Home | History | Annotate | Download | only in hosts
      1 # Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
      2 # Use of this source code is governed by a BSD-style license that can be
      3 # found in the LICENSE file.
      4 
      5 import functools
      6 import json
      7 import logging
      8 import os
      9 import re
     10 import time
     11 
     12 import common
     13 from autotest_lib.client.bin import utils
     14 from autotest_lib.client.common_lib import autotemp
     15 from autotest_lib.client.common_lib import error
     16 from autotest_lib.client.common_lib import global_config
     17 from autotest_lib.client.common_lib import lsbrelease_utils
     18 from autotest_lib.client.common_lib.cros import autoupdater
     19 from autotest_lib.client.common_lib.cros import dev_server
     20 from autotest_lib.client.common_lib.cros.graphite import autotest_es
     21 from autotest_lib.client.common_lib.cros.graphite import autotest_stats
     22 from autotest_lib.client.cros import constants as client_constants
     23 from autotest_lib.client.cros import cros_ui
     24 from autotest_lib.client.cros.audio import cras_utils
     25 from autotest_lib.client.cros.input_playback import input_playback
     26 from autotest_lib.client.cros.video import constants as video_test_constants
     27 from autotest_lib.server import afe_utils
     28 from autotest_lib.server import autoserv_parser
     29 from autotest_lib.server import autotest
     30 from autotest_lib.server import constants
     31 from autotest_lib.server import crashcollect
     32 from autotest_lib.server import utils as server_utils
     33 from autotest_lib.server.cros import provision
     34 from autotest_lib.server.cros.dynamic_suite import constants as ds_constants
     35 from autotest_lib.server.cros.dynamic_suite import tools, frontend_wrappers
     36 from autotest_lib.server.cros.faft.config.config import Config as FAFTConfig
     37 from autotest_lib.server.cros.servo import plankton
     38 from autotest_lib.server.hosts import abstract_ssh
     39 from autotest_lib.server.hosts import chameleon_host
     40 from autotest_lib.server.hosts import plankton_host
     41 from autotest_lib.server.hosts import servo_host
     42 from autotest_lib.site_utils.rpm_control_system import rpm_client
     43 
     44 
     45 CONFIG = global_config.global_config
     46 
     47 LUCID_SLEEP_BOARDS = ['samus', 'lulu']
     48 
     49 # A file to indicate provision failure and require Repair job to powerwash the
     50 # dut.
     51 PROVISION_FAILED = '/var/tmp/provision_failed'
     52 
     53 class FactoryImageCheckerException(error.AutoservError):
     54     """Exception raised when an image is a factory image."""
     55     pass
     56 
     57 
     58 class CrosHost(abstract_ssh.AbstractSSHHost):
     59     """Chromium OS specific subclass of Host."""
     60 
     61     VERSION_PREFIX = provision.CROS_VERSION_PREFIX
     62 
     63     _parser = autoserv_parser.autoserv_parser
     64     _AFE = frontend_wrappers.RetryingAFE(timeout_min=5, delay_sec=10)
     65 
     66     # Timeout values (in seconds) associated with various Chrome OS
     67     # state changes.
     68     #
     69     # In general, a good rule of thumb is that the timeout can be up
     70     # to twice the typical measured value on the slowest platform.
     71     # The times here have not necessarily been empirically tested to
     72     # meet this criterion.
     73     #
     74     # SLEEP_TIMEOUT:  Time to allow for suspend to memory.
     75     # RESUME_TIMEOUT: Time to allow for resume after suspend, plus
     76     #   time to restart the netwowrk.
     77     # SHUTDOWN_TIMEOUT: Time to allow for shut down.
     78     # BOOT_TIMEOUT: Time to allow for boot from power off.  Among
     79     #   other things, this must account for the 30 second dev-mode
     80     #   screen delay, time to start the network on the DUT, and the
     81     #   ssh timeout of 120 seconds.
     82     # USB_BOOT_TIMEOUT: Time to allow for boot from a USB device,
     83     #   including the 30 second dev-mode delay and time to start the
     84     #   network.
     85     # INSTALL_TIMEOUT: Time to allow for chromeos-install.
     86     # POWERWASH_BOOT_TIMEOUT: Time to allow for a reboot that
     87     #   includes powerwash.
     88 
     89     SLEEP_TIMEOUT = 2
     90     RESUME_TIMEOUT = 10
     91     SHUTDOWN_TIMEOUT = 10
     92     BOOT_TIMEOUT = 150
     93     USB_BOOT_TIMEOUT = 300
     94     INSTALL_TIMEOUT = 480
     95     POWERWASH_BOOT_TIMEOUT = 60
     96 
     97     # Minimum OS version that supports server side packaging. Older builds may
     98     # not have server side package built or with Autotest code change to support
     99     # server-side packaging.
    100     MIN_VERSION_SUPPORT_SSP = CONFIG.get_config_value(
    101             'AUTOSERV', 'min_version_support_ssp', type=int)
    102 
    103     # REBOOT_TIMEOUT: How long to wait for a reboot.
    104     #
    105     # We have a long timeout to ensure we don't flakily fail due to other
    106     # issues. Shorter timeouts are vetted in platform_RebootAfterUpdate.
    107     # TODO(sbasi - crbug.com/276094) Restore to 5 mins once the 'host did not
    108     # return from reboot' bug is solved.
    109     REBOOT_TIMEOUT = 480
    110 
    111     # _USB_POWER_TIMEOUT: Time to allow for USB to power toggle ON and OFF.
    112     # _POWER_CYCLE_TIMEOUT: Time to allow for manual power cycle.
    113     _USB_POWER_TIMEOUT = 5
    114     _POWER_CYCLE_TIMEOUT = 10
    115 
    116     _RPM_RECOVERY_BOARDS = CONFIG.get_config_value('CROS',
    117             'rpm_recovery_boards', type=str).split(',')
    118 
    119     _MAX_POWER_CYCLE_ATTEMPTS = 6
    120     _LAB_MACHINE_FILE = '/mnt/stateful_partition/.labmachine'
    121     _RPM_HOSTNAME_REGEX = ('chromeos(\d+)(-row(\d+))?-rack(\d+[a-z]*)'
    122                            '-host(\d+)')
    123     _LIGHTSENSOR_FILES = [ "in_illuminance0_input",
    124                            "in_illuminance_input",
    125                            "in_illuminance0_raw",
    126                            "in_illuminance_raw",
    127                            "illuminance0_input"]
    128     _LIGHTSENSOR_SEARCH_DIR = '/sys/bus/iio/devices'
    129     _LABEL_FUNCTIONS = []
    130     _DETECTABLE_LABELS = []
    131     label_decorator = functools.partial(server_utils.add_label_detector,
    132                                         _LABEL_FUNCTIONS,
    133                                         _DETECTABLE_LABELS)
    134 
    135     # Constants used in ping_wait_up() and ping_wait_down().
    136     #
    137     # _PING_WAIT_COUNT is the approximate number of polling
    138     # cycles to use when waiting for a host state change.
    139     #
    140     # _PING_STATUS_DOWN and _PING_STATUS_UP are names used
    141     # for arguments to the internal _ping_wait_for_status()
    142     # method.
    143     _PING_WAIT_COUNT = 40
    144     _PING_STATUS_DOWN = False
    145     _PING_STATUS_UP = True
    146 
    147     # Allowed values for the power_method argument.
    148 
    149     # POWER_CONTROL_RPM: Passed as default arg for power_off/on/cycle() methods.
    150     # POWER_CONTROL_SERVO: Used in set_power() and power_cycle() methods.
    151     # POWER_CONTROL_MANUAL: Used in set_power() and power_cycle() methods.
    152     POWER_CONTROL_RPM = 'RPM'
    153     POWER_CONTROL_SERVO = 'servoj10'
    154     POWER_CONTROL_MANUAL = 'manual'
    155 
    156     POWER_CONTROL_VALID_ARGS = (POWER_CONTROL_RPM,
    157                                 POWER_CONTROL_SERVO,
    158                                 POWER_CONTROL_MANUAL)
    159 
    160     _RPM_OUTLET_CHANGED = 'outlet_changed'
    161 
    162     # URL pattern to download firmware image.
    163     _FW_IMAGE_URL_PATTERN = CONFIG.get_config_value(
    164             'CROS', 'firmware_url_pattern', type=str)
    165 
    166     # File that has a list of directories to be collected
    167     _LOGS_TO_COLLECT_FILE = os.path.join(
    168             common.client_dir, 'common_lib', 'logs_to_collect')
    169 
    170     # Prefix of logging message w.r.t. crash collection
    171     _CRASHLOGS_PREFIX = 'collect_crashlogs'
    172 
    173     # Time duration waiting for host up/down check
    174     _CHECK_HOST_UP_TIMEOUT_SECS = 15
    175 
    176     # A command that interacts with kernel and hardware (e.g., rm, mkdir, etc)
    177     # might not be completely done deep through the hardware when the machine
    178     # is powered down right after the command returns.
    179     # We should wait for a few seconds to make them done. Finger crossed.
    180     _SAFE_WAIT_SECS = 10
    181 
    182 
    183     @staticmethod
    184     def check_host(host, timeout=10):
    185         """
    186         Check if the given host is a chrome-os host.
    187 
    188         @param host: An ssh host representing a device.
    189         @param timeout: The timeout for the run command.
    190 
    191         @return: True if the host device is chromeos.
    192 
    193         """
    194         try:
    195             result = host.run(
    196                     'grep -q CHROMEOS /etc/lsb-release && '
    197                     '! test -f /mnt/stateful_partition/.android_tester && '
    198                     '! grep -q moblab /etc/lsb-release',
    199                     ignore_status=True, timeout=timeout)
    200         except (error.AutoservRunError, error.AutoservSSHTimeout):
    201             return False
    202         return result.exit_status == 0
    203 
    204 
    205     @staticmethod
    206     def _extract_arguments(args_dict, key_subset):
    207         """Extract options from `args_dict` and return a subset result.
    208 
    209         Take the provided dictionary of argument options and return
    210         a subset that represent standard arguments needed to construct
    211         a test-assistant object (chameleon or servo) for a host. The
    212         intent is to provide standard argument processing from
    213         CrosHost for tests that require a test-assistant board
    214         to operate.
    215 
    216         @param args_dict Dictionary from which to extract the arguments.
    217         @param key_subset Tuple of keys to extract from the args_dict, e.g.
    218           ('servo_host', 'servo_port').
    219         """
    220         result = {}
    221         for arg in key_subset:
    222             if arg in args_dict:
    223                 result[arg] = args_dict[arg]
    224         return result
    225 
    226 
    227     @staticmethod
    228     def get_chameleon_arguments(args_dict):
    229         """Extract chameleon options from `args_dict` and return the result.
    230 
    231         Recommended usage:
    232         ~~~~~~~~
    233             args_dict = utils.args_to_dict(args)
    234             chameleon_args = hosts.CrosHost.get_chameleon_arguments(args_dict)
    235             host = hosts.create_host(machine, chameleon_args=chameleon_args)
    236         ~~~~~~~~
    237 
    238         @param args_dict Dictionary from which to extract the chameleon
    239           arguments.
    240         """
    241         return CrosHost._extract_arguments(
    242                 args_dict, ('chameleon_host', 'chameleon_port'))
    243 
    244 
    245     @staticmethod
    246     def get_plankton_arguments(args_dict):
    247         """Extract chameleon options from `args_dict` and return the result.
    248 
    249         Recommended usage:
    250         ~~~~~~~~
    251             args_dict = utils.args_to_dict(args)
    252             plankon_args = hosts.CrosHost.get_plankton_arguments(args_dict)
    253             host = hosts.create_host(machine, plankton_args=polankton_args)
    254         ~~~~~~~~
    255 
    256         @param args_dict Dictionary from which to extract the plankton
    257           arguments.
    258         """
    259         args = CrosHost._extract_arguments(
    260                 args_dict, ('plankton_host', 'plankton_port'))
    261         return args
    262 
    263 
    264     @staticmethod
    265     def get_servo_arguments(args_dict):
    266         """Extract servo options from `args_dict` and return the result.
    267 
    268         Recommended usage:
    269         ~~~~~~~~
    270             args_dict = utils.args_to_dict(args)
    271             servo_args = hosts.CrosHost.get_servo_arguments(args_dict)
    272             host = hosts.create_host(machine, servo_args=servo_args)
    273         ~~~~~~~~
    274 
    275         @param args_dict Dictionary from which to extract the servo
    276           arguments.
    277         """
    278         return CrosHost._extract_arguments(
    279                 args_dict, ('servo_host', 'servo_port'))
    280 
    281 
    282     def _initialize(self, hostname, chameleon_args=None, servo_args=None, plankton_args=None,
    283                     try_lab_servo=False, ssh_verbosity_flag='', ssh_options='',
    284                     *args, **dargs):
    285         """Initialize superclasses, |self.chameleon|, and |self.servo|.
    286 
    287         This method will attempt to create the test-assistant object
    288         (chameleon/servo) when it is needed by the test. Check
    289         the docstring of chameleon_host.create_chameleon_host and
    290         servo_host.create_servo_host for how this is determined.
    291 
    292         @param hostname: Hostname of the dut.
    293         @param chameleon_args: A dictionary that contains args for creating
    294                                a ChameleonHost. See chameleon_host for details.
    295         @param servo_args: A dictionary that contains args for creating
    296                            a ServoHost object. See servo_host for details.
    297         @param try_lab_servo: Boolean, False indicates that ServoHost should
    298                               not be created for a device in Cros test lab.
    299                               See servo_host for details.
    300         @param ssh_verbosity_flag: String, to pass to the ssh command to control
    301                                    verbosity.
    302         @param ssh_options: String, other ssh options to pass to the ssh
    303                             command.
    304         """
    305         super(CrosHost, self)._initialize(hostname=hostname,
    306                                           *args, **dargs)
    307         # self.env is a dictionary of environment variable settings
    308         # to be exported for commands run on the host.
    309         # LIBC_FATAL_STDERR_ can be useful for diagnosing certain
    310         # errors that might happen.
    311         self.env['LIBC_FATAL_STDERR_'] = '1'
    312         self._ssh_verbosity_flag = ssh_verbosity_flag
    313         self._ssh_options = ssh_options
    314         # TODO(fdeng): We need to simplify the
    315         # process of servo and servo_host initialization.
    316         # crbug.com/298432
    317         self._servo_host =  servo_host.create_servo_host(
    318                 dut=self.hostname, servo_args=servo_args,
    319                 try_lab_servo=try_lab_servo)
    320         # TODO(waihong): Do the simplication on Chameleon too.
