbasi - crbug.com/276094) Restore to 5 mins once the 'host did not
116    # return from reboot' bug is solved.
117    REBOOT_TIMEOUT = 480
118
119    # _USB_POWER_TIMEOUT: Time to allow for USB to power toggle ON and OFF.
120    # _POWER_CYCLE_TIMEOUT: Time to allow for manual power cycle.
121    _USB_POWER_TIMEOUT = 5
122    _POWER_CYCLE_TIMEOUT = 10
123
124    _RPM_RECOVERY_BOARDS = CONFIG.get_config_value('CROS',
125            'rpm_recovery_boards', type=str).split(',')
126
127    _LAB_MACHINE_FILE = '/mnt/stateful_partition/.labmachine'
128    _RPM_HOSTNAME_REGEX = ('chromeos(\d+)(-row(\d+))?-rack(\d+[a-z]*)'
129                           '-host(\d+)')
130    _LIGHTSENSOR_FILES = [ "in_illuminance0_input",
131                           "in_illuminance_input",
132                           "in_illuminance0_raw",
133                           "in_illuminance_raw",
134                           "illuminance0_input"]
135    _LIGHTSENSOR_SEARCH_DIR = '/sys/bus/iio/devices'
136
137    # Constants used in ping_wait_up() and ping_wait_down().
138    #
139    # _PING_WAIT_COUNT is the approximate number of polling
140    # cycles to use when waiting for a host state change.
141    #
142    # _PING_STATUS_DOWN and _PING_STATUS_UP are names used
143    # for arguments to the internal _ping_wait_for_status()
144    # method.
145    _PING_WAIT_COUNT = 40
146    _PING_STATUS_DOWN = False
147    _PING_STATUS_UP = True
148
149    # Allowed values for the power_method argument.
150
151    # POWER_CONTROL_RPM: Passed as default arg for power_off/on/cycle() methods.
152    # POWER_CONTROL_SERVO: Used in set_power() and power_cycle() methods.
153    # POWER_CONTROL_MANUAL: Used in set_power() and power_cycle() methods.
154    POWER_CONTROL_RPM = 'RPM'
155    POWER_CONTROL_SERVO = 'servoj10'
156    POWER_CONTROL_MANUAL = 'manual'
157
158    POWER_CONTROL_VALID_ARGS = (POWER_CONTROL_RPM,
159                                POWER_CONTROL_SERVO,
160                                POWER_CONTROL_MANUAL)
161
162    _RPM_OUTLET_CHANGED = 'outlet_changed'
163
164    # URL pattern to download firmware image.
165    _FW_IMAGE_URL_PATTERN = CONFIG.get_config_value(
166            'CROS', 'firmware_url_pattern', type=str)
167
168
169    # A flag file to indicate provision failures.  The file is created
170    # at the start of any AU procedure (see `machine_install()`).  The
171    # file's location in stateful means that on successul update it will
172    # be removed.  Thus, if this file exists, it indicates that we've
173    # tried and failed in a previous attempt to update.
174    PROVISION_FAILED = '/var/tmp/provision_failed'
175
176
177    @staticmethod
178    def check_host(host, timeout=10):
179        """
180        Check if the given host is a chrome-os host.
181
182        @param host: An ssh host representing a device.
183        @param timeout: The timeout for the run command.
184
185        @return: True if the host device is chromeos.
186
187        """
188        try:
189            result = host.run(
190                    'grep -q CHROMEOS /etc/lsb-release && '
191                    '! test -f /mnt/stateful_partition/.android_tester && '
192                    '! grep -q moblab /etc/lsb-release',
193                    ignore_status=True, timeout=timeout)
194            if result.exit_status == 0:
195                lsb_release_content = host.run(
196                    'grep CHROMEOS_RELEASE_BOARD /etc/lsb-release',
197                    timeout=timeout).stdout
198                return not lsbrelease_utils.is_jetstream(
199                    lsb_release_content=lsb_release_content)
200        except (error.AutoservRunError, error.AutoservSSHTimeout):
201            return False
202
203        return False
204
205
206    @staticmethod
207    def get_chameleon_arguments(args_dict):
208        """Extract chameleon options from `args_dict` and return the result.
209
210        Recommended usage:
211        ~~~~~~~~
212            args_dict = utils.args_to_dict(args)
213            chameleon_args = hosts.CrosHost.get_chameleon_arguments(args_dict)
214            host = hosts.create_host(machine, chameleon_args=chameleon_args)
215        ~~~~~~~~
216
217        @param args_dict Dictionary from which to extract the chameleon
218          arguments.
219        """
220        return {key: args_dict[key]
221                for key in ('chameleon_host', 'chameleon_port')
222                if key in args_dict}
223
224
225    @staticmethod
226    def get_plankton_arguments(args_dict):
227        """Extract chameleon options from `args_dict` and return the result.
228
229        Recommended usage:
230        ~~~~~~~~
231            args_dict = utils.args_to_dict(args)
232            plankton_args = hosts.CrosHost.get_plankton_arguments(args_dict)
233            host = hosts.create_host(machine, plankton_args=plankton_args)
234        ~~~~~~~~
235
236        @param args_dict Dictionary from which to extract the plankton
237          arguments.
238        """
239        return {key: args_dict[key]
240                for key in ('plankton_host', 'plankton_port')
241                if key in args_dict}
242
243
244    @staticmethod
245    def get_servo_arguments(args_dict):
246        """Extract servo options from `args_dict` and return the result.
247
248        Recommended usage:
249        ~~~~~~~~
250            args_dict = utils.args_to_dict(args)
251            servo_args = hosts.CrosHost.get_servo_arguments(args_dict)
252            host = hosts.create_host(machine, servo_args=servo_args)
253        ~~~~~~~~
254
255        @param args_dict Dictionary from which to extract the servo
256          arguments.
257        """
258        servo_attrs = (servo_host.SERVO_HOST_ATTR,
259                       servo_host.SERVO_PORT_ATTR,
260                       servo_host.SERVO_BOARD_ATTR)
261        return {key: args_dict[key]
262                for key in servo_attrs
263                if key in args_dict}
264
265
266    def _initialize(self, hostname, chameleon_args=None, servo_args=None,
267                    plankton_args=None, try_lab_servo=False,
268                    try_servo_repair=False,
269                    ssh_verbosity_flag='', ssh_options='',
270                    *args, **dargs):
271        """Initialize superclasses, |self.chameleon|, and |self.servo|.
272
273        This method will attempt to create the test-assistant object
274        (chameleon/servo) when it is needed by the test. Check
275        the docstring of chameleon_host.create_chameleon_host and
276        servo_host.create_servo_host for how this is determined.
277
278        @param hostname: Hostname of the dut.
279        @param chameleon_args: A dictionary that contains args for creating
280                               a ChameleonHost. See chameleon_host for details.
281        @param servo_args: A dictionary that contains args for creating
282                           a ServoHost object. See servo_host for details.
283        @param try_lab_servo: When true, indicates that an attempt should
284                              be made to create a ServoHost for a DUT in
285                              the test lab, even if not required by
286                              `servo_args`. See servo_host for details.
287        @param try_servo_repair: If a servo host is created, check it
288                              with `repair()` rather than `verify()`.
289                              See servo_host for details.
290        @param ssh_verbosity_flag: String, to pass to the ssh command to control
291                                   verbosity.
292        @param ssh_options: String, other ssh options to pass to the ssh
293                            command.
294        """
295        super(CrosHost, self)._initialize(hostname=hostname,
296                                          *args, **dargs)
297        self._repair_strategy = cros_repair.create_cros_repair_strategy()
298        self.labels = base_label.LabelRetriever(cros_label.CROS_LABELS)
299        # self.env is a dictionary of environment variable settings
300        # to be exported for commands run on the host.
301        # LIBC_FATAL_STDERR_ can be useful for diagnosing certain
302        # errors that might happen.
303        self.env['LIBC_FATAL_STDERR_'] = '1'
304        self._ssh_verbosity_flag = ssh_verbosity_flag
305        self._ssh_options = ssh_options
306        # TODO(fdeng): We need to simplify the
307        # process of servo and servo_host initialization.
308        # crbug.com/298432
309        self._servo_host = servo_host.create_servo_host(
310                dut=self, servo_args=servo_args,
311                try_lab_servo=try_lab_servo,
312                try_servo_repair=try_servo_repair)
313        if self._servo_host is not None:
314            self.servo = self._servo_host.get_servo()
315        else:
316            self.servo = None
317
318        # TODO(waihong): Do the simplication on Chameleon too.
319        self._chameleon_host = chameleon_host.create_chameleon_host(
320                dut=self.hostname, chameleon_args=chameleon_args)
321        # Add plankton host if plankton args were added on command line
322        self._plankton_host = plankton_host.create_plankton_host(plankton_args)
323
324        if self._chameleon_host:
325            self.chameleon = self._chameleon_host.create_chameleon_board()
326        else:
327            self.chameleon = None
328
329        if self._plankton_host:
330            self.plankton_servo = self._plankton_host.get_servo()
331            logging.info('plankton_servo: %r', self.plankton_servo)
332            # Create the plankton object used to access the ec uart
333            self.plankton = plankton.Plankton(self.plankton_servo,
334                    self._plankton_host.get_servod_server_proxy())
335        else:
336            self.plankton = None
337
338
339    def _get_cros_repair_image_name(self):
340        info = self.host_info_store.get()
341        if info.board is None:
342            raise error.AutoservError('Cannot obtain repair image name. '
343                                      'No board label value found')
344
345        return afe_utils.get_stable_cros_image_name(info.board)
346
347
348    def verify_job_repo_url(self, tag=''):
349        """
350        Make sure job_repo_url of this host is valid.
351
352        Eg: The job_repo_url "http://lmn.cd.ab.xyx:8080/static/\
353        lumpy-release/R29-4279.0.0/autotest/packages" claims to have the
354        autotest package for lumpy-release/R29-4279.0.0. If this isn't the case,
355        download and extract it. If the devserver embedded in the url is
356        unresponsive, update the job_repo_url of the host after staging it on
357        another devserver.
358
359        @param job_repo_url: A url pointing to the devserver where the autotest
360            package for this build should be staged.
361        @param tag: The tag from the server job, in the format
362                    <job_id>-<user>/<hostname>, or <hostless> for a server job.
363
364        @raises DevServerException: If we could not resolve a devserver.
365        @raises AutoservError: If we're unable to save the new job_repo_url as
366            a result of choosing a new devserver because the old one failed to
367            respond to a health check.
368        @raises urllib2.URLError: If the devserver embedded in job_repo_url
369                                  doesn't respond within the timeout.
370        """
371        info = self.host_info_store.get()
372        job_repo_url = info.attributes.get(ds_constants.JOB_REPO_URL, '')
373        if not job_repo_url:
374            logging.warning('No job repo url set on host %s', self.hostname)
375            return
376
377        logging.info('Verifying job repo url %s', job_repo_url)
378        devserver_url, image_name = tools.get_devserver_build_from_package_url(
379            job_repo_url)
380
381        ds = dev_server.ImageServer(devserver_url)
382
383        logging.info('Staging autotest artifacts for %s on devserver %s',
384            image_name, ds.url())
385
386        start_time = time.time()
387        ds.stage_artifacts(image_name, ['autotest_packages'])
388        stage_time = time.time() - start_time
389
390        # Record how much of the verification time comes from a devserver
391        # restage. If we're doing things right we should not see multiple
392        # devservers for a given board/build/branch path.