    321         self._chameleon_host = chameleon_host.create_chameleon_host(
    322                 dut=self.hostname, chameleon_args=chameleon_args)
    323         # Add plankton host if plankton args were added on command line
    324         self._plankton_host = plankton_host.create_plankton_host(plankton_args)
    325 
    326         if self._servo_host is not None:
    327             self.servo = self._servo_host.get_servo()
    328         else:
    329             self.servo = None
    330 
    331         if self._chameleon_host:
    332             self.chameleon = self._chameleon_host.create_chameleon_board()
    333         else:
    334             self.chameleon = None
    335 
    336         if self._plankton_host:
    337             self.plankton_servo = self._plankton_host.get_servo()
    338             logging.info('plankton_servo: %r', self.plankton_servo)
    339             # Create the plankton object used to access the ec uart
    340             self.plankton = plankton.Plankton(self.plankton_servo,
    341                     self._plankton_host.get_servod_server_proxy())
    342         else:
    343             self.plankton = None
    344 
    345 
    346     def get_repair_image_name(self, image_type='cros'):
    347         """Generate a image_name from variables in the global config.
    348 
    349         image_type is used to differentiate different images. Default is CrOS,
    350         in which case, repair image's name follows the naming convention defined
    351         in global setting CROS/stable_build_pattern.
    352         If the image_type is not `cros`, the repair image will be looked up
    353         using key `board_name/image_type`, e.g., daisy_spring/firmware.
    354 
    355         @param image_type: Type of the image. Default is `cros`.
    356 
    357         @returns a str of $board-version/$BUILD. Returns None if stable version
    358                 for the board and the default are both not set, e.g., stable
    359                 firmware version for a new board.
    360 
    361         """
    362         board = self._get_board_from_afe()
    363         if board is None:
    364             raise error.AutoservError('DUT has no board attribute, '
    365                                       'cannot be repaired.')
    366         if image_type != 'cros':
    367             board = '%s/%s' % (board, image_type)
    368         stable_version = afe_utils.get_stable_version(board=board)
    369         if image_type == 'cros':
    370             build_pattern = CONFIG.get_config_value(
    371                     'CROS', 'stable_build_pattern')
    372             stable_version = build_pattern % (board, stable_version)
    373         elif image_type == 'firmware':
    374             # If firmware stable version is not specified, `stable_version`
    375             # from the RPC is the default stable version for CrOS image.
    376             # firmware stable version must be from firmware branch, thus its
    377             # value must be like board-firmware/R31-1234.0.0. Check if
    378             # firmware exists in the stable version, if not, return None.
    379             if 'firmware' not in stable_version:
    380                 return None
    381         return stable_version
    382 
    383 
    384     def lookup_job_repo_url(self):
    385         """Looks up the job_repo_url for the host.
    386 
    387         @returns job_repo_url from AFE or None if not found.
    388 
    389         @raises KeyError if the host does not have a job_repo_url
    390         """
    391         hosts = self._AFE.get_hosts(hostname=self.hostname)
    392         if hosts and ds_constants.JOB_REPO_URL in hosts[0].attributes:
    393             return hosts[0].attributes[ds_constants.JOB_REPO_URL]
    394         else:
    395             return None
    396 
    397 
    398     def clear_job_repo_url(self):
    399         """Clear host attribute job_repo_url."""
    400         if not afe_utils.host_in_lab(self):
    401             return
    402         self.update_job_repo_url(None, None)
    403 
    404 
    405     def update_job_repo_url(self, devserver_url, image_name):
    406         """
    407         Updates the job_repo_url host attribute and asserts it's value.
    408 
    409         @param devserver_url: The devserver to use in the job_repo_url.
    410         @param image_name: The name of the image to use in the job_repo_url.
    411 
    412         @raises AutoservError: If we failed to update the job_repo_url.
    413         """
    414         repo_url = None
    415         if devserver_url and image_name:
    416             repo_url = tools.get_package_url(devserver_url, image_name)
    417         self._AFE.set_host_attribute(ds_constants.JOB_REPO_URL, repo_url,
    418                                      hostname=self.hostname)
    419         if self.lookup_job_repo_url() != repo_url:
    420             raise error.AutoservError('Failed to update job_repo_url with %s, '
    421                                       'host %s' % (repo_url, self.hostname))
    422 
    423 
    424     def add_job_repo_url(self, image_name):
    425         """Add cros_version labels and host attribute job_repo_url.
    426 
    427         @param image_name: The name of the image e.g.
    428                 lumpy-release/R27-3837.0.0
    429 
    430         """
    431         if not afe_utils.host_in_lab(self):
    432             return
    433 
    434         devserver_url = dev_server.ImageServer.resolve(image_name,
    435                                                        self.hostname).url()
    436         self.update_job_repo_url(devserver_url, image_name)
    437 
    438 
    439     def verify_job_repo_url(self, tag=''):
    440         """
    441         Make sure job_repo_url of this host is valid.
    442 
    443         Eg: The job_repo_url "http://lmn.cd.ab.xyx:8080/static/\
    444         lumpy-release/R29-4279.0.0/autotest/packages" claims to have the
    445         autotest package for lumpy-release/R29-4279.0.0. If this isn't the case,
    446         download and extract it. If the devserver embedded in the url is
    447         unresponsive, update the job_repo_url of the host after staging it on
    448         another devserver.
    449 
    450         @param job_repo_url: A url pointing to the devserver where the autotest
    451             package for this build should be staged.
    452         @param tag: The tag from the server job, in the format
    453                     <job_id>-<user>/<hostname>, or <hostless> for a server job.
    454 
    455         @raises DevServerException: If we could not resolve a devserver.
    456         @raises AutoservError: If we're unable to save the new job_repo_url as
    457             a result of choosing a new devserver because the old one failed to
    458             respond to a health check.
    459         @raises urllib2.URLError: If the devserver embedded in job_repo_url
    460                                   doesn't respond within the timeout.
    461         """
    462         job_repo_url = self.lookup_job_repo_url()
    463         if not job_repo_url:
    464             logging.warning('No job repo url set on host %s', self.hostname)
    465             return
    466 
    467         logging.info('Verifying job repo url %s', job_repo_url)
    468         devserver_url, image_name = tools.get_devserver_build_from_package_url(
    469             job_repo_url)
    470 
    471         ds = dev_server.ImageServer(devserver_url)
    472 
    473         logging.info('Staging autotest artifacts for %s on devserver %s',
    474             image_name, ds.url())
    475 
    476         start_time = time.time()
    477         ds.stage_artifacts(image_name, ['autotest_packages'])
    478         stage_time = time.time() - start_time
    479 
    480         # Record how much of the verification time comes from a devserver
    481         # restage. If we're doing things right we should not see multiple
    482         # devservers for a given board/build/branch path.
    483         try:
    484             board, build_type, branch = server_utils.ParseBuildName(
    485                                                 image_name)[:3]
    486         except server_utils.ParseBuildNameException:
    487             pass
    488         else:
    489             devserver = devserver_url[
    490                 devserver_url.find('/') + 2:devserver_url.rfind(':')]
    491             stats_key = {
    492                 'board': board,
    493                 'build_type': build_type,
    494                 'branch': branch,
    495                 'devserver': devserver.replace('.', '_'),
    496             }
    497             autotest_stats.Gauge('verify_job_repo_url').send(
    498                 '%(board)s.%(build_type)s.%(branch)s.%(devserver)s' % stats_key,
    499                 stage_time)
    500 
    501 
    502     def stage_server_side_package(self, image=None):
    503         """Stage autotest server-side package on devserver.
    504 
    505         @param image: Full path of an OS image to install or a build name.
    506 
    507         @return: A url to the autotest server-side package.
    508         """
    509         if image:
    510             image_name = tools.get_build_from_image(image)
    511             if not image_name:
    512                 raise error.AutoservError(
    513                         'Failed to parse build name from %s' % image)
    514             ds = dev_server.ImageServer.resolve(image_name)
    515         else:
    516             job_repo_url = self.lookup_job_repo_url()
    517             if job_repo_url:
    518                 devserver_url, image_name = (
    519                     tools.get_devserver_build_from_package_url(job_repo_url))
    520                 ds = dev_server.ImageServer(devserver_url)
    521             else:
    522                 labels = self._AFE.get_labels(
    523                         name__startswith=ds_constants.VERSION_PREFIX,
    524                         host__hostname=self.hostname)
    525                 if not labels:
    526                     raise error.AutoservError(
    527                             'Failed to stage server-side package. The host has '
    528                             'no job_report_url attribute or version label.')
    529                 image_name = labels[0].name[len(ds_constants.VERSION_PREFIX):]
    530                 ds = dev_server.ImageServer.resolve(image_name)
    531 
    532         # Get the OS version of the build, for any build older than
    533         # MIN_VERSION_SUPPORT_SSP, server side packaging is not supported.
    534         match = re.match('.*/R\d+-(\d+)\.', image_name)
    535         if match and int(match.group(1)) < self.MIN_VERSION_SUPPORT_SSP:
    536             logging.warn('Build %s is older than %s. Server side packaging is '
    537                          'disabled.', image_name, self.MIN_VERSION_SUPPORT_SSP)
    538             return None
    539 
    540         ds.stage_artifacts(image_name, ['autotest_server_package'])
    541         return '%s/static/%s/%s' % (ds.url(), image_name,
    542                                     'autotest_server_package.tar.bz2')
    543 
    544 
    545     def _try_stateful_update(self, update_url, force_update, updater):
    546         """Try to use stateful update to initialize DUT.
    547 
    548         When DUT is already running the same version that machine_install
    549         tries to install, stateful update is a much faster way to clean up
    550         the DUT for testing, compared to a full reimage. It is implemeted
    551         by calling autoupdater.run_update, but skipping updating root, as
    552         updating the kernel is time consuming and not necessary.
    553 
    554         @param update_url: url of the image.
    555         @param force_update: Set to True to update the image even if the DUT
    556             is running the same version.
    557         @param updater: ChromiumOSUpdater instance used to update the DUT.
    558         @returns: True if the DUT was updated with stateful update.
    559 
    560         """
    561         # Stop service ap-update-manager to prevent rebooting during autoupdate.
    562         # The service is used in jetstream boards, but not other CrOS devices.
    563         self.run('sudo stop ap-update-manager', ignore_status=True)
    564 
    565         # TODO(jrbarnette):  Yes, I hate this re.match() test case.
    566         # It's better than the alternative:  see crbug.com/360944.
    567         image_name = autoupdater.url_to_image_name(update_url)
    568         release_pattern = r'^.*-release/R[0-9]+-[0-9]+\.[0-9]+\.0$'
    569         if not re.match(release_pattern, image_name):
    570             return False
    571         if not updater.check_version():
    572             return False
    573         if not force_update:
    574             logging.info('Canceling stateful update because the new and '
    575                          'old versions are the same.')
    576             return False
    577         # Following folders should be rebuilt after stateful update.
    578         # A test file is used to confirm each folder gets rebuilt after
    579         # the stateful update.
    580         folders_to_check = ['/var', '/home', '/mnt/stateful_partition']
    581         test_file = '.test_file_to_be_deleted'
    582         for folder in folders_to_check:
    583             touch_path = os.path.join(folder, test_file)
    584             self.run('touch %s' % touch_path)
    585 
    586         updater.run_update(update_root=False)
    587 
    588         # Reboot to complete stateful update.
    589         self.reboot(timeout=self.REBOOT_TIMEOUT, wait=True)
    590         check_file_cmd = 'test -f %s; echo $?'
    591         for folder in folders_to_check:
    592             test_file_path = os.path.join(folder, test_file)
    593             result = self.run(check_file_cmd % test_file_path,
    594                               ignore_status=True)
    595             if result.exit_status == 1:
    596                 return False
    597         return True
    598 
    599 
    600     def _post_update_processing(self, updater, expected_kernel=None):
    601         """After the DUT is updated, confirm machine_install succeeded.
    602 
    603         @param updater: ChromiumOSUpdater instance used to update the DUT.
    604         @param expected_kernel: kernel expected to be active after reboot,
    605             or `None` to skip rollback checking.
    606 
    607         """
    608         # Touch the lab machine file to leave a marker that
    609         # distinguishes this image from other test images.
    610         # Afterwards, we must re-run the autoreboot script because
    611         # it depends on the _LAB_MACHINE_FILE.
    612         autoreboot_cmd = ('FILE="%s" ; [ -f "$FILE" ] || '
    613                           '( touch "$FILE" ; start autoreboot )')
    614         self.run(autoreboot_cmd % self._LAB_MACHINE_FILE)
    615         updater.verify_boot_expectations(
    616                 expected_kernel, rollback_message=
    617                 'Build %s failed to boot on %s; system rolled back to previous '
    618                 'build' % (updater.update_version, self.hostname))
    619         # Check that we've got the build we meant to install.
    620         if not updater.check_version_to_confirm_install():
    621             raise autoupdater.ChromiumOSError(
    622                 'Failed to update %s to build %s; found build '
    623                 '%s instead' % (self.hostname,
    624                                 updater.update_version,
    625                                 self.get_release_version()))
    626 
    627         logging.debug('Cleaning up old autotest directories.')
    628         try:
    629             installed_autodir = autotest.Autotest.get_installed_autodir(self)
    630             self.run('rm -rf ' + installed_autodir)
    631         except autotest.AutodirNotFoundError:
    632             logging.debug('No autotest installed directory found.')
    633 
    634 
    635     def _stage_image_for_update(self, image_name=None):
    636         """Stage a build on a devserver and return the update_url and devserver.
    637 
    638         @param image_name: a name like lumpy-release/R27-3837.0.0
    639         @returns a tuple with an update URL like:
    640             http://172.22.50.205:8082/update/lumpy-release/R27-3837.0.0
    641             and the devserver instance.
    642         """
    643         if not image_name:
    644             image_name = self.get_repair_image_name()
    645 
    646         logging.info('Staging build for AU: %s', image_name)
    647         devserver = dev_server.ImageServer.resolve(image_name, self.hostname)
    648         devserver.trigger_download(image_name, synchronous=False)
    649         return (tools.image_url_pattern() % (devserver.url(), image_name),
    650                 devserver)
    651 
    652 
    653     def stage_image_for_servo(self, image_name=None):
    654         """Stage a build on a devserver and return the update_url.
    655 
    656         @param image_name: a name like lumpy-release/R27-3837.0.0
    657         @returns an update URL like:
    658             http://172.22.50.205:8082/update/lumpy-release/R27-3837.0.0
    659         """
    660         if not image_name:
    661             image_name = self.get_repair_image_name()
    662         logging.info('Staging build for servo install: %s', image_name)
    663         devserver = dev_server.ImageServer.resolve(image_name, self.hostname)
    664         devserver.stage_artifacts(image_name, ['test_image'])
    665         return devserver.get_test_image_url(image_name)
    666 
    667 
    668     def stage_factory_image_for_servo(self, image_name):
    669         """Stage a build on a devserver and return the update_url.
    670 
    671         @param image_name: a name like <baord>/4262.204.0
    672 
    673         @return: An update URL, eg:
    674             http://<devserver>/static/canary-channel/\
    675             <board>/4262.204.0/factory_test/chromiumos_factory_image.bin
    676 
    677         @raises: ValueError if the factory artifact name is missing from
    678                  the config.
    679 
    680         """
    681         if not image_name:
    682             logging.error('Need an image_name to stage a factory image.')
    683             return
    684 
    685         factory_artifact = CONFIG.get_config_value(
    686                 'CROS', 'factory_artifact', type=str, default='')
    687         if not factory_artifact:
    688             raise ValueError('Cannot retrieve the factory artifact name from '
    689                              'autotest config, and hence cannot stage factory '
    690                              'artifacts.')
    691 
    692         logging.info('Staging build for servo install: %s', image_name)
    693         devserver = dev_server.ImageServer.resolve(image_name, self.hostname)
    694         devserver.stage_artifacts(
    695                 image_name,
    696                 [factory_artifact],
    697                 archive_url=None)
    698 
    699         return tools.factory_image_url_pattern() % (devserver.url(), image_name)
    700 
    701 
    702     def machine_install(self, update_url=None, force_update=False,
    703                         local_devserver=False, repair=False,
    704                         force_full_update=False):
    705         """Install the DUT.
    706 
    707         Use stateful update if the DUT is already running the same build.
    708         Stateful update does not update kernel and tends to run much faster
    709         than a full reimage. If the DUT is running a different build, or it
    710         failed to do a stateful update, full update, including kernel update,
    711         will be applied to the DUT.
    712 
    713         Once a host enters machine_install its host attribute job_repo_url
    714         (used for package install) will be removed and then updated.
    715 
    716         @param update_url: The url to use for the update
    717                 pattern: http://$devserver:###/update/$build
    718                 If update_url is None and repair is True we will install the
    719                 stable image listed in afe_stable_versions table. If the table
    720                 is not setup, global_config value under CROS.stable_cros_version
    721                 will be used instead.
    722         @param force_update: Force an update even if the version installed
    723                 is the same. Default:False
    724         @param local_devserver: Used by test_that to allow people to
    725                 use their local devserver. Default: False
    726         @param repair: Forces update to repair image. Implies force_update.
    727         @param force_full_update: If True, do not attempt to run stateful
    728                 update, force a full reimage. If False, try stateful update
    729                 first when the dut is already installed with the same version.
    730         @raises autoupdater.ChromiumOSError
    731 
    732         @returns Name of the image installed.
    733         """
    734         devserver = None
    735         if repair:
    736             update_url, devserver = self._stage_image_for_update()
    737             force_update = True
    738 
    739         if not update_url and not self._parser.options.image:
    740             raise error.AutoservError(
    741                     'There is no update URL, nor a method to get one.')
    742 
    743         if not update_url and self._parser.options.image:
    744             # This is the base case where we have no given update URL i.e.
    745             # dynamic suites logic etc. This is the most flexible case where we
    746             # can serve an update from any of our fleet of devservers.
    747             requested_build = self._parser.options.image
    748             if not requested_build.startswith('http://'):
    749                 logging.debug('Update will be staged for this installation')
    750                 update_url, devserver = self._stage_image_for_update(
    751                         requested_build)
    752             else:
    753                 update_url = requested_build
    754 
    755         logging.debug('Update URL is %s', update_url)
    756 
    757         # Remove cros-version and job_repo_url host attribute from host.
    758         self.clear_job_repo_url()
    759 
    760         # Create a file to indicate if provision fails. The file will be removed
    761         # by stateful update or full install.
    762         self.run('touch %s' % PROVISION_FAILED)
    763 
    764         update_complete = False
    765         updater = autoupdater.ChromiumOSUpdater(
    766                  update_url, host=self, local_devserver=local_devserver)
    767         if not force_full_update:
    768             try:
    769                 # If the DUT is already running the same build, try stateful
    770                 # update first as it's much quicker than a full re-image.
    771                 update_complete = self._try_stateful_update(
    772                         update_url, force_update, updater)
    773             except Exception as e:
    774                 logging.exception(e)
    775 
    776         inactive_kernel = None
    777         if update_complete or (not force_update and updater.check_version()):
    778             logging.info('Install complete without full update')
    779         else:
    780             logging.info('DUT requires full update.')
    781             self.reboot(timeout=self.REBOOT_TIMEOUT, wait=True)
    782             # Stop service ap-update-manager to prevent rebooting during
    783             # autoupdate. The service is used in jetstream boards, but not other
    784             # CrOS devices.
    785             self.run('sudo stop ap-update-manager', ignore_status=True)
    786 
    787             num_of_attempts = provision.FLAKY_DEVSERVER_ATTEMPTS
    788 
    789             while num_of_attempts > 0:
    790                 num_of_attempts -= 1
    791                 try:
    792                     updater.run_update()
    793                 except Exception:
    794                     logging.warn('Autoupdate did not complete.')
    795                     # Do additional check for the devserver health. Ideally,
    796                     # the autoupdater.py could raise an exception when it
    797                     # detected network flake but that would require
    798                     # instrumenting the update engine and parsing it log.
    799                     if (num_of_attempts <= 0 or
    800                             devserver is None or
    801                             dev_server.DevServer.devserver_healthy(
    802                                     devserver.url())):
    803                         raise
    804 
    805                     logging.warn('Devserver looks unhealthy. Trying another')
    806                     update_url, devserver = self._stage_image_for_update(
    807                             requested_build)
    808                     logging.debug('New Update URL is %s', update_url)
    809                     updater = autoupdater.ChromiumOSUpdater(
    810                             update_url, host=self,
    811                             local_devserver=local_devserver)
    812                 else:
    813                     break
    814 
    815             # Give it some time in case of IO issues.
    816             time.sleep(10)
    817 
    818             # Figure out active and inactive kernel.
    819             active_kernel, inactive_kernel = updater.get_kernel_state()
    820 
    821             # Ensure inactive kernel has higher priority than active.
    822             if (updater.get_kernel_priority(inactive_kernel)
    823                     < updater.get_kernel_priority(active_kernel)):
    824                 raise autoupdater.ChromiumOSError(
    825                     'Update failed. The priority of the inactive kernel'
    826                     ' partition is less than that of the active kernel'
    827                     ' partition.')
    828 
    829             # Updater has returned successfully; reboot the host.
    830             self.reboot(timeout=self.REBOOT_TIMEOUT, wait=True)
    831 
    832         self._post_update_processing(updater, inactive_kernel)
    833         image_name = autoupdater.url_to_image_name(update_url)
    834         self.add_job_repo_url(image_name)
    835         return image_name
    836 
    837 
    838     def _clear_fw_version_labels(self, rw_only):
    839         """Clear firmware version labels from the machine.
    840 
    841         @param rw_only: True to only clear fwrw_version; otherewise, clear
    842                         both fwro_version and fwrw_version.
    843         """
    844         labels = self._AFE.get_labels(
    845                 name__startswith=provision.FW_RW_VERSION_PREFIX,
    846                 host__hostname=self.hostname)
    847         if not rw_only:
    848             labels = labels + self._AFE.get_labels(
    849                     name__startswith=provision.FW_RO_VERSION_PREFIX,
    850                     host__hostname=self.hostname)
    851         for label in labels:
    852             label.remove_hosts(hosts=[self.hostname])
    853 
    854 
    855     def _add_fw_version_label(self, build, rw_only):
    856         """Add firmware version label to the machine.
    857 
    858         @param build: Build of firmware.
    859         @param rw_only: True to only add fwrw_version; otherwise, add both
    860                         fwro_version and fwrw_version.
    861 
    862         """
    863         fw_label = provision.fwrw_version_to_label(build)
    864         self._AFE.run('label_add_hosts', id=fw_label, hosts=[self.hostname])
    865         if not rw_only:
    866             fw_label = provision.fwro_version_to_label(build)
    867             self._AFE.run('label_add_hosts', id=fw_label, hosts=[self.hostname])
    868 
    869 
    870     def firmware_install(self, build=None, rw_only=False):
    871         """Install firmware to the DUT.
    872 
    873         Use stateful update if the DUT is already running the same build.
    874         Stateful update does not update kernel and tends to run much faster
    875         than a full reimage. If the DUT is running a different build, or it
    876         failed to do a stateful update, full update, including kernel update,
    877         will be applied to the DUT.
    878 
    879         Once a host enters firmware_install its fw[ro|rw]_version label will
    880         be removed. After the firmware is updated successfully, a new
    881         fw[ro|rw]_version label will be added to the host.
    882 
    883         @param build: The build version to which we want to provision the
    884                       firmware of the machine,
    885                       e.g. 'link-firmware/R22-2695.1.144'.
    886         @param rw_only: True to only install firmware to its RW portions. Keep
    887                         the RO portions unchanged.
    888 
    889         TODO(dshi): After bug 381718 is fixed, update here with corresponding
    890                     exceptions that could be raised.
    891 
    892         """
    893         if not self.servo:
    894             raise error.TestError('Host %s does not have servo.' %
    895                                   self.hostname)
    896 
    897         # TODO(fdeng): use host.get_board() after
    898         # crbug.com/271834 is fixed.
    899         board = self._get_board_from_afe()
    900 
    901         # If build is not set, try to install firmware from stable CrOS.
    902         if not build:
    903             build = self.get_repair_image_name(image_type='firmware')
    904             if not build:
    905                 raise error.TestError(
    906                         'Failed to find stable firmware build for %s.',
    907                         self.hostname)
    908             logging.info('Will install firmware from build %s.', build)
    909 
    910         config = FAFTConfig(board)
    911         if config.use_u_boot:
    912             ap_image = 'image-%s.bin' % board
    913         else: # Depthcharge platform
    914             ap_image = 'image.bin'
    915         ec_image = 'ec.bin'
    916         ds = dev_server.ImageServer.resolve(build, self.hostname)
    917         ds.stage_artifacts(build, ['firmware'])
    918 
    919         tmpd = autotemp.tempdir(unique_id='fwimage')
    920         try:
    921             fwurl = self._FW_IMAGE_URL_PATTERN % (ds.url(), build)
    922             local_tarball = os.path.join(tmpd.name, os.path.basename(fwurl))
    923             server_utils.system('wget -O %s %s' % (local_tarball, fwurl),
    924                                 timeout=60)
    925             server_utils.system('tar xf %s -C %s %s %s' %
    926                                 (local_tarball, tmpd.name, ap_image, ec_image),
    927                                 timeout=60)
    928             server_utils.system('tar xf %s  --wildcards -C %s "dts/*"' %
    929                                 (local_tarball, tmpd.name),
    930                                 timeout=60, ignore_status=True)
    931 
    932             self._clear_fw_version_labels(rw_only)
    933             logging.info('Will re-program EC %snow', 'RW ' if rw_only else '')
    934             self.servo.program_ec(os.path.join(tmpd.name, ec_image), rw_only)
    935             logging.info('Will re-program BIOS %snow', 'RW ' if rw_only else '')
    936             self.servo.program_bios(os.path.join(tmpd.name, ap_image), rw_only)
    937             self.servo.get_power_state_controller().reset()
    938             time.sleep(self.servo.BOOT_DELAY)
    939             self._add_fw_version_label(build, rw_only)
    940         finally:
    941             tmpd.clean()
    942 
    943 
    944     def show_update_engine_log(self):
    945         """Output update engine log."""
    946         logging.debug('Dumping %s', client_constants.UPDATE_ENGINE_LOG)
    947         self.run('cat %s' % client_constants.UPDATE_ENGINE_LOG)
    948 
    949 
    950     def _get_board_from_afe(self):
    951         """Retrieve this host's board from its labels in the AFE.
    952 
    953         Looks for a host label of the form "board:<board>", and
    954         returns the "<board>" part of the label.  `None` is returned
    955         if there is not a single, unique label matching the pattern.
    956 
    957         @returns board from label, or `None`.
    958         """
    959         return server_utils.get_board_from_afe(self.hostname, self._AFE)
    960 
    961 
    962     def get_build(self):
    963         """Retrieve the current build for this Host from the AFE.
    964 
    965         Looks through this host's labels in the AFE to determine its build.
    966         This method is replaced by afe_utils.get_build. It's kept here to
    967         maintain backwards compatibility for test control files in older CrOS
    968         builds (R48, R49 etc.) still call host.get_build, e.g.,
    969         `provision_AutoUpdate.double`.
    970         TODO(sbasi): Once R50 falls into release branch, this method can be
    971         removed.
    972 
    973         @returns The current build or None if it could not find it or if there
    974                  were multiple build labels assigned to this host.
    975         """
    976         return afe_utils.get_build(self)
    977 
    978 
    979     def _install_repair(self):
    980         """Attempt to repair this host using the update-engine.
    981 
    982         If the host is up, try installing the DUT with a stable
    983         "repair" version of Chrome OS as defined in afe_stable_versions table.
    984         If the table is not setup, global_config value under
    985         CROS.stable_cros_version will be used instead.
    986 
    987         @raises AutoservRepairMethodNA if the DUT is not reachable.
    988         @raises ChromiumOSError if the install failed for some reason.
    989 
    990         """
    991         if not self.is_up():
    992             raise error.AutoservRepairMethodNA('DUT unreachable for install.')
    993         logging.info('Attempting to reimage machine to repair image.')
    994         try:
    995             afe_utils.machine_install_and_update_labels(self, repair=True)
    996         except autoupdater.ChromiumOSError as e:
    997             logging.exception(e)
    998             logging.info('Repair via install failed.')
    999             raise
   1000 
   1001 
   1002     def _install_repair_with_powerwash(self):
   1003         """Attempt to powerwash first then repair this host using update-engine.
   1004 
   1005         update-engine may fail due to a bad image. In such case, powerwash
   1006         may help to cleanup the DUT for update-engine to work again.
   1007 
   1008         @raises AutoservRepairMethodNA if the DUT is not reachable.
   1009         @raises ChromiumOSError if the install failed for some reason.
   1010 
   1011         """
   1012         if not self.is_up():
   1013             raise error.AutoservRepairMethodNA('DUT unreachable for install.')
   1014 
   1015         logging.info('Attempting to powerwash the DUT.')
   1016         self.run('echo "fast safe" > '
   1017                  '/mnt/stateful_partition/factory_install_reset')
   1018         self.reboot(timeout=self.POWERWASH_BOOT_TIMEOUT, wait=True)
   1019         if not self.is_up():
   1020             logging.error('Powerwash failed. DUT did not come back after '
   1021                           'reboot.')
   1022             raise error.AutoservRepairFailure(
   1023                     'DUT failed to boot from powerwash after %d seconds' %
   1024                     self.POWERWASH_BOOT_TIMEOUT)
   1025 
   1026         logging.info('Powerwash succeeded.')
   1027         self._install_repair()
   1028 
   1029 
   1030     def servo_install(self, image_url=None, usb_boot_timeout=USB_BOOT_TIMEOUT,
   1031                       install_timeout=INSTALL_TIMEOUT):
   1032         """
   1033         Re-install the OS on the DUT by:
   1034         1) installing a test image on a USB storage device attached to the Servo
   1035                 board,
   1036         2) booting that image in recovery mode, and then
   1037         3) installing the image with chromeos-install.
   1038 
   1039         @param image_url: If specified use as the url to install on the DUT.
   1040                 otherwise boot the currently staged image on the USB stick.
   1041         @param usb_boot_timeout: The usb_boot_timeout to use during reimage.
   1042                 Factory images need a longer usb_boot_timeout than regular
   1043                 cros images.