393        try:
394            board, build_type, branch = server_utils.ParseBuildName(
395                                                image_name)[:3]
396        except server_utils.ParseBuildNameException:
397            pass
398        else:
399            devserver = devserver_url[
400                devserver_url.find('/') + 2:devserver_url.rfind(':')]
401            stats_key = {
402                'board': board,
403                'build_type': build_type,
404                'branch': branch,
405                'devserver': devserver.replace('.', '_'),
406            }
407
408            monarch_fields = {
409                'board': board,
410                'build_type': build_type,
411                # TODO(akeshet): To be consistent with most other metrics,
412                # consider changing the following field to be named
413                # 'milestone'.
414                'branch': branch,
415                'dev_server': devserver,
416            }
417            metrics.Counter(
418                    'chromeos/autotest/provision/verify_url'
419                    ).increment(fields=monarch_fields)
420            metrics.SecondsDistribution(
421                    'chromeos/autotest/provision/verify_url_duration'
422                    ).add(stage_time, fields=monarch_fields)
423
424
425    def stage_server_side_package(self, image=None):
426        """Stage autotest server-side package on devserver.
427
428        @param image: Full path of an OS image to install or a build name.
429
430        @return: A url to the autotest server-side package.
431
432        @raise: error.AutoservError if fail to locate the build to test with, or
433                fail to stage server-side package.
434        """
435        # If enable_drone_in_restricted_subnet is False, do not set hostname
436        # in devserver.resolve call, so a devserver in non-restricted subnet
437        # is picked to stage autotest server package for drone to download.
438        hostname = self.hostname
439        if not server_utils.ENABLE_DRONE_IN_RESTRICTED_SUBNET:
440            hostname = None
441        if image:
442            image_name = tools.get_build_from_image(image)
443            if not image_name:
444                raise error.AutoservError(
445                        'Failed to parse build name from %s' % image)
446            ds = dev_server.ImageServer.resolve(image_name, hostname)
447        else:
448            info = self.host_info_store.get()
449            job_repo_url = info.attributes.get(ds_constants.JOB_REPO_URL, '')
450            if job_repo_url:
451                devserver_url, image_name = (
452                    tools.get_devserver_build_from_package_url(job_repo_url))
453                # If enable_drone_in_restricted_subnet is True, use the
454                # existing devserver. Otherwise, resolve a new one in
455                # non-restricted subnet.
456                if server_utils.ENABLE_DRONE_IN_RESTRICTED_SUBNET:
457                    ds = dev_server.ImageServer(devserver_url)
458                else:
459                    ds = dev_server.ImageServer.resolve(image_name)
460            elif info.build is not None:
461                ds = dev_server.ImageServer.resolve(info.build, hostname)
462                image_name = info.build
463            else:
464                raise error.AutoservError(
465                        'Failed to stage server-side package. The host has '
466                        'no job_report_url attribute or version label.')
467
468        # Get the OS version of the build, for any build older than
469        # MIN_VERSION_SUPPORT_SSP, server side packaging is not supported.
470        match = re.match('.*/R\d+-(\d+)\.', image_name)
471        if match and int(match.group(1)) < self.MIN_VERSION_SUPPORT_SSP:
472            raise error.AutoservError(
473                    'Build %s is older than %s. Server side packaging is '
474                    'disabled.' % (image_name, self.MIN_VERSION_SUPPORT_SSP))
475
476        ds.stage_artifacts(image_name, ['autotest_server_package'])
477        return '%s/static/%s/%s' % (ds.url(), image_name,
478                                    'autotest_server_package.tar.bz2')
479
480
481    def _try_stateful_update(self, update_url, force_update, updater):
482        """Try to use stateful update to initialize DUT.
483
484        When DUT is already running the same version that machine_install
485        tries to install, stateful update is a much faster way to clean up
486        the DUT for testing, compared to a full reimage. It is implemeted
487        by calling autoupdater.run_update, but skipping updating root, as
488        updating the kernel is time consuming and not necessary.
489
490        @param update_url: url of the image.
491        @param force_update: Set to True to update the image even if the DUT
492            is running the same version.
493        @param updater: ChromiumOSUpdater instance used to update the DUT.
494        @returns: True if the DUT was updated with stateful update.
495
496        """
497        self.prepare_for_update()
498
499        # TODO(jrbarnette):  Yes, I hate this re.match() test case.
500        # It's better than the alternative:  see crbug.com/360944.
501        image_name = autoupdater.url_to_image_name(update_url)
502        release_pattern = r'^.*-release/R[0-9]+-[0-9]+\.[0-9]+\.0$'
503        if not re.match(release_pattern, image_name):
504            return False
505        if not updater.check_version():
506            return False
507        if not force_update:
508            logging.info('Canceling stateful update because the new and '
509                         'old versions are the same.')
510            return False
511        # Following folders should be rebuilt after stateful update.
512        # A test file is used to confirm each folder gets rebuilt after
513        # the stateful update.
514        folders_to_check = ['/var', '/home', '/mnt/stateful_partition']
515        test_file = '.test_file_to_be_deleted'
516        for folder in folders_to_check:
517            touch_path = os.path.join(folder, test_file)
518            self.run('touch %s' % touch_path)
519
520        updater.run_update(update_root=False)
521
522        # Reboot to complete stateful update.
523        self.reboot(timeout=self.REBOOT_TIMEOUT, wait=True)
524
525        # After stateful update and a reboot, all of the test_files shouldn't
526        # exist any more. Otherwise the stateful update is failed.
527        return not any(
528            self.path_exists(os.path.join(folder, test_file))
529            for folder in folders_to_check)
530
531
532    def _post_update_processing(self, updater, expected_kernel=None):
533        """After the DUT is updated, confirm machine_install succeeded.
534
535        @param updater: ChromiumOSUpdater instance used to update the DUT.
536        @param expected_kernel: kernel expected to be active after reboot,
537            or `None` to skip rollback checking.
538
539        """
540        # Touch the lab machine file to leave a marker that
541        # distinguishes this image from other test images.
542        # Afterwards, we must re-run the autoreboot script because
543        # it depends on the _LAB_MACHINE_FILE.
544        autoreboot_cmd = ('FILE="%s" ; [ -f "$FILE" ] || '
545                          '( touch "$FILE" ; start autoreboot )')
546        self.run(autoreboot_cmd % self._LAB_MACHINE_FILE)
547        updater.verify_boot_expectations(
548                expected_kernel, rollback_message=
549                'Build %s failed to boot on %s; system rolled back to previous '
550                'build' % (updater.update_version, self.hostname))
551        # Check that we've got the build we meant to install.
552        if not updater.check_version_to_confirm_install():
553            raise autoupdater.ChromiumOSError(
554                'Failed to update %s to build %s; found build '
555                '%s instead' % (self.hostname,
556                                updater.update_version,
557                                self.get_release_version()))
558
559        logging.debug('Cleaning up old autotest directories.')
560        try:
561            installed_autodir = autotest.Autotest.get_installed_autodir(self)
562            self.run('rm -rf ' + installed_autodir)
563        except autotest.AutodirNotFoundError:
564            logging.debug('No autotest installed directory found.')
565
566
567    def _stage_image_for_update(self, image_name=None):
568        """Stage a build on a devserver and return the update_url and devserver.
569
570        @param image_name: a name like lumpy-release/R27-3837.0.0
571        @returns a tuple with an update URL like:
572            http://172.22.50.205:8082/update/lumpy-release/R27-3837.0.0
573            and the devserver instance.
574        """
575        if not image_name:
576            image_name = self._get_cros_repair_image_name()
577        logging.info('Staging build for AU: %s', image_name)
578        devserver = dev_server.ImageServer.resolve(image_name, self.hostname)
579        devserver.trigger_download(image_name, synchronous=False)
580        return (tools.image_url_pattern() % (devserver.url(), image_name),
581                devserver)
582
583
584    def stage_image_for_servo(self, image_name=None):
585        """Stage a build on a devserver and return the update_url.
586
587        @param image_name: a name like lumpy-release/R27-3837.0.0
588        @returns an update URL like:
589            http://172.22.50.205:8082/update/lumpy-release/R27-3837.0.0
590        """
591        if not image_name:
592            image_name = self._get_cros_repair_image_name()
593        logging.info('Staging build for servo install: %s', image_name)
594        devserver = dev_server.ImageServer.resolve(image_name, self.hostname)
595        devserver.stage_artifacts(image_name, ['test_image'])
596        return devserver.get_test_image_url(image_name)
597
598
599    def stage_factory_image_for_servo(self, image_name):
600        """Stage a build on a devserver and return the update_url.
601
602        @param image_name: a name like <baord>/4262.204.0
603
604        @return: An update URL, eg:
605            http://<devserver>/static/canary-channel/\
606            <board>/4262.204.0/factory_test/chromiumos_factory_image.bin
607
608        @raises: ValueError if the factory artifact name is missing from
609                 the config.
610
611        """
612        if not image_name:
613            logging.error('Need an image_name to stage a factory image.')
614            return
615
616        factory_artifact = CONFIG.get_config_value(
617                'CROS', 'factory_artifact', type=str, default='')
618        if not factory_artifact:
619            raise ValueError('Cannot retrieve the factory artifact name from '
620                             'autotest config, and hence cannot stage factory '
621                             'artifacts.')
622
623        logging.info('Staging build for servo install: %s', image_name)
624        devserver = dev_server.ImageServer.resolve(image_name, self.hostname)
625        devserver.stage_artifacts(
626                image_name,
627                [factory_artifact],
628                archive_url=None)
629
630        return tools.factory_image_url_pattern() % (devserver.url(), image_name)
631
632
633    def _get_au_monarch_fields(self, devserver, build):
634        """Form monarch fields by given devserve & build for auto-update.
635
636        @param devserver: the devserver (ImageServer instance) for auto-update.
637        @param build: the build to be updated.
638
639        @return A dictionary of monach fields.
640        """
641        try:
642            board, build_type, milestone, _ = server_utils.ParseBuildName(build)
643        except server_utils.ParseBuildNameException:
644            logging.warning('Unable to parse build name %s. Something is '
645                            'likely broken, but will continue anyway.',
646                            build)
647            board, build_type, milestone = ('', '', '')
648
649        monarch_fields = {
650                'dev_server': devserver.hostname,
651                'board': board,
652                'build_type': build_type,
653                'milestone': milestone
654        }
655        return monarch_fields
656
657
658    def _retry_auto_update_with_new_devserver(self, build, last_devserver,
659                                              force_update, force_full_update,
660                                              force_original):
661        """Kick off auto-update by devserver and send metrics.
662
663        @param build: the build to update.
664        @param last_devserver: the last devserver that failed to provision.
665        @param force_update: see |machine_install_by_devserver|'s force_udpate
666                             for details.
667        @param force_full_update: see |machine_install_by_devserver|'s
668                                  force_full_update for details.
669        @param force_original: Whether to force stateful update with the
670                               original payload.