   1044         @param install_timeout: The timeout to use when installing the chromeos
   1045                 image. Factory images need a longer install_timeout.
   1046 
   1047         @raises AutoservError if the image fails to boot.
   1048 
   1049         """
   1050         usb_boot_timer_key = ('servo_install.usb_boot_timeout_%s'
   1051                               % usb_boot_timeout)
   1052         logging.info('Downloading image to USB, then booting from it. Usb boot '
   1053                      'timeout = %s', usb_boot_timeout)
   1054         timer = autotest_stats.Timer(usb_boot_timer_key)
   1055         timer.start()
   1056         self.servo.install_recovery_image(image_url)
   1057         if not self.wait_up(timeout=usb_boot_timeout):
   1058             raise error.AutoservRepairFailure(
   1059                     'DUT failed to boot from USB after %d seconds' %
   1060                     usb_boot_timeout)
   1061         timer.stop()
   1062 
   1063         # The new chromeos-tpm-recovery has been merged since R44-7073.0.0.
   1064         # In old CrOS images, this command fails. Skip the error.
   1065         logging.info('Resetting the TPM status')
   1066         try:
   1067             self.run('chromeos-tpm-recovery')
   1068         except error.AutoservRunError:
   1069             logging.warn('chromeos-tpm-recovery is too old.')
   1070 
   1071 
   1072         install_timer_key = ('servo_install.install_timeout_%s'
   1073                              % install_timeout)
   1074         timer = autotest_stats.Timer(install_timer_key)
   1075         timer.start()
   1076         logging.info('Installing image through chromeos-install.')
   1077         self.run('chromeos-install --yes', timeout=install_timeout)
   1078         self.halt()
   1079         timer.stop()
   1080 
   1081         logging.info('Power cycling DUT through servo.')
   1082         self.servo.get_power_state_controller().power_off()
   1083         self.servo.switch_usbkey('off')
   1084         # N.B. The Servo API requires that we use power_on() here
   1085         # for two reasons:
   1086         #  1) After turning on a DUT in recovery mode, you must turn
   1087         #     it off and then on with power_on() once more to
   1088         #     disable recovery mode (this is a Parrot specific
   1089         #     requirement).
   1090         #  2) After power_off(), the only way to turn on is with
   1091         #     power_on() (this is a Storm specific requirement).
   1092         self.servo.get_power_state_controller().power_on()
   1093 
   1094         logging.info('Waiting for DUT to come back up.')
   1095         if not self.wait_up(timeout=self.BOOT_TIMEOUT):
   1096             raise error.AutoservError('DUT failed to reboot installed '
   1097                                       'test image after %d seconds' %
   1098                                       self.BOOT_TIMEOUT)
   1099 
   1100 
   1101     def _setup_servo(self):
   1102         """Try to force to create servo object if it's not set up yet.
   1103         """
   1104         if self.servo:
   1105             return
   1106 
   1107         try:
   1108             # Setting servo_args to {} will force it to create the servo_host
   1109             # object if possible.
   1110             self._servo_host = servo_host.create_servo_host(
   1111                     dut=self.hostname, servo_args={})
   1112             if self._servo_host:
   1113                 self.servo = self._servo_host.get_servo()
   1114             else:
   1115                 logging.error('Failed to create servo_host object.')
   1116         except Exception as e:
   1117             logging.error('Failed to create servo object: %s', e)
   1118 
   1119 
   1120     def _servo_repair_reinstall(self):
   1121         """Reinstall the DUT utilizing servo and a test image.
   1122 
   1123         Re-install the OS on the DUT by:
   1124         1) installing a test image on a USB storage device attached to the Servo
   1125                 board,
   1126         2) booting that image in recovery mode,
   1127         3) resetting the TPM status, and then
   1128         4) installing the image with chromeos-install.
   1129 
   1130         @raises AutoservRepairMethodNA if the device does not have servo
   1131                 support.
   1132 
   1133         """
   1134         if not self.servo:
   1135             raise error.AutoservRepairMethodNA('Repair Reinstall NA: '
   1136                                                'DUT has no servo support.')
   1137 
   1138         logging.info('Attempting to recovery servo enabled device with '
   1139                      'servo_repair_reinstall')
   1140 
   1141         image_url = self.stage_image_for_servo()
   1142         self.servo_install(image_url)
   1143 
   1144 
   1145     def _is_firmware_repair_supported(self):
   1146         """Check if the firmware repair is supported.
   1147 
   1148         The firmware repair is only applicable to DUTs in pools listed in
   1149         global config CROS/pools_support_firmware_repair.
   1150 
   1151         @return: True if it is supported; otherwise False.
   1152         """
   1153         logging.info('Checking if host %s can be repaired with firmware '
   1154                      'repair.', self.hostname)
   1155         pools = server_utils.get_labels_from_afe(self.hostname, 'pool:',
   1156                                                  self._AFE)
   1157         pools_support_firmware_repair = CONFIG.get_config_value('CROS',
   1158                 'pools_support_firmware_repair', type=str).split(',')
   1159 
   1160         return (pools and pools_support_firmware_repair and
   1161                 set(pools).intersection(set(pools_support_firmware_repair)))
   1162 
   1163 
   1164     def _firmware_repair(self):
   1165         """Reinstall the firmware image using servo.
   1166 
   1167         This repair function attempts to install the stable firmware specified
   1168         by the stable firmware version.
   1169         Then reset the DUT and try to verify it. If verify fails, it will try to
   1170         install the CrOS image using servo.
   1171         """
   1172         if not self._is_firmware_repair_supported():
   1173             logging.info('Host is not in pools that support firmware repair.')
   1174             raise error.AutoservRepairMethodNA(
   1175                     'Firmware repair is not applicable to host %s.' %
   1176                     self.hostname)
   1177 
   1178         # To repair a DUT connected to a moblab, try to create a servo object if
   1179         # it was failed to be created earlier as there may be a servo_host host
   1180         # attribute for this host.
   1181         if utils.is_moblab():
   1182             self._setup_servo()
   1183 
   1184         if not self.servo:
   1185             raise error.AutoservRepairMethodNA('Repair Reinstall NA: '
   1186                                                'DUT has no servo support.')
   1187 
   1188         logging.info('Attempting to recovery servo enabled device with '
   1189                      'firmware_repair.')
   1190         self.firmware_install()
   1191 
   1192         logging.info('Firmware repaired. Check if the DUT can boot. If not, '
   1193                      'reinstall the CrOS using servo.')
   1194         try:
   1195             self.verify()
   1196         except Exception as e:
   1197             logging.warn('Failed to verify DUT, error: %s. Will try to repair '
   1198                          'the DUT with servo_repair_reinstall.', e)
   1199             self._servo_repair_reinstall()
   1200 
   1201 
   1202     def _servo_repair_power(self):
   1203         """Attempt to repair DUT using an attached Servo.
   1204 
   1205         Attempt to power cycle the DUT via cold_reset.
   1206 
   1207         @raises AutoservRepairMethodNA if the device does not have servo
   1208                 support.
   1209         @raises AutoservRepairFailure if the repair fails for any reason.
   1210         """
   1211         if not self.servo:
   1212             raise error.AutoservRepairMethodNA('Repair Power NA: '
   1213                                                'DUT has no servo support.')
   1214 
   1215         logging.info('Attempting to recover servo enabled device by '
   1216                      'powering cycling with cold reset.')
   1217         self.servo.get_power_state_controller().reset()
   1218         if self.wait_up(self.BOOT_TIMEOUT):
   1219             return
   1220 
   1221         raise error.AutoservRepairFailure('DUT did not boot after long_press.')
   1222 
   1223 
   1224     def _powercycle_to_repair(self):
   1225         """Utilize the RPM Infrastructure to bring the host back up.
   1226 
   1227         If the host is not up/repaired after the first powercycle we utilize
   1228         auto fallback to the last good install by powercycling and rebooting the
   1229         host 6 times.
   1230 
   1231         @raises AutoservRepairMethodNA if the device does not support remote
   1232                 power.
   1233         @raises AutoservRepairFailure if the repair fails for any reason.
   1234 
   1235         """
   1236         if not self.has_power():
   1237             raise error.AutoservRepairMethodNA('Device does not support power.')
   1238 
   1239         logging.info('Attempting repair via RPM powercycle.')
   1240         failed_cycles = 0
   1241         self.power_cycle()
   1242         while not self.wait_up(timeout=self.BOOT_TIMEOUT):
   1243             failed_cycles += 1
   1244             if failed_cycles >= self._MAX_POWER_CYCLE_ATTEMPTS:
   1245                 raise error.AutoservRepairFailure(
   1246                         'Powercycled host %s %d times; device did not come back'
   1247                         ' online.' % (self.hostname, failed_cycles))
   1248             self.power_cycle()
   1249         if failed_cycles == 0:
   1250             logging.info('Powercycling was successful first time.')
   1251         else:
   1252             logging.info('Powercycling was successful after %d failures.',
   1253                          failed_cycles)
   1254 
   1255 
   1256     def _reboot_repair(self):
   1257         """SSH to this host and reboot."""
   1258         if not self.is_up(self._CHECK_HOST_UP_TIMEOUT_SECS):
   1259             raise error.AutoservRepairMethodNA('DUT unreachable for reboot.')
   1260         logging.info('Attempting repair via SSH reboot.')
   1261         self.reboot(timeout=self.BOOT_TIMEOUT, wait=True)
   1262 
   1263 
   1264     def check_device(self):
   1265         """Check if a device is ssh-able, and if so, clean and verify it.
   1266 
   1267         @raise AutoservSSHTimeout: If the ssh ping times out.
   1268         @raise AutoservSshPermissionDeniedError: If ssh ping fails due to
   1269                                                  permissions.
   1270         @raise AutoservSshPingHostError: For other AutoservRunErrors during
   1271                                          ssh_ping.
   1272         @raises AutoservError: As appropriate, during cleanup and verify.
   1273         """
   1274         self.ssh_ping()
   1275         self.cleanup()
   1276         self.verify()
   1277 
   1278 
   1279     def confirm_servo(self):
   1280         """Confirm servo is initialized and verified.
   1281 
   1282         @raise AutoservError: If servo is not initialized and verified.
   1283         """
   1284         if self.servo and self._servo_host.required_by_test:
   1285             return
   1286 
   1287         # Force to re-create the servo object to make sure servo is verified.
   1288         logging.debug('Rebuilding the servo object.')
   1289         self.servo = None
   1290         self._servo_host = None
   1291         self._setup_servo()
   1292         if not self.servo:
   1293             raise error.AutoservError('Failed to create servo object.')
   1294 
   1295 
   1296     def _is_last_provision_failed(self):
   1297         """Checks if the last provision job failed.
   1298 
   1299         @return: True if there exists file /var/tmp/provision_failed, which
   1300                  indicates the last provision job failed.
   1301                  False if the file does not exist or the dut can't be reached.
   1302         """
   1303         try:
   1304             result = self.run('test -f %s' % PROVISION_FAILED,
   1305                               ignore_status=True, timeout=5)
   1306             return result.exit_status == 0
   1307         except (error.AutoservRunError, error.AutoservSSHTimeout):
   1308             # Default to False, for repair to try all repair method if the dut
   1309             # can't be reached.
   1310             return False
   1311 
   1312 
   1313     def repair(self):
   1314         """Attempt to get the DUT to pass `self.verify()`.
   1315 
   1316         This overrides the base class function for repair; it does
   1317         not call back to the parent class, but instead offers a
   1318         simplified implementation based on the capabilities in the
   1319         Chrome OS test lab.
   1320 
   1321         It first verifies and repairs servo if it is a DUT in CrOS
   1322         lab and a servo is attached.
   1323 
   1324         This escalates in order through the following procedures and verifies
   1325         the status using `self.check_device()` after each of them. This is done
   1326         until both the repair and the veryfing step succeed.
   1327 
   1328         Escalation order of repair procedures from less intrusive to
   1329         more intrusive repairs:
   1330           1. SSH to the DUT and reboot.
   1331           2. If there's a servo for the DUT, try to power the DUT off and
   1332              on.
   1333           3. If the DUT can be power-cycled via RPM, try to repair
   1334              by power-cycling.
   1335           4. Try to re-install to a known stable image using
   1336              auto-update.
   1337           5. If there's a servo for the DUT, try to re-install via
   1338              the servo.
   1339 
   1340         As with the parent method, the last operation performed on
   1341         the DUT must be to call `self.check_device()`; If that call fails the
   1342         exception it raises is passed back to the caller.
   1343 
   1344         @raises AutoservRepairTotalFailure if the repair process fails to
   1345                 fix the DUT.
   1346         @raises ServoHostRepairTotalFailure if the repair process fails to
   1347                 fix the servo host if one is attached to the DUT.
   1348         @raises AutoservSshPermissionDeniedError if it is unable
   1349                 to ssh to the servo host due to permission error.
   1350 
   1351         """
   1352         # Caution: Deleting shards relies on repair to always reboot the DUT.
   1353 
   1354         # To repair a DUT connected to a moblab, try to create a servo object if
   1355         # it was failed to be created earlier as there may be a servo_host host
   1356         # attribute for this host.
   1357         if utils.is_moblab():
   1358             self._setup_servo()
   1359 
   1360         if self._servo_host and not self.servo:
   1361             try:
   1362                 self._servo_host.repair()
   1363             except Exception as e:
   1364                 logging.error('Could not create a healthy servo: %s', e)
   1365             self.servo = self._servo_host.get_servo()
   1366 
   1367         self.try_collect_crashlogs()
   1368 
   1369         # TODO(scottz): This should use something similar to label_decorator,
   1370         # but needs to be populated in order so DUTs are repaired with the
   1371         # least amount of effort.
   1372         force_powerwash = self._is_last_provision_failed()
   1373         if force_powerwash:
   1374             logging.info('Last provision failed, try powerwash first.')