671
672        @return the result of |auto_update| in dev_server.
673        """
674        devserver = dev_server.resolve(
675                build, self.hostname, ban_list=[last_devserver.url()])
676        devserver.trigger_download(build, synchronous=False)
677        monarch_fields = self._get_au_monarch_fields(devserver, build)
678        logging.debug('Retry auto_update: resolved devserver for '
679                      'auto-update: %s', devserver.url())
680
681        # Add metrics
682        install_with_dev_counter = metrics.Counter(
683                'chromeos/autotest/provision/install_with_devserver')
684        install_with_dev_counter.increment(fields=monarch_fields)
685        c = metrics.Counter(
686                'chromeos/autotest/provision/retry_by_devserver')
687        monarch_fields['last_devserver'] = last_devserver.hostname
688        monarch_fields['host'] = self.hostname
689        c.increment(fields=monarch_fields)
690
691        # Won't retry auto_update in a retry of auto-update.
692        # In other words, we only retry auto-update once with a different
693        # devservers.
694        devserver.auto_update(
695                self.hostname, build,
696                original_board=self.get_board().replace(
697                        ds_constants.BOARD_PREFIX, ''),
698                original_release_version=self.get_release_version(),
699                log_dir=self.job.resultdir,
700                force_update=force_update,
701                full_update=force_full_update,
702                force_original=force_original)
703
704
705    def machine_install_by_devserver(self, update_url=None, force_update=False,
706                    local_devserver=False, repair=False,
707                    force_full_update=False):
708        """Ultiize devserver to install the DUT.
709
710        (TODO) crbugs.com/627269: The logic in this function has some overlap
711        with those in function machine_install. The merge will be done later,
712        not in the same CL.
713
714        @param update_url: The update_url or build for the host to update.
715        @param force_update: Force an update even if the version installed
716                is the same. Default:False
717        @param local_devserver: Used by test_that to allow people to
718                use their local devserver. Default: False
719        @param repair: Forces update to repair image. Implies force_update.
720        @param force_full_update: If True, do not attempt to run stateful
721                update, force a full reimage. If False, try stateful update
722                first when the dut is already installed with the same version.
723        @raises autoupdater.ChromiumOSError
724
725        @returns A tuple of (image_name, host_attributes).
726                image_name is the name of image installed, e.g.,
727                veyron_jerry-release/R50-7871.0.0
728                host_attributes is a dictionary of (attribute, value), which
729                can be saved to afe_host_attributes table in database. This
730                method returns a dictionary with a single entry of
731                `job_repo_url`: repo_url, where repo_url is a devserver url to
732                autotest packages.
733        """
734        if repair:
735            update_url = self._get_cros_repair_image_name()
736            force_update = True
737
738        if not update_url and not self._parser.options.image:
739            raise error.AutoservError(
740                    'There is no update URL, nor a method to get one.')
741
742        if not update_url and self._parser.options.image:
743            update_url = self._parser.options.image
744
745
746        # Get build from parameter or AFE.
747        # If the build is not a URL, let devserver to stage it first.
748        # Otherwise, choose a devserver to trigger auto-update.
749        build = None
750        devserver = None
751        logging.debug('Resolving a devserver for auto-update')
752        previously_resolved = False
753        if update_url.startswith('http://'):
754            build = autoupdater.url_to_image_name(update_url)
755            previously_resolved = True
756        else:
757            build = update_url
758        devserver = dev_server.resolve(build, self.hostname)
759        server_name = devserver.hostname
760
761        monarch_fields = self._get_au_monarch_fields(devserver, build)
762
763        if previously_resolved:
764            # Make sure devserver for Auto-Update has staged the build.
765            if server_name not in update_url:
766              logging.debug('Resolved to devserver that does not match '
767                            'update_url. The previously resolved devserver '
768                            'must be unhealthy. Switching to use devserver %s,'
769                            ' and re-staging.',
770                            server_name)
771              logging.info('Staging build for AU: %s', update_url)
772              devserver.trigger_download(build, synchronous=False)
773              c = metrics.Counter(
774                  'chromeos/autotest/provision/failover_download')
775              c.increment(fields=monarch_fields)
776        else:
777            logging.info('Staging build for AU: %s', update_url)
778            devserver.trigger_download(build, synchronous=False)
779            c = metrics.Counter('chromeos/autotest/provision/trigger_download')
780            c.increment(fields=monarch_fields)
781
782        # Report provision stats.
783        install_with_dev_counter = metrics.Counter(
784                'chromeos/autotest/provision/install_with_devserver')
785        install_with_dev_counter.increment(fields=monarch_fields)
786        logging.debug('Resolved devserver for auto-update: %s', devserver.url())
787
788        # and other metrics from this function.
789        metrics.Counter('chromeos/autotest/provision/resolve'
790                        ).increment(fields=monarch_fields)
791
792        force_original = self.get_chromeos_release_milestone() is None
793
794        try:
795            devserver.auto_update(
796                    self.hostname, build,
797                    original_board=self.get_board().replace(
798                            ds_constants.BOARD_PREFIX, ''),
799                    original_release_version=self.get_release_version(),
800                    log_dir=self.job.resultdir,
801                    force_update=force_update,
802                    full_update=force_full_update,
803                    force_original=force_original)
804        except dev_server.RetryableProvisionException:
805            # It indicates that last provision failed due to devserver load
806            # issue, so another devserver is resolved to kick off provision
807            # job once again and only once.
808            logging.debug('Provision failed due to devserver issue,'
809                          'retry it with another devserver.')
810
811            # Check first whether this DUT is completely offline. If so, skip
812            # the following provision tries.
813            logging.debug('Checking whether host %s is online.', self.hostname)
814            if utils.ping(self.hostname, tries=1, deadline=1) == 0:
815                self._retry_auto_update_with_new_devserver(
816                        build, devserver, force_update, force_full_update,
817                        force_original)
818            else:
819                raise error.AutoservError(
820                        'No answer to ping from %s' % self.hostname)
821
822        # The reason to resolve a new devserver in function machine_install
823        # is mostly because that the update_url there may has a strange format,
824        # and it's hard to parse the devserver url from it.
825        # Since we already resolve a devserver to trigger auto-update, the same
826        # devserver is used to form JOB_REPO_URL here. Verified in local test.
827        repo_url = tools.get_package_url(devserver.url(), build)
828        return build, {ds_constants.JOB_REPO_URL: repo_url}
829
830
831    def prepare_for_update(self):
832        """Prepares the DUT for an update.
833
834        Subclasses may override this to perform any special actions
835        required before updating.
836        """
837        pass
838
839
840    def machine_install(self, update_url=None, force_update=False,
841                        local_devserver=False, repair=False,
842                        force_full_update=False):
843        """Install the DUT.
844
845        Use stateful update if the DUT is already running the same build.
846        Stateful update does not update kernel and tends to run much faster
847        than a full reimage. If the DUT is running a different build, or it
848        failed to do a stateful update, full update, including kernel update,
849        will be applied to the DUT.
850
851        Once a host enters machine_install its host attribute job_repo_url
852        (used for package install) will be removed and then updated.
853
854        @param update_url: The url to use for the update
855                pattern: http://$devserver:###/update/$build
856                If update_url is None and repair is True we will install the
857                stable image listed in afe_stable_versions table. If the table
858                is not setup, global_config value under CROS.stable_cros_version
859                will be used instead.
860        @param force_update: Force an update even if the version installed
861                is the same. Default:False
862        @param local_devserver: Used by test_that to allow people to
863                use their local devserver. Default: False
864        @param repair: Forces update to repair image. Implies force_update.
865        @param force_full_update: If True, do not attempt to run stateful
866                update, force a full reimage. If False, try stateful update
867                first when the dut is already installed with the same version.
868        @raises autoupdater.ChromiumOSError
869
870        @returns A tuple of (image_name, host_attributes).
871                image_name is the name of image installed, e.g.,
872                veyron_jerry-release/R50-7871.0.0
873                host_attributes is a dictionary of (attribute, value), which
874                can be saved to afe_host_attributes table in database. This
875                method returns a dictionary with a single entry of
876                `job_repo_url`: repo_url, where repo_url is a devserver url to
877                autotest packages.
878        """
879        devserver = None
880        if repair:
881            update_url, devserver = self._stage_image_for_update()
882            force_update = True
883
884        if not update_url and not self._parser.options.image:
885            raise error.AutoservError(
886                    'There is no update URL, nor a method to get one.')
887
888        if not update_url and self._parser.options.image:
889            # This is the base case where we have no given update URL i.e.
890            # dynamic suites logic etc. This is the most flexible case where we
891            # can serve an update from any of our fleet of devservers.
892            requested_build = self._parser.options.image
893            if not requested_build.startswith('http://'):
894                logging.debug('Update will be staged for this installation')
895                update_url, devserver = self._stage_image_for_update(
896                        requested_build)
897            else:
898                update_url = requested_build
899
900        logging.debug('Update URL is %s', update_url)
901
902        # Report provision stats.
903        server_name = dev_server.get_hostname(update_url)
904        (metrics.Counter('chromeos/autotest/provision/install')
905         .increment(fields={'devserver': server_name}))
906
907        # Create a file to indicate if provision fails. The file will be removed
908        # by stateful update or full install.
909        self.run('touch %s' % self.PROVISION_FAILED)
910
911        update_complete = False
912        updater = autoupdater.ChromiumOSUpdater(
913                 update_url, host=self, local_devserver=local_devserver)
914        if not force_full_update:
915            try:
916                # If the DUT is already running the same build, try stateful
917                # update first as it's much quicker than a full re-image.
918                update_complete = self._try_stateful_update(
919                        update_url, force_update, updater)
920            except Exception as e:
921                logging.exception(e)
922
923        inactive_kernel = None
924        if update_complete or (not force_update and updater.check_version()):
925            logging.info('Install complete without full update')
926        else:
927            logging.info('DUT requires full update.')
928            self.reboot(timeout=self.REBOOT_TIMEOUT, wait=True)
929            self.prepare_for_update()
930
931            num_of_attempts = provision.FLAKY_DEVSERVER_ATTEMPTS
932
933            while num_of_attempts > 0:
934                num_of_attempts -= 1
935                try:
936                    updater.run_update()
937                except Exception:
938                    logging.warn('Autoupdate did not complete.')
939                    # Do additional check for the devserver health. Ideally,
940                    # the autoupdater.py could raise an exception when it
941                    # detected network flake but that would require
942                    # instrumenting the update engine and parsing it log.
943                    if (num_of_attempts <= 0 or
944                            devserver is None or
945                            dev_server.ImageServer.devserver_healthy(
946                                    devserver.url())):
947                        raise
948
949                    logging.warn('Devserver looks unhealthy. Trying another')
950                    update_url, devserver = self._stage_image_for_update(
951                            requested_build)
952                    logging.debug('New Update URL is %s', update_url)
953                    updater = autoupdater.ChromiumOSUpdater(
954                            update_url, host=self,
955                            local_devserver=local_devserver)
956                else:
957                    break
958
959            # Give it some time in case of IO issues.
960            time.sleep(10)
961
962            # Figure out active and inactive kernel.
963            active_kernel, inactive_kernel = updater.get_kernel_state()
964
965            # Ensure inactive kernel has higher priority than active.
966            if (updater.get_kernel_priority(inactive_kernel)
967                    < updater.get_kernel_priority(active_kernel)):
968                raise autoupdater.ChromiumOSError(
969                    'Update failed. The priority of the inactive kernel'
970                    ' partition is less than that of the active kernel'
971                    ' partition.')
972
973            # Updater has returned successfully; reboot the host.
974            #
975            # Regarding the 'crossystem' command: In some cases, the
976            # TPM gets into a state such that it fails verification.
977            # We don't know why.  However, this call papers over the
978            # problem by clearing the TPM during the reboot.
979            #
980            # We ignore failures from 'crossystem'.  Although failure
981            # here is unexpected, and could signal a bug, the point
982            # of the exercise is to paper over problems; allowing
983            # this to fail would defeat the purpose.
984            self.run('crossystem clear_tpm_owner_request=1',
985                     ignore_status=True)
986            self.reboot(timeout=self.REBOOT_TIMEOUT, wait=True)
987
988        self._post_update_processing(updater, inactive_kernel)
989        image_name = autoupdater.url_to_image_name(update_url)
990        # update_url is different from devserver url needed to stage autotest
991        # packages, therefore, resolve a new devserver url here.
992        devserver_url = dev_server.ImageServer.resolve(image_name,
993                                                       self.hostname).url()
994        repo_url = tools.get_package_url(devserver_url, image_name)
995        return image_name, {ds_constants.JOB_REPO_URL: repo_url}
996
997
998    def _clear_fw_version_labels(self, rw_only):
999        """Clear firmware version labels from the machine.
1000
1001        @param rw_only: True to only clear fwrw_version; otherewise, clear
1002                        both fwro_version and fwrw_version.
1003        """
1004        labels = self._AFE.get_labels(
1005                name__startswith=provision.FW_RW_VERSION_PREFIX,
1006                host__hostname=self.hostname)
1007        if not rw_only:
1008            labels = labels + self._AFE.get_labels(
1009                    name__startswith=provision.FW_RO_VERSION_PREFIX,
1010                    host__hostname=self.hostname)
1011        for label in labels:
1012            label.remove_hosts(hosts=[self.hostname])
1013
1014
1015    def _add_fw_version_label(self, build, rw_only):
1016        """Add firmware version label to the machine.
1017
1018        @param build: Build of firmware.
1019        @param rw_only: True to only add fwrw_version; otherwise, add both
1020                        fwro_version and fwrw_version.
1021
1022        """
1023        fw_label = provision.fwrw_version_to_label(build)
1024        self._AFE.run('label_add_hosts', id=fw_label, hosts=[self.hostname])
1025        if not rw_only:
1026            fw_label = provision.fwro_version_to_label(build)
1027            self._AFE.run('label_add_hosts', id=fw_label, hosts=[self.hostname])
1028
1029
1030    def firmware_install(self, build=None, rw_only=False):
1031        """Install firmware to the DUT.
1032
1033        Use stateful update if the DUT is already running the same build.
1034        Stateful update does not update kernel and tends to run much faster
1035        than a full reimage. If the DUT is running a different build, or it
1036        failed to do a stateful update, full update, including kernel update,
1037        will be applied to the DUT.
1038
1039        Once a host enters firmware_install its fw[ro|rw]_version label will
1040        be removed. After the firmware is updated successfully, a new
1041        fw[ro|rw]_version label will be added to the host.
1042
1043        @param build: The build version to which we want to provision the
1044                      firmware of the machine,
1045                      e.g. 'link-firmware/R22-2695.1.144'.
1046        @param rw_only: True to only install firmware to its RW portions. Keep
1047                        the RO portions unchanged.
1048
1049        TODO(dshi): After bug 381718 is fixed, update here with corresponding
1050                    exceptions that could be raised.
1051
1052        """
1053        if not self.servo:
1054            raise error.TestError('Host %s does not have servo.' %
1055                                  self.hostname)
1056
1057        # Get the DUT board name from servod.
1058        board = self.servo.get_board()
1059
1060        # If build is not set, try to install firmware from stable CrOS.
1061        if not build:
1062            build = afe_utils.get_stable_faft_version(board)
1063            if not build:
1064                raise error.TestError(
1065                        'Failed to find stable firmware build for %s.',
1066                        self.hostname)
1067            logging.info('Will install firmware from build %s.', build)
1068
1069        config = FAFTConfig(board)
1070        if config.use_u_boot:
1071            ap_image = 'image-%s.bin' % board
1072        else: # Depthcharge platform
1073            ap_image = 'image.bin'
1074        ec_image = 'ec.bin'
1075        ds = dev_server.ImageServer.resolve(build, self.hostname)
1076        ds.stage_artifacts(build, ['firmware'])
1077
1078        tmpd = autotemp.tempdir(unique_id='fwimage')
1079        try:
1080            fwurl = self._FW_IMAGE_URL_PATTERN % (ds.url(), build)
1081            local_tarball = os.path.join(tmpd.name, os.path.basename(fwurl))
1082            ds.download_file(fwurl, local_tarball)
1083
1084            self._clear_fw_version_labels(rw_only)
1085            if config.chrome_ec:
1086                logging.info('Will re-program EC %snow', 'RW ' if rw_only else '')
1087                server_utils.system('tar xf %s -C %s %s' %
1088                                    (local_tarball, tmpd.name, ec_image),
1089                                    timeout=60)
1090                self.servo.program_ec(os.path.join(tmpd.name, ec_image), rw_only)
1091            else:
1092                logging.info('Not a Chrome EC, ignore re-programing it')
1093            logging.info('Will re-program BIOS %snow', 'RW ' if rw_only else '')
1094            server_utils.system('tar xf %s -C %s %s' %
1095                                (local_tarball, tmpd.name, ap_image),
1096                                timeout=60)
1097            self.servo.program_bios(os.path.join(tmpd.name, ap_image), rw_only)
1098            self.servo.get_power_state_controller().reset()
1099            time.sleep(self.servo.BOOT_DELAY)
1100            if utils.host_is_in_lab_zone(self.hostname):
1101                self._add_fw_version_label(build, rw_only)
1102        finally:
1103            tmpd.clean()
1104
1105
1106    def show_update_engine_log(self):
1107        """Output update engine log."""
1108        logging.debug('Dumping %s', client_constants.UPDATE_ENGINE_LOG)
1109        self.run('cat %s' % client_constants.UPDATE_ENGINE_LOG)
1110
1111
1112    def _get_board_from_afe(self):
1113        """Retrieve this host's board from its labels stored locally.
1114
1115        Looks for a host label of the form "board:<board>", and
1116        returns the "<board>" part of the label.  `None` is returned
1117        if there is not a single, unique label matching the pattern.
1118
1119        @returns board from label, or `None`.
1120        """
1121        board = afe_utils.get_board(self)
1122        if board is None:
1123            raise error.AutoservError('DUT cannot be repaired, '
1124                                      'there is no board attribute.')
1125        return board
1126
1127
1128    def servo_install(self, image_url=None, usb_boot_timeout=USB_BOOT_TIMEOUT,
1129                      install_timeout=INSTALL_TIMEOUT):
1130        """
1131        Re-install the OS on the DUT by:
1132        1) installing a test image on a USB storage device attached to the Servo
1133                board,
1134        2) booting that image in recovery mode, and then
1135        3) installing the image with chromeos-install.
1136
1137        @param image_url: If specified use as the url to install on the DUT.
1138                otherwise boot the currently staged image on the USB stick.
1139        @param usb_boot_timeout: The usb_boot_timeout to use during reimage.
1140                Factory images need a longer usb_boot_timeout than regular
1141                cros images.
1142        @param install_timeout: The timeout to use when installing the chromeos
1143                image. Factory images need a longer install_timeout.
1144
1145        @raises AutoservError if the image fails to boot.
1146
1147        """
1148        logging.info('Downloading image to USB, then booting from it. Usb boot '
1149                     'timeout = %s', usb_boot_timeout)
1150        with metrics.SecondsTimer(
1151                'chromeos/autotest/provision/servo_install/boot_duration'):
1152            self.servo.install_recovery_image(image_url)
1153            if not self.wait_up(timeout=usb_boot_timeout):
1154                raise hosts.AutoservRepairError(
1155                        'DUT failed to boot from USB after %d seconds' %
1156                        usb_boot_timeout)
1157
1158        # The new chromeos-tpm-recovery has been merged since R44-7073.0.0.
1159        # In old CrOS images, this command fails. Skip the error.
1160        logging.info('Resetting the TPM status')
1161        try:
1162            self.run('chromeos-tpm-recovery')
1163        except error.AutoservRunError:
1164            logging.warn('chromeos-tpm-recovery is too old.')
1165
1166
1167        with metrics.SecondsTimer(
1168                'chromeos/autotest/provision/servo_install/install_duration'):
1169            logging.info('Installing image through chromeos-install.')
1170            self.run('chromeos-install --yes', timeout=install_timeout)
1171            self.halt()
1172
1173        logging.info('Power cycling DUT through servo.')
1174        self.servo.get_power_state_controller().power_off()
1175        self.servo.switch_usbkey('off')
1176        # N.B. The Servo API requires that we use power_on() here
1177        # for two reasons:
1178        #  1) After turning on a DUT in recovery mode, you must turn
1179        #     it off and then on with power_on() once more to
1180        #     disable recovery mode (this is a Parrot specific
1181        #     requirement).
1182        #  2) After power_off(), the only way to turn on is with
1183        #     power_on() (this is a Storm specific requirement).
1184        self.servo.get_power_state_controller().power_on()
1185
1186        logging.info('Waiting for DUT to come back up.')
1187        if not self.wait_up(timeout=self.BOOT_TIMEOUT):
1188            raise error.AutoservError('DUT failed to reboot installed '
1189                                      'test image after %d seconds' %
1190                                      self.BOOT_TIMEOUT)
1191
1192
1193    def repair_servo(self):
1194        """
1195        Confirm that servo is initialized and verified.
1196
1197        If the servo object is missing, attempt to repair the servo
1198        host.  Repair failures are passed back to the caller.
1199
1200        @raise AutoservError: If there is no servo host for this CrOS
1201                              host.
1202        """
1203        if self.servo:
1204            return
1205        if not self._servo_host:
1206            raise error.AutoservError('No servo host for %s.' %
1207                                      self.hostname)
1208        self._servo_host.repair()
1209        self.servo = self._servo_host.get_servo()
1210
1211
1212    def repair(self):
1213        """Attempt to get the DUT to pass `self.verify()`.
1214
1215        This overrides the base class function for repair; it does
1216        not call back to the parent class, but instead relies on
1217        `self._repair_strategy` to coordinate the verification and
1218        repair steps needed to get the DUT working.
1219        """
1220        self._repair_strategy.repair(self)
1221
1222
1223    def close(self):
1224        super(CrosHost, self).close()
1225        if self._chameleon_host:
1226            self._chameleon_host.close()
1227
1228        if self._servo_host:
1229            self._servo_host.close()
1230
1231
1232    def get_power_supply_info(self):
1233        """Get the output of power_supply_info.