   1375             autotest_stats.Counter(
   1376                     'repair_force_powerwash.TOTAL').increment()
   1377             repair_funcs = [self._firmware_repair,
   1378                             self._install_repair_with_powerwash,
   1379                             self._servo_repair_reinstall]
   1380         else:
   1381             repair_funcs = [self._reboot_repair,
   1382                             self._servo_repair_power,
   1383                             self._firmware_repair,
   1384                             self._powercycle_to_repair,
   1385                             self._install_repair,
   1386                             self._install_repair_with_powerwash,
   1387                             self._servo_repair_reinstall]
   1388         errors = []
   1389         board = self._get_board_from_afe()
   1390         for repair_func in repair_funcs:
   1391             try:
   1392                 repair_func()
   1393                 self.try_collect_crashlogs()
   1394                 self.check_device()
   1395                 autotest_stats.Counter(
   1396                         '%s.SUCCEEDED' % repair_func.__name__).increment()
   1397                 if board:
   1398                     autotest_stats.Counter(
   1399                             '%s.%s.SUCCEEDED' % (repair_func.__name__,
   1400                                              board)).increment()
   1401                 if force_powerwash:
   1402                     autotest_stats.Counter(
   1403                             'repair_force_powerwash.SUCCEEDED').increment()
   1404                 return
   1405             except error.AutoservRepairMethodNA as e:
   1406                 autotest_stats.Counter(
   1407                         '%s.RepairNA' % repair_func.__name__).increment()
   1408                 if board:
   1409                     autotest_stats.Counter(
   1410                             '%s.%s.RepairNA' % (repair_func.__name__,
   1411                                                 board)).increment()
   1412                 logging.warning('Repair function NA: %s', e)
   1413                 errors.append(str(e))
   1414             except Exception as e:
   1415                 autotest_stats.Counter(
   1416                         '%s.FAILED' % repair_func.__name__).increment()
   1417                 if board:
   1418                     autotest_stats.Counter(
   1419                             '%s.%s.FAILED' % (repair_func.__name__,
   1420                                               board)).increment()
   1421                 logging.warning('Failed to repair device: %s', e)
   1422                 errors.append(str(e))
   1423 
   1424         if force_powerwash:
   1425             autotest_stats.Counter(
   1426                     'repair_force_powerwash.FAILED').increment()
   1427         autotest_stats.Counter('Full_Repair_Failed').increment()
   1428         if board:
   1429             autotest_stats.Counter(
   1430                     'Full_Repair_Failed.%s' % board).increment()
   1431         raise error.AutoservRepairTotalFailure(
   1432                 'All attempts at repairing the device failed:\n%s' %
   1433                 '\n'.join(errors))
   1434 
   1435 
   1436     def try_collect_crashlogs(self, check_host_up=True):
   1437         """
   1438         Check if a host is up and logs need to be collected from the host,
   1439         if yes, collect them.
   1440 
   1441         @param check_host_up: Flag for checking host is up. Default is True.
   1442         """
   1443         try:
   1444             crash_job = self._need_crash_logs()
   1445             if crash_job:
   1446                 logging.debug('%s: Job %s was crashed', self._CRASHLOGS_PREFIX,
   1447                               crash_job)
   1448                 if not check_host_up or self.is_up(
   1449                         self._CHECK_HOST_UP_TIMEOUT_SECS):
   1450                     self._collect_crashlogs(crash_job)
   1451                     logging.debug('%s: Completed collecting logs for the '
   1452                                   'crashed job %s', self._CRASHLOGS_PREFIX,
   1453                                   crash_job)
   1454         except Exception as e:
   1455             # Exception should not result in repair failure.
   1456             # Therefore, suppress all exceptions here.
   1457             logging.error('%s: Failed while trying to collect crash-logs: %s',
   1458                           self._CRASHLOGS_PREFIX, e)
   1459 
   1460 
   1461     def _need_crash_logs(self):
   1462         """Get the value of need_crash_logs attribute of this host.
   1463 
   1464         @return: Value string of need_crash_logs attribute
   1465                  None if there is no need_crash_logs attribute
   1466         """
   1467         attrs = self._AFE.get_host_attribute(constants.CRASHLOGS_HOST_ATTRIBUTE,
   1468                                              hostname=self.hostname)
   1469         assert len(attrs) < 2
   1470         return attrs[0].value if attrs else None
   1471 
   1472 
   1473     def _collect_crashlogs(self, job_id):
   1474         """Grab logs from the host where a job was crashed.
   1475 
   1476         First, check if PRIOR_LOGS_DIR exists in the host.
   1477         If yes, collect them.
   1478         Otherwise, check if a lab-machine marker (_LAB_MACHINE_FILE) exists
   1479         in the host.
   1480         If yes, the host was repaired automatically, and we collect normal
   1481         system logs.
   1482 
   1483         @param job_id: Id of the job that was crashed.
   1484         """
   1485         crashlogs_dir = crashcollect.get_crashinfo_dir(self,
   1486                 constants.CRASHLOGS_DEST_DIR_PREFIX)
   1487         flag_prior_logs = False
   1488 
   1489         if self.path_exists(client_constants.PRIOR_LOGS_DIR):
   1490             flag_prior_logs = True
   1491             self._collect_prior_logs(crashlogs_dir)
   1492         elif self.path_exists(self._LAB_MACHINE_FILE):
   1493             self._collect_system_logs(crashlogs_dir)
   1494         else:
   1495             logging.warning('%s: Host was manually re-installed without '
   1496                             '--lab_preserve_log option. Skip collecting '
   1497                             'crash-logs.', self._CRASHLOGS_PREFIX)
   1498 
   1499         # We make crash collection be one-time effort.
   1500         # _collect_prior_logs() and _collect_system_logs() will not throw
   1501         # any exception, and following codes will be executed even when
   1502         # those methods fail.
   1503         # _collect_crashlogs() is called only when the host is up (refer
   1504         # to try_collect_crashlogs()). We assume _collect_prior_logs() and
   1505         # _collect_system_logs() fail rarely when the host is up.
   1506         # In addition, it is not clear how many times we should try crash
   1507         # collection again while not triggering next repair unnecessarily.
   1508         # Threfore, we try crash collection one time.
   1509 
   1510         # Create a marker file as soon as log collection is done.
   1511         # Leave the job id to this marker for gs_offloader to consume.
   1512         marker_file = os.path.join(crashlogs_dir, constants.CRASHLOGS_MARKER)
   1513         with open(marker_file, 'a') as f:
   1514             f.write('%s\n' % job_id)
   1515 
   1516         # Remove need_crash_logs attribute
   1517         logging.debug('%s: Remove attribute need_crash_logs from host %s',
   1518                       self._CRASHLOGS_PREFIX, self.hostname)
   1519         self._AFE.set_host_attribute(constants.CRASHLOGS_HOST_ATTRIBUTE,
   1520                                      None, hostname=self.hostname)
   1521 
   1522         if flag_prior_logs:
   1523             logging.debug('%s: Remove %s from host %s', self._CRASHLOGS_PREFIX,
   1524                           client_constants.PRIOR_LOGS_DIR, self.hostname)
   1525             self.run('rm -rf %s; sync' % client_constants.PRIOR_LOGS_DIR)
   1526             # Wait for a few seconds to make sure the prior command is
   1527             # done deep through storage.
   1528             time.sleep(self._SAFE_WAIT_SECS)
   1529 
   1530 
   1531     def _collect_prior_logs(self, crashlogs_dir):
   1532         """Grab prior logs that were stashed before re-installing a host.
   1533 
   1534         @param crashlogs_dir: Directory path where crash-logs are stored.
   1535         """
   1536         logging.debug('%s: Found %s, collecting them...',
   1537                       self._CRASHLOGS_PREFIX, client_constants.PRIOR_LOGS_DIR)
   1538         try:
   1539             self.collect_logs(client_constants.PRIOR_LOGS_DIR,
   1540                               crashlogs_dir, False)
   1541             logging.debug('%s: %s is collected',
   1542                           self._CRASHLOGS_PREFIX, client_constants.PRIOR_LOGS_DIR)
   1543         except Exception as e:
   1544             logging.error('%s: Failed to collect %s: %s',
   1545                           self._CRASHLOGS_PREFIX, client_constants.PRIOR_LOGS_DIR,
   1546                           e)
   1547 
   1548 
   1549     def _collect_system_logs(self, crashlogs_dir):
   1550         """Grab normal system logs from a host.
   1551 
   1552         @param crashlogs_dir: Directory path where crash-logs are stored.
   1553         """
   1554         logging.debug('%s: Found %s, collecting system logs...',
   1555                       self._CRASHLOGS_PREFIX, self._LAB_MACHINE_FILE)
   1556         sources = server_utils.parse_simple_config(self._LOGS_TO_COLLECT_FILE)
   1557         for src in sources:
   1558             try:
   1559                 if self.path_exists(src):
   1560                     logging.debug('%s: Collecting %s...',
   1561                                   self._CRASHLOGS_PREFIX, src)
   1562                     dest = server_utils.concat_path_except_last(
   1563                             crashlogs_dir, src)
   1564                     self.collect_logs(src, dest, False)
   1565                     logging.debug('%s: %s is collected',
   1566                                   self._CRASHLOGS_PREFIX, src)
   1567             except Exception as e:
   1568                 logging.error('%s: Failed to collect %s: %s',
   1569                               self._CRASHLOGS_PREFIX, src, e)
   1570 
   1571 
   1572     def close(self):
   1573         super(CrosHost, self).close()
   1574 
   1575 
   1576     def get_power_supply_info(self):
   1577         """Get the output of power_supply_info.
   1578 
   1579         power_supply_info outputs the info of each power supply, e.g.,
   1580         Device: Line Power
   1581           online:                  no
   1582           type:                    Mains
   1583           voltage (V):             0
   1584           current (A):             0
   1585         Device: Battery
   1586           state:                   Discharging
   1587           percentage:              95.9276
   1588           technology:              Li-ion
   1589 
   1590         Above output shows two devices, Line Power and Battery, with details of
   1591         each device listed. This function parses the output into a dictionary,
   1592         with key being the device name, and value being a dictionary of details
   1593         of the device info.
   1594 
   1595         @return: The dictionary of power_supply_info, e.g.,
   1596                  {'Line Power': {'online': 'yes', 'type': 'main'},
   1597                   'Battery': {'vendor': 'xyz', 'percentage': '100'}}
   1598         @raise error.AutoservRunError if power_supply_info tool is not found in
   1599                the DUT. Caller should handle this error to avoid false failure
   1600                on verification.
   1601         """
   1602         result = self.run('power_supply_info').stdout.strip()
   1603         info = {}
   1604         device_name = None
   1605         device_info = {}
   1606         for line in result.split('\n'):
   1607             pair = [v.strip() for v in line.split(':')]
   1608             if len(pair) != 2:
   1609                 continue
   1610             if pair[0] == 'Device':
   1611                 if device_name:
   1612                     info[device_name] = device_info
   1613                 device_name = pair[1]
   1614                 device_info = {}
   1615             else:
   1616                 device_info[pair[0]] = pair[1]
   1617         if device_name and not device_name in info:
   1618             info[device_name] = device_info
   1619         return info
   1620 
   1621 
   1622     def get_battery_percentage(self):
   1623         """Get the battery percentage.
   1624 
   1625         @return: The percentage of battery level, value range from 0-100. Return
   1626                  None if the battery info cannot be retrieved.
   1627         """
   1628         try:
   1629             info = self.get_power_supply_info()
   1630             logging.info(info)
   1631             return float(info['Battery']['percentage'])
   1632         except (KeyError, ValueError, error.AutoservRunError):
   1633             return None
   1634 
   1635 
   1636     def is_ac_connected(self):
   1637         """Check if the dut has power adapter connected and charging.
   1638 
   1639         @return: True if power adapter is connected and charging.
   1640         """
   1641         try:
   1642             info = self.get_power_supply_info()
   1643             return info['Line Power']['online'] == 'yes'
   1644         except (KeyError, error.AutoservRunError):
   1645             return None
   1646 
   1647 
   1648     def _cleanup_poweron(self):
   1649         """Special cleanup method to make sure hosts always get power back."""
   1650         afe = frontend_wrappers.RetryingAFE(timeout_min=5, delay_sec=10)
   1651         hosts = afe.get_hosts(hostname=self.hostname)
   1652         if not hosts or not (self._RPM_OUTLET_CHANGED in
   1653                              hosts[0].attributes):
   1654             return
   1655         logging.debug('This host has recently interacted with the RPM'
   1656                       ' Infrastructure. Ensuring power is on.')
   1657         try:
   1658             self.power_on()
   1659             afe.set_host_attribute(self._RPM_OUTLET_CHANGED, None,
   1660                                    hostname=self.hostname)
   1661         except rpm_client.RemotePowerException:
   1662             logging.error('Failed to turn Power On for this host after '
   1663                           'cleanup through the RPM Infrastructure.')
   1664             autotest_es.post(
   1665                     type_str='RPM_poweron_failure',
   1666                     metadata={'hostname': self.hostname})
   1667 
   1668             battery_percentage = self.get_battery_percentage()
   1669             if battery_percentage and battery_percentage < 50:
   1670                 raise
   1671             elif self.is_ac_connected():
   1672                 logging.info('The device has power adapter connected and '
   1673                              'charging. No need to try to turn RPM on '
   1674                              'again.')
   1675                 afe.set_host_attribute(self._RPM_OUTLET_CHANGED, None,
   1676                                        hostname=self.hostname)
   1677             logging.info('Battery level is now at %s%%. The device may '
   1678                          'still have enough power to run test, so no '
   1679                          'exception will be raised.', battery_percentage)
   1680 
   1681 
   1682     def _is_factory_image(self):
   1683         """Checks if the image on the DUT is a factory image.
   1684 
   1685         @return: True if the image on the DUT is a factory image.
   1686                  False otherwise.
   1687         """
   1688         result = self.run('[ -f /root/.factory_test ]', ignore_status=True)
   1689         return result.exit_status == 0
   1690 
   1691 
   1692     def _restart_ui(self):
   1693         """Restart the Chrome UI.
   1694 
   1695         @raises: FactoryImageCheckerException for factory images, since
   1696                  we cannot attempt to restart ui on them.
   1697                  error.AutoservRunError for any other type of error that
   1698                  occurs while restarting ui.
   1699         """
   1700         if self._is_factory_image():
   1701             raise FactoryImageCheckerException('Cannot restart ui on factory '
   1702                                                'images')
   1703 
   1704         # TODO(jrbarnette):  The command to stop/start the ui job
   1705         # should live inside cros_ui, too.  However that would seem
   1706         # to imply interface changes to the existing start()/restart()
   1707         # functions, which is a bridge too far (for now).
   1708         prompt = cros_ui.get_chrome_session_ident(self)
   1709         self.run('stop ui; start ui')
   1710         cros_ui.wait_for_chrome_ready(prompt, self)
   1711 
   1712 
   1713     def get_release_version(self):
   1714         """Get the value of attribute CHROMEOS_RELEASE_VERSION from lsb-release.
   1715 
   1716         @returns The version string in lsb-release, under attribute
   1717                  CHROMEOS_RELEASE_VERSION.
   1718         """
   1719         lsb_release_content = self.run(
   1720                     'cat "%s"' % client_constants.LSB_RELEASE).stdout.strip()
   1721         return lsbrelease_utils.get_chromeos_release_version(
   1722                     lsb_release_content=lsb_release_content)
   1723 
   1724 
   1725     def verify_cros_version_label(self):
   1726         """ Make sure host's cros-version label match the actual image in dut.
   1727 
   1728         Remove any cros-version: label that doesn't match that installed in
   1729         the dut.
   1730 
   1731         @param raise_error: Set to True to raise exception if any mismatch found
   1732 
   1733         @raise error.AutoservError: If any mismatch between cros-version label
   1734                                     and the build installed in dut is found.
   1735         """
   1736         labels = self._AFE.get_labels(
   1737                 name__startswith=ds_constants.VERSION_PREFIX,
   1738                 host__hostname=self.hostname)
   1739         mismatch_found = False
   1740         if labels:
   1741             # Get CHROMEOS_RELEASE_VERSION from lsb-release, e.g., 6908.0.0.