1234
1235        power_supply_info outputs the info of each power supply, e.g.,
1236        Device: Line Power
1237          online:                  no
1238          type:                    Mains
1239          voltage (V):             0
1240          current (A):             0
1241        Device: Battery
1242          state:                   Discharging
1243          percentage:              95.9276
1244          technology:              Li-ion
1245
1246        Above output shows two devices, Line Power and Battery, with details of
1247        each device listed. This function parses the output into a dictionary,
1248        with key being the device name, and value being a dictionary of details
1249        of the device info.
1250
1251        @return: The dictionary of power_supply_info, e.g.,
1252                 {'Line Power': {'online': 'yes', 'type': 'main'},
1253                  'Battery': {'vendor': 'xyz', 'percentage': '100'}}
1254        @raise error.AutoservRunError if power_supply_info tool is not found in
1255               the DUT. Caller should handle this error to avoid false failure
1256               on verification.
1257        """
1258        result = self.run('power_supply_info').stdout.strip()
1259        info = {}
1260        device_name = None
1261        device_info = {}
1262        for line in result.split('\n'):
1263            pair = [v.strip() for v in line.split(':')]
1264            if len(pair) != 2:
1265                continue
1266            if pair[0] == 'Device':
1267                if device_name:
1268                    info[device_name] = device_info
1269                device_name = pair[1]
1270                device_info = {}
1271            else:
1272                device_info[pair[0]] = pair[1]
1273        if device_name and not device_name in info:
1274            info[device_name] = device_info
1275        return info
1276
1277
1278    def get_battery_percentage(self):
1279        """Get the battery percentage.
1280
1281        @return: The percentage of battery level, value range from 0-100. Return
1282                 None if the battery info cannot be retrieved.
1283        """
1284        try:
1285            info = self.get_power_supply_info()
1286            logging.info(info)
1287            return float(info['Battery']['percentage'])
1288        except (KeyError, ValueError, error.AutoservRunError):
1289            return None
1290
1291
1292    def is_ac_connected(self):
1293        """Check if the dut has power adapter connected and charging.
1294
1295        @return: True if power adapter is connected and charging.
1296        """
1297        try:
1298            info = self.get_power_supply_info()
1299            return info['Line Power']['online'] == 'yes'
1300        except (KeyError, error.AutoservRunError):
1301            return None
1302
1303
1304    def _cleanup_poweron(self):
1305        """Special cleanup method to make sure hosts always get power back."""
1306        afe = frontend_wrappers.RetryingAFE(timeout_min=5, delay_sec=10)
1307        hosts = afe.get_hosts(hostname=self.hostname)
1308        if not hosts or not (self._RPM_OUTLET_CHANGED in
1309                             hosts[0].attributes):
1310            return
1311        logging.debug('This host has recently interacted with the RPM'
1312                      ' Infrastructure. Ensuring power is on.')
1313        try:
1314            self.power_on()
1315            afe.set_host_attribute(self._RPM_OUTLET_CHANGED, None,
1316                                   hostname=self.hostname)
1317        except rpm_client.RemotePowerException:
1318            logging.error('Failed to turn Power On for this host after '
1319                          'cleanup through the RPM Infrastructure.')
1320
1321            battery_percentage = self.get_battery_percentage()
1322            if battery_percentage and battery_percentage < 50:
1323                raise
1324            elif self.is_ac_connected():
1325                logging.info('The device has power adapter connected and '
1326                             'charging. No need to try to turn RPM on '
1327                             'again.')
1328                afe.set_host_attribute(self._RPM_OUTLET_CHANGED, None,
1329                                       hostname=self.hostname)
1330            logging.info('Battery level is now at %s%%. The device may '
1331                         'still have enough power to run test, so no '
1332                         'exception will be raised.', battery_percentage)
1333
1334
1335    def _is_factory_image(self):
1336        """Checks if the image on the DUT is a factory image.
1337
1338        @return: True if the image on the DUT is a factory image.
1339                 False otherwise.
1340        """
1341        result = self.run('[ -f /root/.factory_test ]', ignore_status=True)
1342        return result.exit_status == 0
1343
1344
1345    def _restart_ui(self):
1346        """Restart the Chrome UI.
1347
1348        @raises: FactoryImageCheckerException for factory images, since
1349                 we cannot attempt to restart ui on them.
1350                 error.AutoservRunError for any other type of error that
1351                 occurs while restarting ui.
1352        """
1353        if self._is_factory_image():
1354            raise FactoryImageCheckerException('Cannot restart ui on factory '
1355                                               'images')
1356
1357        # TODO(jrbarnette):  The command to stop/start the ui job
1358        # should live inside cros_ui, too.  However that would seem
1359        # to imply interface changes to the existing start()/restart()
1360        # functions, which is a bridge too far (for now).
1361        prompt = cros_ui.get_chrome_session_ident(self)
1362        self.run('stop ui; start ui')
1363        cros_ui.wait_for_chrome_ready(prompt, self)
1364
1365
1366    def _get_lsb_release_content(self):
1367        """Return the content of lsb-release file of host."""
1368        return self.run(
1369                'cat "%s"' % client_constants.LSB_RELEASE).stdout.strip()
1370
1371
1372    def get_release_version(self):
1373        """Get the value of attribute CHROMEOS_RELEASE_VERSION from lsb-release.
1374
1375        @returns The version string in lsb-release, under attribute
1376                 CHROMEOS_RELEASE_VERSION.
1377        """
1378        return lsbrelease_utils.get_chromeos_release_version(
1379                lsb_release_content=self._get_lsb_release_content())
1380
1381
1382    def get_chromeos_release_milestone(self):
1383        """Get the value of attribute CHROMEOS_RELEASE_BUILD_TYPE
1384        from lsb-release.
1385
1386        @returns The version string in lsb-release, under attribute
1387                 CHROMEOS_RELEASE_BUILD_TYPE.
1388        """
1389        return lsbrelease_utils.get_chromeos_release_milestone(
1390                lsb_release_content=self._get_lsb_release_content())
1391
1392
1393    def verify_cros_version_label(self):
1394        """ Make sure host's cros-version label match the actual image in dut.
1395
1396        Remove any cros-version: label that doesn't match that installed in
1397        the dut.
1398
1399        @param raise_error: Set to True to raise exception if any mismatch found
1400
1401        @raise error.AutoservError: If any mismatch between cros-version label
1402                                    and the build installed in dut is found.
1403        """
1404        labels = self._AFE.get_labels(
1405                name__startswith=ds_constants.VERSION_PREFIX,
1406                host__hostname=self.hostname)
1407        mismatch_found = False
1408        if labels:
1409            # Get CHROMEOS_RELEASE_VERSION from lsb-release, e.g., 6908.0.0.
1410            # Note that it's different from cros-version label, which has
1411            # builder and branch info, e.g.,
1412            # cros-version:peppy-release/R43-6908.0.0
1413            release_version = self.get_release_version()
1414            host_list = [self.hostname]
1415            for label in labels:
1416                # Remove any cros-version label that does not match
1417                # release_version.
1418                build_version = label.name[len(ds_constants.VERSION_PREFIX):]
1419                if not utils.version_match(build_version, release_version):
1420                    logging.warn('cros-version label "%s" does not match '
1421                                 'release version %s. Removing the label.',
1422                                 label.name, release_version)
1423                    label.remove_hosts(hosts=host_list)
1424                    mismatch_found = True
1425        if mismatch_found:
1426            raise error.AutoservError('The host has wrong cros-version label.')
1427
1428
1429    def cleanup_services(self):
1430        """Reinitializes the device for cleanup.
1431
1432        Subclasses may override this to customize the cleanup method.
1433
1434        To indicate failure of the reset, the implementation may raise
1435        any of:
1436            error.AutoservRunError
1437            error.AutotestRunError
1438            FactoryImageCheckerException
1439
1440        @raises error.AutoservRunError
1441        @raises error.AutotestRunError
1442        @raises error.FactoryImageCheckerException
1443        """
1444        self._restart_ui()
1445
1446
1447    def cleanup(self):
1448        self.run('rm -f %s' % client_constants.CLEANUP_LOGS_PAUSED_FILE)
1449        try:
1450            self.cleanup_services()
1451        except (error.AutotestRunError, error.AutoservRunError,
1452                FactoryImageCheckerException):
1453            logging.warning('Unable to restart ui, rebooting device.')
1454            # Since restarting the UI fails fall back to normal Autotest
1455            # cleanup routines, i.e. reboot the machine.
1456            super(CrosHost, self).cleanup()
1457        # Check if the rpm outlet was manipulated.
1458        if self.has_power():
1459            self._cleanup_poweron()
1460        self.verify_cros_version_label()
1461
1462
1463    def reboot(self, **dargs):
1464        """
1465        This function reboots the site host. The more generic
1466        RemoteHost.reboot() performs sync and sleeps for 5
1467        seconds. This is not necessary for Chrome OS devices as the
1468        sync should be finished in a short time during the reboot
1469        command.
1470        """
1471        if 'reboot_cmd' not in dargs:
1472            reboot_timeout = dargs.get('reboot_timeout', 10)
1473            dargs['reboot_cmd'] = ('sleep 1; '
1474                                   'reboot & sleep %d; '
1475                                   'reboot -f' % reboot_timeout)
1476        # Enable fastsync to avoid running extra sync commands before reboot.
1477        if 'fastsync' not in dargs:
1478            dargs['fastsync'] = True
1479
1480        # For purposes of logging reboot times:
1481        # Get the board name i.e. 'daisy_spring'
1482        board_fullname = self.get_board()
1483
1484        # Strip the prefix and add it to dargs.
1485        dargs['board'] = board_fullname[board_fullname.find(':')+1:]
1486        # Record who called us
1487        orig = sys._getframe(1).f_code
1488        metric_fields = {'board' : dargs['board'],
1489                         'dut_host_name' : self.hostname,
1490                         'success' : True}
1491        metric_debug_fields = {'board' : dargs['board'],
1492                               'caller' : "%s:%s" % (orig.co_filename, orig.co_name),
1493                               'success' : True,
1494                               'error' : ''}
1495
1496        t0 = time.time()
1497        try:
1498            super(CrosHost, self).reboot(**dargs)
1499        except Exception as e:
1500            metric_fields['success'] = False
1501            metric_debug_fields['success'] = False
1502            metric_debug_fields['error'] = type(e).__name__
1503            raise
1504        finally:
1505            duration = int(time.time() - t0)
1506            metrics.Counter(
1507                    'chromeos/autotest/autoserv/reboot_count').increment(
1508                    fields=metric_fields)
1509            metrics.Counter(
1510                    'chromeos/autotest/autoserv/reboot_debug').increment(
1511                    fields=metric_debug_fields)
1512            metrics.SecondsDistribution(
1513                    'chromeos/autotest/autoserv/reboot_duration').add(
1514                    duration, fields=metric_fields)
1515
1516
1517    def suspend(self, **dargs):
1518        """
1519        This function suspends the site host.
1520        """
1521        suspend_time = dargs.get('suspend_time', 60)
1522        dargs['timeout'] = suspend_time
1523        if 'suspend_cmd' not in dargs:
1524            dargs['suspend_cmd'] = ' && '.join([
1525                'echo 0 > /sys/class/rtc/rtc0/wakealarm',
1526                'echo +%d > /sys/class/rtc/rtc0/wakealarm' % suspend_time,
1527                'powerd_dbus_suspend --delay=0'])
1528        super(CrosHost, self).suspend(**dargs)
1529
1530
1531    def upstart_status(self, service_name):
1532        """Check the status of an upstart init script.