   1742             # Note that it's different from cros-version label, which has
   1743             # builder and branch info, e.g.,
   1744             # cros-version:peppy-release/R43-6908.0.0
   1745             release_version = self.get_release_version()
   1746             host_list = [self.hostname]
   1747             for label in labels:
   1748                 # Remove any cros-version label that does not match
   1749                 # release_version.
   1750                 build_version = label.name[len(ds_constants.VERSION_PREFIX):]
   1751                 if not utils.version_match(build_version, release_version):
   1752                     logging.warn('cros-version label "%s" does not match '
   1753                                  'release version %s. Removing the label.',
   1754                                  label.name, release_version)
   1755                     label.remove_hosts(hosts=host_list)
   1756                     mismatch_found = True
   1757         if mismatch_found:
   1758             autotest_es.post(use_http=True,
   1759                              type_str='cros_version_label_mismatch',
   1760                              metadata={'hostname': self.hostname})
   1761             raise error.AutoservError('The host has wrong cros-version label.')
   1762 
   1763 
   1764     def verify_tpm_status(self):
   1765         """ Verify the host's TPM is in a good state.
   1766 
   1767         @raise error.AutoservError: If state is not good.
   1768         """
   1769         # This cryptohome command emits status information in JSON format. It
   1770         # looks something like this:
   1771         # {
   1772         #    "installattrs": {
   1773         #       "first_install": false,
   1774         #       "initialized": true,
   1775         #       "invalid": false,
   1776         #       "lockbox_index": 536870916,
   1777         #       "lockbox_nvram_version": 2,
   1778         #       "secure": true,
   1779         #       "size": 0,
   1780         #       "version": 1
   1781         #    },
   1782         #    "mounts": [ {
   1783         #       "enterprise": false,
   1784         #       "keysets": [ {
   1785         #          "current": true,
   1786         #          "index": 0,
   1787         #          "last_activity": 1330111359,
   1788         #          "ok": true,
   1789         #          "scrypt": true,
   1790         #          "tpm": false
   1791         #       } ],
   1792         #       "mounted": true,
   1793         #       "owner": "dbb3dd34edb181245130e136be51fa08478d3909"
   1794         #    } ],
   1795         #    "tpm": {
   1796         #       "being_owned": false,
   1797         #       "can_connect": true,
   1798         #       "can_decrypt": false,
   1799         #       "can_encrypt": false,
   1800         #       "can_load_srk": true,
   1801         #       "can_load_srk_pubkey": true,
   1802         #       "enabled": true,
   1803         #       "has_context": true,
   1804         #       "has_cryptohome_key": false,
   1805         #       "has_key_handle": false,
   1806         #       "last_error": 0,
   1807         #       "owned": true
   1808         #    }
   1809         # }
   1810         output = self.run('cryptohome --action=status').stdout.strip()
   1811         try:
   1812             status = json.loads(output)
   1813         except ValueError:
   1814             logging.error('TPM_VERIFY: Cryptohome did not return valid status.')
   1815             return
   1816         try:
   1817             tpm = status['tpm']
   1818             if (not tpm['enabled'] or not tpm['can_connect'] or
   1819                 (tpm['owned'] and not tpm['can_load_srk']) or
   1820                 (tpm['can_load_srk'] and not tpm['can_load_srk_pubkey'])):
   1821                 logging.error('TPM_VERIFY: The host TPM is in a bad state.')
   1822                 raise error.AutoservError('The host TPM is in a bad state.')
   1823             else:
   1824                 logging.debug('TPM_VERIFY: The host TPM is in a good state.')
   1825         except KeyError:
   1826             logging.error('TPM_VERIFY: Cryptohome did not return valid status.')
   1827 
   1828 
   1829     def verify_firmware_status(self):
   1830         """Verify the host's firmware is in a good state.
   1831 
   1832         @raise error.AutoservError: If state is not good.
   1833         """
   1834         if self._is_firmware_repair_supported():
   1835             try:
   1836                 # Read the AP firmware and dump the sections we are interested.
   1837                 cmd = ('mkdir /tmp/verify_firmware; '
   1838                        'cd /tmp/verify_firmware; '
   1839                        'for section in VBLOCK_A VBLOCK_B FW_MAIN_A FW_MAIN_B; '
   1840                        'do flashrom -r image.bin -i $section:$section; '
   1841                        'done')
   1842                 self.run(cmd)
   1843 
   1844                 # Verify the firmware blocks A and B.
   1845                 cmd = ('vbutil_firmware --verify /tmp/verify_firmware/VBLOCK_%c'
   1846                        ' --signpubkey /usr/share/vboot/devkeys/root_key.vbpubk'
   1847                        ' --fv /tmp/verify_firmware/FW_MAIN_%c')
   1848                 for c in ('A', 'B'):
   1849                     rv = self.run(cmd % (c, c), ignore_status=True)
   1850                     if rv.exit_status:
   1851                        raise error.AutoservError(
   1852                                'Firmware %c is in a bad state.' % c)
   1853             finally:
   1854                 # Remove the tempoary files.
   1855                 self.run('rm -rf /tmp/verify_firmware')
   1856         else:
   1857             logging.info('Do not care about firmware status when the host '
   1858                          'is not in pools that support firmware repair.')
   1859 
   1860 
   1861     def verify_filesystem_write_status(self):
   1862         """Verify the DUT's filesystem is read/writable
   1863 
   1864         @raise error.AutoservError: if filesystem is not writable.
   1865         """
   1866         # try to create & delete a file
   1867         filename = "/mnt/stateful_partition/test.txt"
   1868         cmd = 'touch %s && rm %s' % (filename, filename)
   1869         rv = self.run(command=cmd, ignore_status=True)
   1870 
   1871         if rv.exit_status == 1:
   1872             raise error.AutoservError('DUT filesystem is read-only.')
   1873 
   1874 
   1875     def cleanup(self):
   1876         self.run('rm -f %s' % client_constants.CLEANUP_LOGS_PAUSED_FILE)
   1877         try:
   1878             self._restart_ui()
   1879         except (error.AutotestRunError, error.AutoservRunError,
   1880                 FactoryImageCheckerException):
   1881             logging.warning('Unable to restart ui, rebooting device.')
   1882             # Since restarting the UI fails fall back to normal Autotest
   1883             # cleanup routines, i.e. reboot the machine.
   1884             super(CrosHost, self).cleanup()
   1885         # Check if the rpm outlet was manipulated.
   1886         if self.has_power():
   1887             self._cleanup_poweron()
   1888         self.verify_cros_version_label()
   1889 
   1890 
   1891     def reboot(self, **dargs):
   1892         """
   1893         This function reboots the site host. The more generic
   1894         RemoteHost.reboot() performs sync and sleeps for 5
   1895         seconds. This is not necessary for Chrome OS devices as the
   1896         sync should be finished in a short time during the reboot
   1897         command.
   1898         """
   1899         if 'reboot_cmd' not in dargs:
   1900             reboot_timeout = dargs.get('reboot_timeout', 10)
   1901             dargs['reboot_cmd'] = ('sleep 1; '
   1902                                    'reboot & sleep %d; '
   1903                                    'reboot -f' % reboot_timeout)
   1904         # Enable fastsync to avoid running extra sync commands before reboot.
   1905         if 'fastsync' not in dargs:
   1906             dargs['fastsync'] = True
   1907 
   1908         # For purposes of logging reboot times:
   1909         # Get the board name i.e. 'daisy_spring'
   1910         board_fullname = self.get_board()
   1911 
   1912         # Strip the prefix and add it to dargs.
   1913         dargs['board'] = board_fullname[board_fullname.find(':')+1:]
   1914         super(CrosHost, self).reboot(**dargs)
   1915 
   1916 
   1917     def suspend(self, **dargs):
   1918         """
   1919         This function suspends the site host.
   1920         """
   1921         suspend_time = dargs.get('suspend_time', 60)
   1922         dargs['timeout'] = suspend_time
   1923         if 'suspend_cmd' not in dargs:
   1924             dargs['suspend_cmd'] = ' && '.join([
   1925                 'echo 0 > /sys/class/rtc/rtc0/wakealarm',
   1926                 'echo +%d > /sys/class/rtc/rtc0/wakealarm' % suspend_time,
   1927                 'powerd_dbus_suspend --delay=0'])
   1928         super(CrosHost, self).suspend(**dargs)
   1929 
   1930 
   1931     def upstart_status(self, service_name):
   1932         """Check the status of an upstart init script.
   1933 
   1934         @param service_name: Service to look up.
   1935 
   1936         @returns True if the service is running, False otherwise.
   1937         """
   1938         return self.run('status %s | grep start/running' %
   1939                         service_name).stdout.strip() != ''
   1940 
   1941 
   1942     def verify_software(self):
   1943         """Verify working software on a Chrome OS system.
   1944 
   1945         Tests for the following conditions:
   1946          1. All conditions tested by the parent version of this
   1947             function.
   1948          2. Sufficient space in /mnt/stateful_partition.
   1949          3. Sufficient space in /mnt/stateful_partition/encrypted.
   1950          4. update_engine answers a simple status request over DBus.
   1951 
   1952         """
   1953         # Check if a job was crashed on this host.
   1954         # If yes, avoid verification until crash-logs are collected.
   1955         if self._need_crash_logs():
   1956             raise error.AutoservCrashLogCollectRequired(
   1957                     'Need to collect crash-logs before verification')
   1958 
   1959         super(CrosHost, self).verify_software()
   1960         default_kilo_inodes_required = CONFIG.get_config_value(
   1961                 'SERVER', 'kilo_inodes_required', type=int, default=100)
   1962         board = self.get_board().replace(ds_constants.BOARD_PREFIX, '')
   1963         kilo_inodes_required = CONFIG.get_config_value(
   1964                 'SERVER', 'kilo_inodes_required_%s' % board,
   1965                 type=int, default=default_kilo_inodes_required)
   1966         self.check_inodes('/mnt/stateful_partition', kilo_inodes_required)
   1967         self.check_diskspace(
   1968             '/mnt/stateful_partition',
   1969             CONFIG.get_config_value(
   1970                 'SERVER', 'gb_diskspace_required', type=float,
   1971                 default=20.0))
   1972         encrypted_stateful_path = '/mnt/stateful_partition/encrypted'
   1973         # Not all targets build with encrypted stateful support.
   1974         if self.path_exists(encrypted_stateful_path):
   1975             self.check_diskspace(
   1976                 encrypted_stateful_path,
   1977                 CONFIG.get_config_value(
   1978                     'SERVER', 'gb_encrypted_diskspace_required', type=float,
   1979                     default=0.1))
   1980 
   1981         if not self.upstart_status('system-services'):
   1982             raise error.AutoservError('Chrome failed to reach login. '
   1983                                       'System services not running.')
   1984 
   1985         # Factory images don't run update engine,
   1986         # goofy controls dbus on these DUTs.
   1987         if not self._is_factory_image():
   1988             self.run('update_engine_client --status')
   1989         # Makes sure python is present, loads and can use built in functions.
   1990         # We have seen cases where importing cPickle fails with undefined
   1991         # symbols in cPickle.so.
   1992         self.run('python -c "import cPickle"')
   1993 
   1994         self.verify_cros_version_label()
   1995 
   1996         self.verify_tpm_status()
   1997 
   1998         self.verify_firmware_status()
   1999 
   2000         self.verify_filesystem_write_status()
   2001 
   2002 
   2003     def verify_hardware(self):
   2004         """Verify hardware system of a Chrome OS system.
   2005 
   2006         Check following hardware conditions:
   2007         1. Battery level.
   2008         2. Is power adapter connected.
   2009         """
   2010         logging.info('Battery percentage: %s', self.get_battery_percentage())
   2011         if self.is_ac_connected() is None:
   2012             logging.info('Can not determine if the device has power adapter '
   2013                          'connected.')
   2014         else:
   2015             logging.info('Device %s power adapter connected and charging.',
   2016                          'has' if self.is_ac_connected() else 'does not have')
   2017 
   2018 
   2019     def make_ssh_command(self, user='root', port=22, opts='', hosts_file=None,
   2020                          connect_timeout=None, alive_interval=None):
   2021         """Override default make_ssh_command to use options tuned for Chrome OS.
   2022 
   2023         Tuning changes:
   2024           - ConnectTimeout=30; maximum of 30 seconds allowed for an SSH
   2025           connection failure.  Consistency with remote_access.sh.
   2026 
   2027           - ServerAliveInterval=900; which causes SSH to ping connection every
   2028           900 seconds. In conjunction with ServerAliveCountMax ensures
   2029           that if the connection dies, Autotest will bail out.
   2030           Originally tried 60 secs, but saw frequent job ABORTS where
   2031           the test completed successfully. Later increased from 180 seconds to
   2032           900 seconds to account for tests where the DUT is suspended for
   2033           longer periods of time.
   2034 
   2035           - ServerAliveCountMax=3; consistency with remote_access.sh.
   2036 
   2037           - ConnectAttempts=4; reduce flakiness in connection errors;
   2038           consistency with remote_access.sh.
   2039 
   2040           - UserKnownHostsFile=/dev/null; we don't care about the keys.
   2041           Host keys change with every new installation, don't waste
   2042           memory/space saving them.
   2043 
   2044           - SSH protocol forced to 2; needed for ServerAliveInterval.
   2045 
   2046         @param user User name to use for the ssh connection.
   2047         @param port Port on the target host to use for ssh connection.
   2048         @param opts Additional options to the ssh command.
   2049         @param hosts_file Ignored.
   2050         @param connect_timeout Ignored.
   2051         @param alive_interval Ignored.
   2052         """
   2053         base_command = ('/usr/bin/ssh -a -x %s %s %s'
   2054                         ' -o StrictHostKeyChecking=no'
   2055                         ' -o UserKnownHostsFile=/dev/null -o BatchMode=yes'
   2056                         ' -o ConnectTimeout=30 -o ServerAliveInterval=900'
   2057                         ' -o ServerAliveCountMax=3 -o ConnectionAttempts=4'
   2058                         ' -o Protocol=2 -l %s -p %d')
   2059         return base_command % (self._ssh_verbosity_flag, self._ssh_options,
   2060                                opts, user, port)
   2061     def syslog(self, message, tag='autotest'):
   2062         """Logs a message to syslog on host.
   2063 
   2064         @param message String message to log into syslog
   2065         @param tag String tag prefix for syslog
   2066 
   2067         """
   2068         self.run('logger -t "%s" "%s"' % (tag, message))
   2069 
   2070 
   2071     def _ping_check_status(self, status):
   2072         """Ping the host once, and return whether it has a given status.
   2073 
   2074         @param status Check the ping status against this value.
   2075         @return True iff `status` and the result of ping are the same
   2076                 (i.e. both True or both False).
   2077 
   2078         """
   2079         ping_val = utils.ping(self.hostname, tries=1, deadline=1)
   2080         return not (status ^ (ping_val == 0))
   2081 
   2082     def _ping_wait_for_status(self, status, timeout):
   2083         """Wait for the host to have a given status (UP or DOWN).