1533
1534        @param service_name: Service to look up.
1535
1536        @returns True if the service is running, False otherwise.
1537        """
1538        return self.run('status %s | grep start/running' %
1539                        service_name).stdout.strip() != ''
1540
1541
1542    def verify_software(self):
1543        """Verify working software on a Chrome OS system.
1544
1545        Tests for the following conditions:
1546         1. All conditions tested by the parent version of this
1547            function.
1548         2. Sufficient space in /mnt/stateful_partition.
1549         3. Sufficient space in /mnt/stateful_partition/encrypted.
1550         4. update_engine answers a simple status request over DBus.
1551
1552        """
1553        super(CrosHost, self).verify_software()
1554        default_kilo_inodes_required = CONFIG.get_config_value(
1555                'SERVER', 'kilo_inodes_required', type=int, default=100)
1556        board = self.get_board().replace(ds_constants.BOARD_PREFIX, '')
1557        kilo_inodes_required = CONFIG.get_config_value(
1558                'SERVER', 'kilo_inodes_required_%s' % board,
1559                type=int, default=default_kilo_inodes_required)
1560        self.check_inodes('/mnt/stateful_partition', kilo_inodes_required)
1561        self.check_diskspace(
1562            '/mnt/stateful_partition',
1563            CONFIG.get_config_value(
1564                'SERVER', 'gb_diskspace_required', type=float,
1565                default=20.0))
1566        encrypted_stateful_path = '/mnt/stateful_partition/encrypted'
1567        # Not all targets build with encrypted stateful support.
1568        if self.path_exists(encrypted_stateful_path):
1569            self.check_diskspace(
1570                encrypted_stateful_path,
1571                CONFIG.get_config_value(
1572                    'SERVER', 'gb_encrypted_diskspace_required', type=float,
1573                    default=0.1))
1574
1575        if not self.upstart_status('system-services'):
1576            raise error.AutoservError('Chrome failed to reach login. '
1577                                      'System services not running.')
1578
1579        # Factory images don't run update engine,
1580        # goofy controls dbus on these DUTs.
1581        if not self._is_factory_image():
1582            self.run('update_engine_client --status')
1583
1584        self.verify_cros_version_label()
1585
1586
1587    def verify(self):
1588        self._repair_strategy.verify(self)
1589
1590
1591    def make_ssh_command(self, user='root', port=22, opts='', hosts_file=None,
1592                         connect_timeout=None, alive_interval=None):
1593        """Override default make_ssh_command to use options tuned for Chrome OS.
1594
1595        Tuning changes:
1596          - ConnectTimeout=30; maximum of 30 seconds allowed for an SSH
1597          connection failure.  Consistency with remote_access.sh.
1598
1599          - ServerAliveInterval=900; which causes SSH to ping connection every
1600          900 seconds. In conjunction with ServerAliveCountMax ensures
1601          that if the connection dies, Autotest will bail out.
1602          Originally tried 60 secs, but saw frequent job ABORTS where
1603          the test completed successfully. Later increased from 180 seconds to
1604          900 seconds to account for tests where the DUT is suspended for
1605          longer periods of time.
1606
1607          - ServerAliveCountMax=3; consistency with remote_access.sh.
1608
1609          - ConnectAttempts=4; reduce flakiness in connection errors;
1610          consistency with remote_access.sh.
1611
1612          - UserKnownHostsFile=/dev/null; we don't care about the keys.
1613          Host keys change with every new installation, don't waste
1614          memory/space saving them.
1615
1616          - SSH protocol forced to 2; needed for ServerAliveInterval.
1617
1618        @param user User name to use for the ssh connection.
1619        @param port Port on the target host to use for ssh connection.
1620        @param opts Additional options to the ssh command.
1621        @param hosts_file Ignored.
1622        @param connect_timeout Ignored.
1623        @param alive_interval Ignored.
1624        """
1625        base_command = ('/usr/bin/ssh -a -x %s %s %s'
1626                        ' -o StrictHostKeyChecking=no'
1627                        ' -o UserKnownHostsFile=/dev/null -o BatchMode=yes'
1628                        ' -o ConnectTimeout=30 -o ServerAliveInterval=900'
1629                        ' -o ServerAliveCountMax=3 -o ConnectionAttempts=4'
1630                        ' -o Protocol=2 -l %s -p %d')
1631        return base_command % (self._ssh_verbosity_flag, self._ssh_options,
1632                               opts, user, port)
1633    def syslog(self, message, tag='autotest'):
1634        """Logs a message to syslog on host.
1635
1636        @param message String message to log into syslog
1637        @param tag String tag prefix for syslog
1638
1639        """
1640        self.run('logger -t "%s" "%s"' % (tag, message))
1641
1642
1643    def _ping_check_status(self, status):
1644        """Ping the host once, and return whether it has a given status.
1645
1646        @param status Check the ping status against this value.
1647        @return True iff `status` and the result of ping are the same
1648                (i.e. both True or both False).
1649
1650        """
1651        ping_val = utils.ping(self.hostname, tries=1, deadline=1)
1652        return not (status ^ (ping_val == 0))
1653
1654    def _ping_wait_for_status(self, status, timeout):
1655        """Wait for the host to have a given status (UP or DOWN).
1656
1657        Status is checked by polling.  Polling will not last longer
1658        than the number of seconds in `timeout`.  The polling
1659        interval will be long enough that only approximately
1660        _PING_WAIT_COUNT polling cycles will be executed, subject
1661        to a maximum interval of about one minute.
1662
1663        @param status Waiting will stop immediately if `ping` of the
1664                      host returns this status.
1665        @param timeout Poll for at most this many seconds.
1666        @return True iff the host status from `ping` matched the
1667                requested status at the time of return.
1668
1669        """
1670        # _ping_check_status() takes about 1 second, hence the
1671        # "- 1" in the formula below.
1672        # FIXME: if the ping command errors then _ping_check_status()
1673        # returns instantly. If timeout is also smaller than twice
1674        # _PING_WAIT_COUNT then the while loop below forks many
1675        # thousands of ping commands (see /tmp/test_that_results_XXXXX/
1676        # /results-1-logging_YYY.ZZZ/debug/autoserv.DEBUG) and hogs one
1677        # CPU core for 60 seconds.
1678        poll_interval = min(int(timeout / self._PING_WAIT_COUNT), 60) - 1
1679        end_time = time.time() + timeout
1680        while time.time() <= end_time:
1681            if self._ping_check_status(status):
1682                return True
1683            if poll_interval > 0:
1684                time.sleep(poll_interval)
1685
1686        # The last thing we did was sleep(poll_interval), so it may
1687        # have been too long since the last `ping`.  Check one more
1688        # time, just to be sure.
1689        return self._ping_check_status(status)
1690
1691    def ping_wait_up(self, timeout):
1692        """Wait for the host to respond to `ping`.
1693
1694        N.B.  This method is not a reliable substitute for
1695        `wait_up()`, because a host that responds to ping will not
1696        necessarily respond to ssh.  This method should only be used
1697        if the target DUT can be considered functional even if it
1698        can't be reached via ssh.
1699
1700        @param timeout Minimum time to allow before declaring the
1701                       host to be non-responsive.
1702        @return True iff the host answered to ping before the timeout.
1703
1704        """
1705        return self._ping_wait_for_status(self._PING_STATUS_UP, timeout)
1706
1707    def ping_wait_down(self, timeout):
1708        """Wait until the host no longer responds to `ping`.
1709
1710        This function can be used as a slightly faster version of
1711        `wait_down()`, by avoiding potentially long ssh timeouts.
1712
1713        @param timeout Minimum time to allow for the host to become
1714                       non-responsive.
1715        @return True iff the host quit answering ping before the
1716                timeout.
1717
1718        """
1719        return self._ping_wait_for_status(self._PING_STATUS_DOWN, timeout)
1720
1721    def test_wait_for_sleep(self, sleep_timeout=None):
1722        """Wait for the client to enter low-power sleep mode.
1723
1724        The test for "is asleep" can't distinguish a system that is
1725        powered off; to confirm that the unit was asleep, it is
1726        necessary to force resume, and then call
1727        `test_wait_for_resume()`.
1728
1729        This function is expected to be called from a test as part
1730        of a sequence like the following:
1731
1732        ~~~~~~~~
1733            boot_id = host.get_boot_id()
1734            # trigger sleep on the host
1735            host.test_wait_for_sleep()
1736            # trigger resume on the host
1737            host.test_wait_for_resume(boot_id)
1738        ~~~~~~~~
1739
1740        @param sleep_timeout time limit in seconds to allow the host sleep.
1741
1742        @exception TestFail The host did not go to sleep within
1743                            the allowed time.
1744        """
1745        if sleep_timeout is None:
1746            sleep_timeout = self.SLEEP_TIMEOUT
1747
1748        if not self.ping_wait_down(timeout=sleep_timeout):
1749            raise error.TestFail(
1750                'client failed to sleep after %d seconds' % sleep_timeout)
1751
1752
1753    def test_wait_for_resume(self, old_boot_id, resume_timeout=None):
1754        """Wait for the client to resume from low-power sleep mode.
1755
1756        The `old_boot_id` parameter should be the value from
1757        `get_boot_id()` obtained prior to entering sleep mode.  A
1758        `TestFail` exception is raised if the boot id changes.
1759
1760        See @ref test_wait_for_sleep for more on this function's
1761        usage.
1762
1763        @param old_boot_id A boot id value obtained before the
1764                               target host went to sleep.
1765        @param resume_timeout time limit in seconds to allow the host up.
1766
1767        @exception TestFail The host did not respond within the
1768                            allowed time.
1769        @exception TestFail The host responded, but the boot id test
1770                            indicated a reboot rather than a sleep
1771                            cycle.
1772        """
1773        if resume_timeout is None:
1774            resume_timeout = self.RESUME_TIMEOUT
1775
1776        if not self.wait_up(timeout=resume_timeout):
1777            raise error.TestFail(
1778                'client failed to resume from sleep after %d seconds' %
1779                    resume_timeout)
1780        else:
1781            new_boot_id = self.get_boot_id()
1782            if new_boot_id != old_boot_id:
1783                logging.error('client rebooted (old boot %s, new boot %s)',
1784                              old_boot_id, new_boot_id)
1785                raise error.TestFail(
1786                    'client rebooted, but sleep was expected')
1787
1788
1789    def test_wait_for_shutdown(self, shutdown_timeout=None):
1790        """Wait for the client to shut down.
1791
1792        The test for "has shut down" can't distinguish a system that
1793        is merely asleep; to confirm that the unit was down, it is
1794        necessary to force boot, and then call test_wait_for_boot().