   2084 
   2085         Status is checked by polling.  Polling will not last longer
   2086         than the number of seconds in `timeout`.  The polling
   2087         interval will be long enough that only approximately
   2088         _PING_WAIT_COUNT polling cycles will be executed, subject
   2089         to a maximum interval of about one minute.
   2090 
   2091         @param status Waiting will stop immediately if `ping` of the
   2092                       host returns this status.
   2093         @param timeout Poll for at most this many seconds.
   2094         @return True iff the host status from `ping` matched the
   2095                 requested status at the time of return.
   2096 
   2097         """
   2098         # _ping_check_status() takes about 1 second, hence the
   2099         # "- 1" in the formula below.
   2100         poll_interval = min(int(timeout / self._PING_WAIT_COUNT), 60) - 1
   2101         end_time = time.time() + timeout
   2102         while time.time() <= end_time:
   2103             if self._ping_check_status(status):
   2104                 return True
   2105             if poll_interval > 0:
   2106                 time.sleep(poll_interval)
   2107 
   2108         # The last thing we did was sleep(poll_interval), so it may
   2109         # have been too long since the last `ping`.  Check one more
   2110         # time, just to be sure.
   2111         return self._ping_check_status(status)
   2112 
   2113     def ping_wait_up(self, timeout):
   2114         """Wait for the host to respond to `ping`.
   2115 
   2116         N.B.  This method is not a reliable substitute for
   2117         `wait_up()`, because a host that responds to ping will not
   2118         necessarily respond to ssh.  This method should only be used
   2119         if the target DUT can be considered functional even if it
   2120         can't be reached via ssh.
   2121 
   2122         @param timeout Minimum time to allow before declaring the
   2123                        host to be non-responsive.
   2124         @return True iff the host answered to ping before the timeout.
   2125 
   2126         """
   2127         return self._ping_wait_for_status(self._PING_STATUS_UP, timeout)
   2128 
   2129     def ping_wait_down(self, timeout):
   2130         """Wait until the host no longer responds to `ping`.
   2131 
   2132         This function can be used as a slightly faster version of
   2133         `wait_down()`, by avoiding potentially long ssh timeouts.
   2134 
   2135         @param timeout Minimum time to allow for the host to become
   2136                        non-responsive.
   2137         @return True iff the host quit answering ping before the
   2138                 timeout.
   2139 
   2140         """
   2141         return self._ping_wait_for_status(self._PING_STATUS_DOWN, timeout)
   2142 
   2143     def test_wait_for_sleep(self, sleep_timeout=None):
   2144         """Wait for the client to enter low-power sleep mode.
   2145 
   2146         The test for "is asleep" can't distinguish a system that is
   2147         powered off; to confirm that the unit was asleep, it is
   2148         necessary to force resume, and then call
   2149         `test_wait_for_resume()`.
   2150 
   2151         This function is expected to be called from a test as part
   2152         of a sequence like the following:
   2153 
   2154         ~~~~~~~~
   2155             boot_id = host.get_boot_id()
   2156             # trigger sleep on the host
   2157             host.test_wait_for_sleep()
   2158             # trigger resume on the host
   2159             host.test_wait_for_resume(boot_id)
   2160         ~~~~~~~~
   2161 
   2162         @param sleep_timeout time limit in seconds to allow the host sleep.
   2163 
   2164         @exception TestFail The host did not go to sleep within
   2165                             the allowed time.
   2166         """
   2167         if sleep_timeout is None:
   2168             sleep_timeout = self.SLEEP_TIMEOUT
   2169 
   2170         if not self.ping_wait_down(timeout=sleep_timeout):
   2171             raise error.TestFail(
   2172                 'client failed to sleep after %d seconds' % sleep_timeout)
   2173 
   2174 
   2175     def test_wait_for_resume(self, old_boot_id, resume_timeout=None):
   2176         """Wait for the client to resume from low-power sleep mode.
   2177 
   2178         The `old_boot_id` parameter should be the value from
   2179         `get_boot_id()` obtained prior to entering sleep mode.  A
   2180         `TestFail` exception is raised if the boot id changes.
   2181 
   2182         See @ref test_wait_for_sleep for more on this function's
   2183         usage.
   2184 
   2185         @param old_boot_id A boot id value obtained before the
   2186                                target host went to sleep.
   2187         @param resume_timeout time limit in seconds to allow the host up.
   2188 
   2189         @exception TestFail The host did not respond within the
   2190                             allowed time.
   2191         @exception TestFail The host responded, but the boot id test
   2192                             indicated a reboot rather than a sleep
   2193                             cycle.
   2194         """
   2195         if resume_timeout is None:
   2196             resume_timeout = self.RESUME_TIMEOUT
   2197 
   2198         if not self.wait_up(timeout=resume_timeout):
   2199             raise error.TestFail(
   2200                 'client failed to resume from sleep after %d seconds' %
   2201                     resume_timeout)
   2202         else:
   2203             new_boot_id = self.get_boot_id()
   2204             if new_boot_id != old_boot_id:
   2205                 logging.error('client rebooted (old boot %s, new boot %s)',
   2206                               old_boot_id, new_boot_id)
   2207                 raise error.TestFail(
   2208                     'client rebooted, but sleep was expected')
   2209 
   2210 
   2211     def test_wait_for_shutdown(self, shutdown_timeout=None):
   2212         """Wait for the client to shut down.
   2213 
   2214         The test for "has shut down" can't distinguish a system that
   2215         is merely asleep; to confirm that the unit was down, it is
   2216         necessary to force boot, and then call test_wait_for_boot().
   2217 
   2218         This function is expected to be called from a test as part
   2219         of a sequence like the following:
   2220 
   2221         ~~~~~~~~
   2222             boot_id = host.get_boot_id()
   2223             # trigger shutdown on the host
   2224             host.test_wait_for_shutdown()
   2225             # trigger boot on the host
   2226             host.test_wait_for_boot(boot_id)
   2227         ~~~~~~~~
   2228 
   2229         @param shutdown_timeout time limit in seconds to allow the host down.
   2230         @exception TestFail The host did not shut down within the
   2231                             allowed time.
   2232         """
   2233         if shutdown_timeout is None:
   2234             shutdown_timeout = self.SHUTDOWN_TIMEOUT
   2235 
   2236         if not self.ping_wait_down(timeout=shutdown_timeout):
   2237             raise error.TestFail(
   2238                 'client failed to shut down after %d seconds' %
   2239                     shutdown_timeout)
   2240 
   2241 
   2242     def test_wait_for_boot(self, old_boot_id=None):
   2243         """Wait for the client to boot from cold power.
   2244 
   2245         The `old_boot_id` parameter should be the value from
   2246         `get_boot_id()` obtained prior to shutting down.  A
   2247         `TestFail` exception is raised if the boot id does not
   2248         change.  The boot id test is omitted if `old_boot_id` is not
   2249         specified.
   2250 
   2251         See @ref test_wait_for_shutdown for more on this function's
   2252         usage.
   2253 
   2254         @param old_boot_id A boot id value obtained before the
   2255                                shut down.
   2256 
   2257         @exception TestFail The host did not respond within the
   2258                             allowed time.
   2259         @exception TestFail The host responded, but the boot id test
   2260                             indicated that there was no reboot.
   2261         """
   2262         if not self.wait_up(timeout=self.REBOOT_TIMEOUT):
   2263             raise error.TestFail(
   2264                 'client failed to reboot after %d seconds' %
   2265                     self.REBOOT_TIMEOUT)
   2266         elif old_boot_id:
   2267             if self.get_boot_id() == old_boot_id:
   2268                 logging.error('client not rebooted (boot %s)',
   2269                               old_boot_id)
   2270                 raise error.TestFail(
   2271                     'client is back up, but did not reboot')
   2272 
   2273 
   2274     @staticmethod
   2275     def check_for_rpm_support(hostname):
   2276         """For a given hostname, return whether or not it is powered by an RPM.
   2277 
   2278         @param hostname: hostname to check for rpm support.
   2279 
   2280         @return None if this host does not follows the defined naming format
   2281                 for RPM powered DUT's in the lab. If it does follow the format,
   2282                 it returns a regular expression MatchObject instead.
   2283         """
   2284         return re.match(CrosHost._RPM_HOSTNAME_REGEX, hostname)
   2285 
   2286 
   2287     def has_power(self):
   2288         """For this host, return whether or not it is powered by an RPM.
   2289 
   2290         @return True if this host is in the CROS lab and follows the defined
   2291                 naming format.
   2292         """
   2293         return CrosHost.check_for_rpm_support(self.hostname)
   2294 
   2295 
   2296     def _set_power(self, state, power_method):
   2297         """Sets the power to the host via RPM, Servo or manual.
   2298 
   2299         @param state Specifies which power state to set to DUT
   2300         @param power_method Specifies which method of power control to
   2301                             use. By default "RPM" will be used. Valid values
   2302                             are the strings "RPM", "manual", "servoj10".
   2303 
   2304         """
   2305         ACCEPTABLE_STATES = ['ON', 'OFF']
   2306 
   2307         if state.upper() not in ACCEPTABLE_STATES:
   2308             raise error.TestError('State must be one of: %s.'
   2309                                    % (ACCEPTABLE_STATES,))
   2310 
   2311         if power_method == self.POWER_CONTROL_SERVO:
   2312             logging.info('Setting servo port J10 to %s', state)
   2313             self.servo.set('prtctl3_pwren', state.lower())
   2314             time.sleep(self._USB_POWER_TIMEOUT)
   2315         elif power_method == self.POWER_CONTROL_MANUAL:
   2316             logging.info('You have %d seconds to set the AC power to %s.',
   2317                          self._POWER_CYCLE_TIMEOUT, state)
   2318             time.sleep(self._POWER_CYCLE_TIMEOUT)
   2319         else:
   2320             if not self.has_power():
   2321                 raise error.TestFail('DUT does not have RPM connected.')
   2322             afe = frontend_wrappers.RetryingAFE(timeout_min=5, delay_sec=10)
   2323             afe.set_host_attribute(self._RPM_OUTLET_CHANGED, True,
   2324                                    hostname=self.hostname)
   2325             rpm_client.set_power(self.hostname, state.upper(), timeout_mins=5)
   2326 
   2327 
   2328     def power_off(self, power_method=POWER_CONTROL_RPM):
   2329         """Turn off power to this host via RPM, Servo or manual.
   2330 
   2331         @param power_method Specifies which method of power control to
   2332                             use. By default "RPM" will be used. Valid values
   2333                             are the strings "RPM", "manual", "servoj10".
   2334 
   2335         """
   2336         self._set_power('OFF', power_method)
   2337 
   2338 
   2339     def power_on(self, power_method=POWER_CONTROL_RPM):
   2340         """Turn on power to this host via RPM, Servo or manual.
   2341 
   2342         @param power_method Specifies which method of power control to
   2343                             use. By default "RPM" will be used. Valid values
   2344                             are the strings "RPM", "manual", "servoj10".
   2345 
   2346         """
   2347         self._set_power('ON', power_method)
   2348 
   2349 
   2350     def power_cycle(self, power_method=POWER_CONTROL_RPM):
   2351         """Cycle power to this host by turning it OFF, then ON.
   2352 
   2353         @param power_method Specifies which method of power control to
   2354                             use. By default "RPM" will be used. Valid values
   2355                             are the strings "RPM", "manual", "servoj10".
   2356 
   2357         """
   2358         if power_method in (self.POWER_CONTROL_SERVO,
   2359                             self.POWER_CONTROL_MANUAL):
   2360             self.power_off(power_method=power_method)
   2361             time.sleep(self._POWER_CYCLE_TIMEOUT)
   2362             self.power_on(power_method=power_method)
   2363         else:
   2364             rpm_client.set_power(self.hostname, 'CYCLE')
   2365 
   2366 
   2367     def get_platform(self):
   2368         """Determine the correct platform label for this host.
   2369 
   2370         @returns a string representing this host's platform.
   2371         """
   2372         crossystem = utils.Crossystem(self)
   2373         crossystem.init()
   2374         # Extract fwid value and use the leading part as the platform id.
   2375         # fwid generally follow the format of {platform}.{firmware version}
   2376         # Example: Alex.X.YYY.Z or Google_Alex.X.YYY.Z
   2377         platform = crossystem.fwid().split('.')[0].lower()
   2378         # Newer platforms start with 'Google_' while the older ones do not.
   2379         return platform.replace('google_', '')
   2380 
   2381 
   2382     def get_architecture(self):
   2383         """Determine the correct architecture label for this host.
   2384 
   2385         @returns a string representing this host's architecture.
   2386         """
   2387         crossystem = utils.Crossystem(self)
   2388         crossystem.init()
   2389         return crossystem.arch()
   2390 
   2391 
   2392     def get_chrome_version(self):
   2393         """Gets the Chrome version number and milestone as strings.
   2394 
   2395         Invokes "chrome --version" to get the version number and milestone.
   2396 
   2397         @return A tuple (chrome_ver, milestone) where "chrome_ver" is the
   2398             current Chrome version number as a string (in the form "W.X.Y.Z")
   2399             and "milestone" is the first component of the version number
   2400             (the "W" from "W.X.Y.Z").  If the version number cannot be parsed
   2401             in the "W.X.Y.Z" format, the "chrome_ver" will be the full output
   2402             of "chrome --version" and the milestone will be the empty string.
   2403 
   2404         """
   2405         version_string = self.run(client_constants.CHROME_VERSION_COMMAND).stdout
   2406         return utils.parse_chrome_version(version_string)
   2407 
   2408 
   2409     @label_decorator()
   2410     def get_board(self):
   2411         """Determine the correct board label for this host.
   2412 
   2413         @returns a string representing this host's board.
   2414         """
   2415         release_info = utils.parse_cmd_output('cat /etc/lsb-release',
   2416                                               run_method=self.run)
   2417         return (ds_constants.BOARD_PREFIX +
   2418                 release_info['CHROMEOS_RELEASE_BOARD'])
   2419 
   2420 
   2421     @label_decorator('lightsensor')
   2422     def has_lightsensor(self):
   2423         """Determine the correct board label for this host.
   2424 
   2425         @returns the string 'lightsensor' if this host has a lightsensor or
   2426                  None if it does not.
   2427         """
   2428         search_cmd = "find -L %s -maxdepth 4 | egrep '%s'" % (
   2429             self._LIGHTSENSOR_SEARCH_DIR, '|'.join(self._LIGHTSENSOR_FILES))
   2430         try:
   2431             # Run the search cmd following the symlinks. Stderr_tee is set to
   2432             # None as there can be a symlink loop, but the command will still
   2433             # execute correctly with a few messages printed to stderr.
   2434             self.run(search_cmd, stdout_tee=None, stderr_tee=None)
   2435             return 'lightsensor'
   2436         except error.AutoservRunError:
   2437             # egrep exited with a return code of 1 meaning none of the possible
   2438             # lightsensor files existed.
   2439             return None
   2440 
   2441 
   2442     @label_decorator('bluetooth')
   2443     def has_bluetooth(self):
   2444         """Determine the correct board label for this host.