1795
1796        This function is expected to be called from a test as part
1797        of a sequence like the following:
1798
1799        ~~~~~~~~
1800            boot_id = host.get_boot_id()
1801            # trigger shutdown on the host
1802            host.test_wait_for_shutdown()
1803            # trigger boot on the host
1804            host.test_wait_for_boot(boot_id)
1805        ~~~~~~~~
1806
1807        @param shutdown_timeout time limit in seconds to allow the host down.
1808        @exception TestFail The host did not shut down within the
1809                            allowed time.
1810        """
1811        if shutdown_timeout is None:
1812            shutdown_timeout = self.SHUTDOWN_TIMEOUT
1813
1814        if not self.ping_wait_down(timeout=shutdown_timeout):
1815            raise error.TestFail(
1816                'client failed to shut down after %d seconds' %
1817                    shutdown_timeout)
1818
1819
1820    def test_wait_for_boot(self, old_boot_id=None):
1821        """Wait for the client to boot from cold power.
1822
1823        The `old_boot_id` parameter should be the value from
1824        `get_boot_id()` obtained prior to shutting down.  A
1825        `TestFail` exception is raised if the boot id does not
1826        change.  The boot id test is omitted if `old_boot_id` is not
1827        specified.
1828
1829        See @ref test_wait_for_shutdown for more on this function's
1830        usage.
1831
1832        @param old_boot_id A boot id value obtained before the
1833                               shut down.
1834
1835        @exception TestFail The host did not respond within the
1836                            allowed time.
1837        @exception TestFail The host responded, but the boot id test
1838                            indicated that there was no reboot.
1839        """
1840        if not self.wait_up(timeout=self.REBOOT_TIMEOUT):
1841            raise error.TestFail(
1842                'client failed to reboot after %d seconds' %
1843                    self.REBOOT_TIMEOUT)
1844        elif old_boot_id:
1845            if self.get_boot_id() == old_boot_id:
1846                logging.error('client not rebooted (boot %s)',
1847                              old_boot_id)
1848                raise error.TestFail(
1849                    'client is back up, but did not reboot')
1850
1851
1852    @staticmethod
1853    def check_for_rpm_support(hostname):
1854        """For a given hostname, return whether or not it is powered by an RPM.
1855
1856        @param hostname: hostname to check for rpm support.
1857
1858        @return None if this host does not follows the defined naming format
1859                for RPM powered DUT's in the lab. If it does follow the format,
1860                it returns a regular expression MatchObject instead.
1861        """
1862        return re.match(CrosHost._RPM_HOSTNAME_REGEX, hostname)
1863
1864
1865    def has_power(self):
1866        """For this host, return whether or not it is powered by an RPM.
1867
1868        @return True if this host is in the CROS lab and follows the defined
1869                naming format.
1870        """
1871        return CrosHost.check_for_rpm_support(self.hostname)
1872
1873
1874    def _set_power(self, state, power_method):
1875        """Sets the power to the host via RPM, Servo or manual.
1876
1877        @param state Specifies which power state to set to DUT
1878        @param power_method Specifies which method of power control to
1879                            use. By default "RPM" will be used. Valid values
1880                            are the strings "RPM", "manual", "servoj10".
1881
1882        """
1883        ACCEPTABLE_STATES = ['ON', 'OFF']
1884
1885        if state.upper() not in ACCEPTABLE_STATES:
1886            raise error.TestError('State must be one of: %s.'
1887                                   % (ACCEPTABLE_STATES,))
1888
1889        if power_method == self.POWER_CONTROL_SERVO:
1890            logging.info('Setting servo port J10 to %s', state)
1891            self.servo.set('prtctl3_pwren', state.lower())
1892            time.sleep(self._USB_POWER_TIMEOUT)
1893        elif power_method == self.POWER_CONTROL_MANUAL:
1894            logging.info('You have %d seconds to set the AC power to %s.',
1895                         self._POWER_CYCLE_TIMEOUT, state)
1896            time.sleep(self._POWER_CYCLE_TIMEOUT)
1897        else:
1898            if not self.has_power():
1899                raise error.TestFail('DUT does not have RPM connected.')
1900            afe = frontend_wrappers.RetryingAFE(timeout_min=5, delay_sec=10)
1901            afe.set_host_attribute(self._RPM_OUTLET_CHANGED, True,
1902                                   hostname=self.hostname)
1903            rpm_client.set_power(self.hostname, state.upper(), timeout_mins=5)
1904
1905
1906    def power_off(self, power_method=POWER_CONTROL_RPM):
1907        """Turn off power to this host via RPM, Servo or manual.
1908
1909        @param power_method Specifies which method of power control to
1910                            use. By default "RPM" will be used. Valid values
1911                            are the strings "RPM", "manual", "servoj10".
1912
1913        """
1914        self._set_power('OFF', power_method)
1915
1916
1917    def power_on(self, power_method=POWER_CONTROL_RPM):
1918        """Turn on power to this host via RPM, Servo or manual.
1919
1920        @param power_method Specifies which method of power control to
1921                            use. By default "RPM" will be used. Valid values
1922                            are the strings "RPM", "manual", "servoj10".
1923
1924        """
1925        self._set_power('ON', power_method)
1926
1927
1928    def power_cycle(self, power_method=POWER_CONTROL_RPM):
1929        """Cycle power to this host by turning it OFF, then ON.
1930
1931        @param power_method Specifies which method of power control to
1932                            use. By default "RPM" will be used. Valid values
1933                            are the strings "RPM", "manual", "servoj10".
1934
1935        """
1936        if power_method in (self.POWER_CONTROL_SERVO,
1937                            self.POWER_CONTROL_MANUAL):
1938            self.power_off(power_method=power_method)
1939            time.sleep(self._POWER_CYCLE_TIMEOUT)
1940            self.power_on(power_method=power_method)
1941        else:
1942            rpm_client.set_power(self.hostname, 'CYCLE')
1943
1944
1945    def get_platform(self):
1946        """Determine the correct platform label for this host.
1947
1948        @returns a string representing this host's platform.
1949        """
1950        crossystem = utils.Crossystem(self)
1951        crossystem.init()
1952        # Extract fwid value and use the leading part as the platform id.
1953        # fwid generally follow the format of {platform}.{firmware version}
1954        # Example: Alex.X.YYY.Z or Google_Alex.X.YYY.Z
1955        platform = crossystem.fwid().split('.')[0].lower()
1956        # Newer platforms start with 'Google_' while the older ones do not.
1957        return platform.replace('google_', '')
1958
1959
1960    def get_architecture(self):
1961        """Determine the correct architecture label for this host.
1962
1963        @returns a string representing this host's architecture.
1964        """
1965        crossystem = utils.Crossystem(self)
1966        crossystem.init()
1967        return crossystem.arch()
1968
1969
1970    def get_chrome_version(self):
1971        """Gets the Chrome version number and milestone as strings.
1972
1973        Invokes "chrome --version" to get the version number and milestone.
1974
1975        @return A tuple (chrome_ver, milestone) where "chrome_ver" is the
1976            current Chrome version number as a string (in the form "W.X.Y.Z")
1977            and "milestone" is the first component of the version number
1978            (the "W" from "W.X.Y.Z").  If the version number cannot be parsed
1979            in the "W.X.Y.Z" format, the "chrome_ver" will be the full output
1980            of "chrome --version" and the milestone will be the empty string.
1981
1982        """
1983        version_string = self.run(client_constants.CHROME_VERSION_COMMAND).stdout
1984        return utils.parse_chrome_version(version_string)
1985
1986
1987    def is_chrome_switch_present(self, switch):
1988        """Returns True if the specified switch was provided to Chrome.
1989
1990        @param switch The chrome switch to search for.
1991        """
1992
1993        command = 'pgrep -x -f -c "/opt/google/chrome/chrome.*%s.*"' % switch
1994        return self.run(command, ignore_status=True).exit_status == 0
1995
1996
1997    def oobe_triggers_update(self):
1998        """Returns True if this host has an OOBE flow during which
1999        it will perform an update check and perhaps an update.
2000        One example of such a flow is Hands-Off Zero-Touch Enrollment.
2001        As more such flows are developed, code handling them needs
2002        to be added here.
2003
2004        @return Boolean indicating whether this host's OOBE triggers an update.
2005        """
2006        return self.is_chrome_switch_present(
2007            '--enterprise-enable-zero-touch-enrollment=hands-off')
2008
2009
2010    # TODO(kevcheng): change this to just return the board without the
2011    # 'board:' prefix and fix up all the callers.  Also look into removing the
2012    # need for this method.
2013    def get_board(self):
2014        """Determine the correct board label for this host.
2015
2016        @returns a string representing this host's board.
2017        """
2018        release_info = utils.parse_cmd_output('cat /etc/lsb-release',
2019                                              run_method=self.run)
2020        return (ds_constants.BOARD_PREFIX +
2021                release_info['CHROMEOS_RELEASE_BOARD'])
2022
2023
2024
2025    def has_lightsensor(self):
2026        """Determine the correct board label for this host.
2027
2028        @returns the string 'lightsensor' if this host has a lightsensor or
2029                 None if it does not.
2030        """
2031        search_cmd = "find -L %s -maxdepth 4 | egrep '%s'" % (
2032            self._LIGHTSENSOR_SEARCH_DIR, '|'.join(self._LIGHTSENSOR_FILES))
2033        try:
2034            # Run the search cmd following the symlinks. Stderr_tee is set to
2035            # None as there can be a symlink loop, but the command will still
2036            # execute correctly with a few messages printed to stderr.
2037            self.run(search_cmd, stdout_tee=None, stderr_tee=None)
2038            return 'lightsensor'
2039        except error.AutoservRunError:
2040            # egrep exited with a return code of 1 meaning none of the possible
2041            # lightsensor files existed.
2042            return None
2043
2044
2045    def has_bluetooth(self):
2046        """Determine the correct board label for this host.
2047
2048        @returns the string 'bluetooth' if this host has bluetooth or
2049                 None if it does not.
2050        """
2051        try:
2052            self.run('test -d /sys/class/bluetooth/hci0')
2053            # test exited with a return code of 0.
2054            return 'bluetooth'
2055        except error.AutoservRunError:
2056            # test exited with a return code 1 meaning the directory did not
2057            # exist.
2058            return None
2059
2060
2061    def get_accels(self):
2062        """
2063        Determine the type of accelerometers on this host.
2064
2065        @returns a string representing this host's accelerometer type.
2066        At present, it only returns "accel:cros-ec", for accelerometers
2067        attached to a Chrome OS EC, or none, if no accelerometers.
2068        """
2069        # Check to make sure we have ectool
2070        rv = self.run('which ectool', ignore_status=True)
2071        if rv.exit_status:
2072            logging.info("No ectool cmd found, assuming no EC accelerometers")
2073            return None
2074
2075        # Check that the EC supports the motionsense command
2076        rv = self.run('ectool motionsense', ignore_status=True)
2077        if rv.exit_status:
2078            logging.info("EC does not support motionsense command "
2079                         "assuming no EC accelerometers")
2080            return None
2081
2082        # Check that EC motion sensors are active
2083        active = self.run('ectool motionsense active').stdout.split('\n')
2084        if active[0] == "0":
2085            logging.info("Motion sense inactive, assuming no EC accelerometers")
2086            return None
2087
2088        logging.info("EC accelerometers found")
2089        return 'accel:cros-ec'
2090
2091
2092    def has_chameleon(self):
2093        """Determine if a Chameleon connected to this host.