   2445 
   2446         @returns the string 'bluetooth' if this host has bluetooth or
   2447                  None if it does not.
   2448         """
   2449         try:
   2450             self.run('test -d /sys/class/bluetooth/hci0')
   2451             # test exited with a return code of 0.
   2452             return 'bluetooth'
   2453         except error.AutoservRunError:
   2454             # test exited with a return code 1 meaning the directory did not
   2455             # exist.
   2456             return None
   2457 
   2458 
   2459     @label_decorator('ec')
   2460     def get_ec(self):
   2461         """
   2462         Determine the type of EC on this host.
   2463 
   2464         @returns a string representing this host's embedded controller type.
   2465         At present, it only returns "ec:cros", for Chrome OS ECs. Other types
   2466         of EC (or none) don't return any strings, since no tests depend on
   2467         those.
   2468         """
   2469         cmd = 'mosys ec info'
   2470         # The output should look like these, so that the last field should
   2471         # match our EC version scheme:
   2472         #
   2473         #   stm | stm32f100 | snow_v1.3.139-375eb9f
   2474         #   ti | Unknown-10de | peppy_v1.5.114-5d52788
   2475         #
   2476         # Non-Chrome OS ECs will look like these:
   2477         #
   2478         #   ENE | KB932 | 00BE107A00
   2479         #   ite | it8518 | 3.08
   2480         #
   2481         # And some systems don't have ECs at all (Lumpy, for example).
   2482         regexp = r'^.*\|\s*(\S+_v\d+\.\d+\.\d+-[0-9a-f]+)\s*$'
   2483 
   2484         ecinfo = self.run(command=cmd, ignore_status=True)
   2485         if ecinfo.exit_status == 0:
   2486             res = re.search(regexp, ecinfo.stdout)
   2487             if res:
   2488                 logging.info("EC version is %s", res.groups()[0])
   2489                 return 'ec:cros'
   2490             logging.info("%s got: %s", cmd, ecinfo.stdout)
   2491             # Has an EC, but it's not a Chrome OS EC
   2492             return None
   2493         logging.info("%s exited with status %d", cmd, ecinfo.exit_status)
   2494         # No EC present
   2495         return None
   2496 
   2497 
   2498     @label_decorator('accels')
   2499     def get_accels(self):
   2500         """
   2501         Determine the type of accelerometers on this host.
   2502 
   2503         @returns a string representing this host's accelerometer type.
   2504         At present, it only returns "accel:cros-ec", for accelerometers
   2505         attached to a Chrome OS EC, or none, if no accelerometers.
   2506         """
   2507         # Check to make sure we have ectool
   2508         rv = self.run('which ectool', ignore_status=True)
   2509         if rv.exit_status:
   2510             logging.info("No ectool cmd found, assuming no EC accelerometers")
   2511             return None
   2512 
   2513         # Check that the EC supports the motionsense command
   2514         rv = self.run('ectool motionsense', ignore_status=True)
   2515         if rv.exit_status:
   2516             logging.info("EC does not support motionsense command "
   2517                          "assuming no EC accelerometers")
   2518             return None
   2519 
   2520         # Check that EC motion sensors are active
   2521         active = self.run('ectool motionsense active').stdout.split('\n')
   2522         if active[0] == "0":
   2523             logging.info("Motion sense inactive, assuming no EC accelerometers")
   2524             return None
   2525 
   2526         logging.info("EC accelerometers found")
   2527         return 'accel:cros-ec'
   2528 
   2529 
   2530     @label_decorator('chameleon')
   2531     def has_chameleon(self):
   2532         """Determine if a Chameleon connected to this host.
   2533 
   2534         @returns a list containing two strings ('chameleon' and
   2535                  'chameleon:' + label, e.g. 'chameleon:hdmi') if this host
   2536                  has a Chameleon or None if it has not.
   2537         """
   2538         if self._chameleon_host:
   2539             return ['chameleon', 'chameleon:' + self.chameleon.get_label()]
   2540         else:
   2541             return None
   2542 
   2543 
   2544     @label_decorator('audio_loopback_dongle')
   2545     def has_loopback_dongle(self):
   2546         """Determine if an audio loopback dongle is plugged to this host.
   2547 
   2548         @returns 'audio_loopback_dongle' when there is an audio loopback dongle
   2549                                          plugged to this host.
   2550                  None                    when there is no audio loopback dongle
   2551                                          plugged to this host.
   2552         """
   2553         nodes_info = self.run(command=cras_utils.get_cras_nodes_cmd(),
   2554                               ignore_status=True).stdout
   2555         if (cras_utils.node_type_is_plugged('HEADPHONE', nodes_info) and
   2556             cras_utils.node_type_is_plugged('MIC', nodes_info)):
   2557                 return 'audio_loopback_dongle'
   2558         else:
   2559                 return None
   2560 
   2561 
   2562     @label_decorator('power_supply')
   2563     def get_power_supply(self):
   2564         """
   2565         Determine what type of power supply the host has
   2566 
   2567         @returns a string representing this host's power supply.
   2568                  'power:battery' when the device has a battery intended for
   2569                         extended use
   2570                  'power:AC_primary' when the device has a battery not intended
   2571                         for extended use (for moving the machine, etc)
   2572                  'power:AC_only' when the device has no battery at all.
   2573         """
   2574         psu = self.run(command='mosys psu type', ignore_status=True)
   2575         if psu.exit_status:
   2576             # The psu command for mosys is not included for all platforms. The
   2577             # assumption is that the device will have a battery if the command
   2578             # is not found.
   2579             return 'power:battery'
   2580 
   2581         psu_str = psu.stdout.strip()
   2582         if psu_str == 'unknown':
   2583             return None
   2584 
   2585         return 'power:%s' % psu_str
   2586 
   2587 
   2588     @label_decorator('storage')
   2589     def get_storage(self):
   2590         """
   2591         Determine the type of boot device for this host.
   2592 
   2593         Determine if the internal device is SCSI or dw_mmc device.
   2594         Then check that it is SSD or HDD or eMMC or something else.
   2595 
   2596         @returns a string representing this host's internal device type.
   2597                  'storage:ssd' when internal device is solid state drive
   2598                  'storage:hdd' when internal device is hard disk drive
   2599                  'storage:mmc' when internal device is mmc drive
   2600                  None          When internal device is something else or
   2601                                when we are unable to determine the type
   2602         """
   2603         # The output should be /dev/mmcblk* for SD/eMMC or /dev/sd* for scsi
   2604         rootdev_cmd = ' '.join(['. /usr/sbin/write_gpt.sh;',
   2605                                 '. /usr/share/misc/chromeos-common.sh;',
   2606                                 'load_base_vars;',
   2607                                 'get_fixed_dst_drive'])
   2608         rootdev = self.run(command=rootdev_cmd, ignore_status=True)
   2609         if rootdev.exit_status:
   2610             logging.info("Fail to run %s", rootdev_cmd)
   2611             return None
   2612         rootdev_str = rootdev.stdout.strip()
   2613 
   2614         if not rootdev_str:
   2615             return None
   2616 
   2617         rootdev_base = os.path.basename(rootdev_str)
   2618 
   2619         mmc_pattern = '/dev/mmcblk[0-9]'
   2620         if re.match(mmc_pattern, rootdev_str):
   2621             # Use type to determine if the internal device is eMMC or somthing
   2622             # else. We can assume that MMC is always an internal device.
   2623             type_cmd = 'cat /sys/block/%s/device/type' % rootdev_base
   2624             type = self.run(command=type_cmd, ignore_status=True)
   2625             if type.exit_status:
   2626                 logging.info("Fail to run %s", type_cmd)
   2627                 return None
   2628             type_str = type.stdout.strip()
   2629 
   2630             if type_str == 'MMC':
   2631                 return 'storage:mmc'
   2632 
   2633         scsi_pattern = '/dev/sd[a-z]+'
   2634         if re.match(scsi_pattern, rootdev.stdout):
   2635             # Read symlink for /sys/block/sd* to determine if the internal
   2636             # device is connected via ata or usb.
   2637             link_cmd = 'readlink /sys/block/%s' % rootdev_base
   2638             link = self.run(command=link_cmd, ignore_status=True)
   2639             if link.exit_status:
   2640                 logging.info("Fail to run %s", link_cmd)
   2641                 return None
   2642             link_str = link.stdout.strip()
   2643             if 'usb' in link_str:
   2644                 return None
   2645 
   2646             # Read rotation to determine if the internal device is ssd or hdd.
   2647             rotate_cmd = str('cat /sys/block/%s/queue/rotational'
   2648                               % rootdev_base)
   2649             rotate = self.run(command=rotate_cmd, ignore_status=True)
   2650             if rotate.exit_status:
   2651                 logging.info("Fail to run %s", rotate_cmd)
   2652                 return None
   2653             rotate_str = rotate.stdout.strip()
   2654 
   2655             rotate_dict = {'0':'storage:ssd', '1':'storage:hdd'}
   2656             return rotate_dict.get(rotate_str)
   2657 
   2658         # All other internal device / error case will always fall here
   2659         return None
   2660 
   2661 
   2662     @label_decorator('servo')
   2663     def get_servo(self):
   2664         """Determine if the host has a servo attached.
   2665 
   2666         If the host has a working servo attached, it should have a servo label.
   2667 
   2668         @return: string 'servo' if the host has servo attached. Otherwise,
   2669                  returns None.
   2670         """
   2671         return 'servo' if self._servo_host else None
   2672 
   2673 
   2674     @label_decorator('video_labels')
   2675     def get_video_labels(self):
   2676         """Run /usr/local/bin/avtest_label_detect to get a list of video labels.
   2677 
   2678         Sample output of avtest_label_detect:
   2679         Detected label: hw_video_acc_vp8
   2680         Detected label: webcam
   2681 
   2682         @return: A list of labels detected by tool avtest_label_detect.
   2683         """
   2684         try:
   2685             result = self.run('/usr/local/bin/avtest_label_detect').stdout
   2686             return re.findall('^Detected label: (\w+)$', result, re.M)
   2687         except error.AutoservRunError:
   2688             # The tool is not installed.
   2689             return []
   2690 
   2691 
   2692     @label_decorator('video_glitch_detection')
   2693     def is_video_glitch_detection_supported(self):
   2694         """ Determine if a board under test is supported for video glitch
   2695         detection tests.
   2696 
   2697         @return: 'video_glitch_detection' if board is supported, None otherwise.
   2698         """
   2699         board = self.get_board().replace(ds_constants.BOARD_PREFIX, '')
   2700 
   2701         if board in video_test_constants.SUPPORTED_BOARDS:
   2702             return 'video_glitch_detection'
   2703 
   2704         return None
   2705 
   2706 
   2707     @label_decorator('touch_labels')
   2708     def get_touch(self):
   2709         """
   2710         Determine whether board under test has a touchpad or touchscreen.
   2711 
   2712         @return: A list of some combination of 'touchscreen' and 'touchpad',
   2713             depending on what is present on the device.
   2714 
   2715         """
   2716         labels = []
   2717         looking_for = ['touchpad', 'touchscreen']
   2718         player = input_playback.InputPlayback()
   2719         input_events = self.run('ls /dev/input/event*').stdout.strip().split()
   2720         filename = '/tmp/touch_labels'
   2721         for event in input_events:
   2722             self.run('evtest %s > %s' % (event, filename), timeout=1,
   2723                      ignore_timeout=True)
   2724             properties = self.run('cat %s' % filename).stdout
   2725             input_type = player._determine_input_type(properties)
   2726             if input_type in looking_for:
   2727                 labels.append(input_type)
   2728                 looking_for.remove(input_type)
   2729             if len(looking_for) == 0:
   2730                 break
   2731         self.run('rm %s' % filename)
   2732 
   2733         return labels
   2734 
   2735 
   2736     @label_decorator('internal_display')
   2737     def has_internal_display(self):
   2738         """Determine if the device under test is equipped with an internal
   2739         display.
   2740 
   2741         @return: 'internal_display' if one is present; None otherwise.
   2742         """
   2743         from autotest_lib.client.cros.graphics import graphics_utils
   2744         from autotest_lib.client.common_lib import utils as common_utils
   2745 
   2746         def __system_output(cmd):
   2747             return self.run(cmd).stdout
   2748 
   2749         def __read_file(remote_path):
   2750             return self.run('cat %s' % remote_path).stdout
   2751 
   2752         # Hijack the necessary client functions so that we can take advantage
   2753         # of the client lib here.
   2754         # FIXME: find a less hacky way than this
   2755         original_system_output = utils.system_output
   2756         original_read_file = common_utils.read_file
   2757         utils.system_output = __system_output
   2758         common_utils.read_file = __read_file
   2759         try:
   2760             return ('internal_display' if graphics_utils.has_internal_display()
   2761                                    else None)
   2762         finally:
   2763             utils.system_output = original_system_output
   2764             common_utils.read_file = original_read_file
   2765 
   2766 
   2767     @label_decorator('lucidsleep')
   2768     def has_lucid_sleep_support(self):
   2769         """Determine if the device under test has support for lucid sleep.
   2770 
   2771         @return 'lucidsleep' if this board supports lucid sleep; None otherwise
   2772         """
   2773         board = self.get_board().replace(ds_constants.BOARD_PREFIX, '')
   2774         return 'lucidsleep' if board in LUCID_SLEEP_BOARDS else None
   2775 
   2776 
   2777     def is_boot_from_usb(self):
   2778         """Check if DUT is boot from USB.
   2779 
   2780         @return: True if DUT is boot from usb.
   2781         """
   2782         device = self.run('rootdev -s -d').stdout.strip()
   2783         removable = int(self.run('cat /sys/block/%s/removable' %
   2784                                  os.path.basename(device)).stdout.strip())
   2785         return removable == 1
   2786 
   2787 
   2788     def read_from_meminfo(self, key):
   2789         """Return the memory info from /proc/meminfo
   2790 
   2791         @param key: meminfo requested
   2792 
   2793         @return the memory value as a string
   2794 
   2795         """
   2796         meminfo = self.run('grep %s /proc/meminfo' % key).stdout.strip()
   2797         logging.debug('%s', meminfo)
   2798         return int(re.search(r'\d+', meminfo).group(0))
   2799 
   2800 
   2801     def get_board_type(self):
   2802         """
   2803         Get the DUT's device type from /etc/lsb-release.
   2804         DEVICETYPE can be one of CHROMEBOX, CHROMEBASE, CHROMEBOOK or more.
   2805 
   2806         @return value of DEVICETYPE param from lsb-release.
   2807         """
   2808         device_type = self.run('grep DEVICETYPE /etc/lsb-release',
   2809                                ignore_status=True).stdout
   2810         if device_type:
   2811             return device_type.split('=')[-1].strip()
   2812         return ''
   2813 
   2814 
   2815     def get_os_type(self):
   2816         return 'cros'
   2817 
   2818 
   2819     def enable_adb_testing(self):
   2820         """Mark this host as an adb tester."""
   2821         self.run('touch %s' % constants.ANDROID_TESTER_FILEFLAG)
   2822