2094
2095        @returns a list containing two strings ('chameleon' and
2096                 'chameleon:' + label, e.g. 'chameleon:hdmi') if this host
2097                 has a Chameleon or None if it has not.
2098        """
2099        if self._chameleon_host:
2100            return ['chameleon', 'chameleon:' + self.chameleon.get_label()]
2101        else:
2102            return None
2103
2104
2105    def has_loopback_dongle(self):
2106        """Determine if an audio loopback dongle is plugged to this host.
2107
2108        @returns 'audio_loopback_dongle' when there is an audio loopback dongle
2109                                         plugged to this host.
2110                 None                    when there is no audio loopback dongle
2111                                         plugged to this host.
2112        """
2113        nodes_info = self.run(command=cras_utils.get_cras_nodes_cmd(),
2114                              ignore_status=True).stdout
2115        if (cras_utils.node_type_is_plugged('HEADPHONE', nodes_info) and
2116            cras_utils.node_type_is_plugged('MIC', nodes_info)):
2117                return 'audio_loopback_dongle'
2118        else:
2119                return None
2120
2121
2122    def get_power_supply(self):
2123        """
2124        Determine what type of power supply the host has
2125
2126        @returns a string representing this host's power supply.
2127                 'power:battery' when the device has a battery intended for
2128                        extended use
2129                 'power:AC_primary' when the device has a battery not intended
2130                        for extended use (for moving the machine, etc)
2131                 'power:AC_only' when the device has no battery at all.
2132        """
2133        psu = self.run(command='mosys psu type', ignore_status=True)
2134        if psu.exit_status:
2135            # The psu command for mosys is not included for all platforms. The
2136            # assumption is that the device will have a battery if the command
2137            # is not found.
2138            return 'power:battery'
2139
2140        psu_str = psu.stdout.strip()
2141        if psu_str == 'unknown':
2142            return None
2143
2144        return 'power:%s' % psu_str
2145
2146
2147    def get_storage(self):
2148        """
2149        Determine the type of boot device for this host.
2150
2151        Determine if the internal device is SCSI or dw_mmc device.
2152        Then check that it is SSD or HDD or eMMC or something else.
2153
2154        @returns a string representing this host's internal device type.
2155                 'storage:ssd' when internal device is solid state drive
2156                 'storage:hdd' when internal device is hard disk drive
2157                 'storage:mmc' when internal device is mmc drive
2158                 None          When internal device is something else or
2159                               when we are unable to determine the type
2160        """
2161        # The output should be /dev/mmcblk* for SD/eMMC or /dev/sd* for scsi
2162        rootdev_cmd = ' '.join(['. /usr/sbin/write_gpt.sh;',
2163                                '. /usr/share/misc/chromeos-common.sh;',
2164                                'load_base_vars;',
2165                                'get_fixed_dst_drive'])
2166        rootdev = self.run(command=rootdev_cmd, ignore_status=True)
2167        if rootdev.exit_status:
2168            logging.info("Fail to run %s", rootdev_cmd)
2169            return None
2170        rootdev_str = rootdev.stdout.strip()
2171
2172        if not rootdev_str:
2173            return None
2174
2175        rootdev_base = os.path.basename(rootdev_str)
2176
2177        mmc_pattern = '/dev/mmcblk[0-9]'
2178        if re.match(mmc_pattern, rootdev_str):
2179            # Use type to determine if the internal device is eMMC or somthing
2180            # else. We can assume that MMC is always an internal device.
2181            type_cmd = 'cat /sys/block/%s/device/type' % rootdev_base
2182            type = self.run(command=type_cmd, ignore_status=True)
2183            if type.exit_status:
2184                logging.info("Fail to run %s", type_cmd)
2185                return None
2186            type_str = type.stdout.strip()
2187
2188            if type_str == 'MMC':
2189                return 'storage:mmc'
2190
2191        scsi_pattern = '/dev/sd[a-z]+'
2192        if re.match(scsi_pattern, rootdev.stdout):
2193            # Read symlink for /sys/block/sd* to determine if the internal
2194            # device is connected via ata or usb.
2195            link_cmd = 'readlink /sys/block/%s' % rootdev_base
2196            link = self.run(command=link_cmd, ignore_status=True)
2197            if link.exit_status:
2198                logging.info("Fail to run %s", link_cmd)
2199                return None
2200            link_str = link.stdout.strip()
2201            if 'usb' in link_str:
2202                return None
2203
2204            # Read rotation to determine if the internal device is ssd or hdd.
2205            rotate_cmd = str('cat /sys/block/%s/queue/rotational'
2206                              % rootdev_base)
2207            rotate = self.run(command=rotate_cmd, ignore_status=True)
2208            if rotate.exit_status:
2209                logging.info("Fail to run %s", rotate_cmd)
2210                return None
2211            rotate_str = rotate.stdout.strip()
2212
2213            rotate_dict = {'0':'storage:ssd', '1':'storage:hdd'}
2214            return rotate_dict.get(rotate_str)
2215
2216        # All other internal device / error case will always fall here
2217        return None
2218
2219
2220    def get_servo(self):
2221        """Determine if the host has a servo attached.
2222
2223        If the host has a working servo attached, it should have a servo label.
2224
2225        @return: string 'servo' if the host has servo attached. Otherwise,
2226                 returns None.
2227        """
2228        return 'servo' if self._servo_host else None
2229
2230
2231    def get_video_labels(self):
2232        """Run /usr/local/bin/avtest_label_detect to get a list of video labels.
2233
2234        Sample output of avtest_label_detect:
2235        Detected label: hw_video_acc_vp8
2236        Detected label: webcam
2237
2238        @return: A list of labels detected by tool avtest_label_detect.
2239        """
2240        try:
2241            result = self.run('/usr/local/bin/avtest_label_detect').stdout
2242            return re.findall('^Detected label: (\w+)$', result, re.M)
2243        except error.AutoservRunError:
2244            # The tool is not installed.
2245            return []
2246
2247
2248    def is_video_glitch_detection_supported(self):
2249        """ Determine if a board under test is supported for video glitch
2250        detection tests.
2251
2252        @return: 'video_glitch_detection' if board is supported, None otherwise.
2253        """
2254        board = self.get_board().replace(ds_constants.BOARD_PREFIX, '')
2255
2256        if board in video_test_constants.SUPPORTED_BOARDS:
2257            return 'video_glitch_detection'
2258
2259        return None
2260
2261
2262    def get_touch(self):
2263        """
2264        Determine whether board under test has a touchpad or touchscreen.
2265
2266        @return: A list of some combination of 'touchscreen' and 'touchpad',
2267            depending on what is present on the device.
2268
2269        """
2270        labels = []
2271        looking_for = ['touchpad', 'touchscreen']
2272        player = input_playback.InputPlayback()
2273        input_events = self.run('ls /dev/input/event*').stdout.strip().split()
2274        filename = '/tmp/touch_labels'
2275        for event in input_events:
2276            self.run('evtest %s > %s' % (event, filename), timeout=1,
2277                     ignore_timeout=True)
2278            properties = self.run('cat %s' % filename).stdout
2279            input_type = player._determine_input_type(properties)
2280            if input_type in looking_for:
2281                labels.append(input_type)
2282                looking_for.remove(input_type)
2283            if len(looking_for) == 0:
2284                break
2285        self.run('rm %s' % filename)
2286
2287        return labels
2288
2289
2290    def has_internal_display(self):
2291        """Determine if the device under test is equipped with an internal
2292        display.
2293
2294        @return: 'internal_display' if one is present; None otherwise.
2295        """
2296        from autotest_lib.client.cros.graphics import graphics_utils
2297        from autotest_lib.client.common_lib import utils as common_utils
2298
2299        def __system_output(cmd):
2300            return self.run(cmd).stdout
2301
2302        def __read_file(remote_path):
2303            return self.run('cat %s' % remote_path).stdout
2304
2305        # Hijack the necessary client functions so that we can take advantage
2306        # of the client lib here.
2307        # FIXME: find a less hacky way than this
2308        original_system_output = utils.system_output
2309        original_read_file = common_utils.read_file
2310        utils.system_output = __system_output
2311        common_utils.read_file = __read_file
2312        try:
2313            return ('internal_display' if graphics_utils.has_internal_display()
2314                                   else None)
2315        finally:
2316            utils.system_output = original_system_output
2317            common_utils.read_file = original_read_file
2318
2319
2320    def has_lucid_sleep_support(self):
2321        """Determine if the device under test has support for lucid sleep.
2322
2323        @return 'lucidsleep' if this board supports lucid sleep; None otherwise
2324        """
2325        board = self.get_board().replace(ds_constants.BOARD_PREFIX, '')
2326        return 'lucidsleep' if board in LUCID_SLEEP_BOARDS else None
2327
2328
2329    def is_boot_from_usb(self):
2330        """Check if DUT is boot from USB.
2331
2332        @return: True if DUT is boot from usb.
2333        """
2334        device = self.run('rootdev -s -d').stdout.strip()
2335        removable = int(self.run('cat /sys/block/%s/removable' %
2336                                 os.path.basename(device)).stdout.strip())
2337        return removable == 1
2338
2339
2340    def read_from_meminfo(self, key):
2341        """Return the memory info from /proc/meminfo
2342
2343        @param key: meminfo requested
2344
2345        @return the memory value as a string
2346
2347        """
2348        meminfo = self.run('grep %s /proc/meminfo' % key).stdout.strip()
2349        logging.debug('%s', meminfo)
2350        return int(re.search(r'\d+', meminfo).group(0))
2351
2352
2353    def get_cpu_arch(self):
2354        """Returns CPU arch of the device.
2355
2356        @return CPU architecture of the DUT.
2357        """
2358        # Add CPUs by following logic in client/bin/utils.py.
2359        if self.run("grep '^flags.*:.* lm .*' /proc/cpuinfo",
2360                ignore_status=True).stdout:
2361            return 'x86_64'
2362        if self.run("grep -Ei 'ARM|CPU implementer' /proc/cpuinfo",
2363                ignore_status=True).stdout:
2364            return 'arm'
2365        return 'i386'
2366
2367
2368    def get_board_type(self):
2369        """
2370        Get the DUT's device type from /etc/lsb-release.
2371        DEVICETYPE can be one of CHROMEBOX, CHROMEBASE, CHROMEBOOK or more.
2372
2373        @return value of DEVICETYPE param from lsb-release.
2374        """
2375        device_type = self.run('grep DEVICETYPE /etc/lsb-release',
2376                               ignore_status=True).stdout
2377        if device_type:
2378            return device_type.split('=')[-1].strip()
2379        return ''
2380
2381
2382    def get_os_type(self):
2383        return 'cros'
2384
2385
2386    def enable_adb_testing(self):
2387        """Mark this host as an adb tester."""
2388        self.run('touch %s' % constants.ANDROID_TESTER_FILEFLAG)
2389
2390
2391    def get_labels(self):
2392        """Return the detected labels on the host."""
2393        return self.labels.get_labels(self)
2394
2395
2396    def update_labels(self):
2397        """Update the labels on the host."""
2398        self.labels.update_labels(self)
2399