1 | # -*- coding: utf-8 -*-
|
---|
2 | # $Id: testboxcommand.py 76553 2019-01-01 01:45:53Z vboxsync $
|
---|
3 |
|
---|
4 | """
|
---|
5 | TestBox Script - Command Processor.
|
---|
6 | """
|
---|
7 |
|
---|
8 | __copyright__ = \
|
---|
9 | """
|
---|
10 | Copyright (C) 2012-2019 Oracle Corporation
|
---|
11 |
|
---|
12 | This file is part of VirtualBox Open Source Edition (OSE), as
|
---|
13 | available from http://www.virtualbox.org. This file is free software;
|
---|
14 | you can redistribute it and/or modify it under the terms of the GNU
|
---|
15 | General Public License (GPL) as published by the Free Software
|
---|
16 | Foundation, in version 2 as it comes in the "COPYING" file of the
|
---|
17 | VirtualBox OSE distribution. VirtualBox OSE is distributed in the
|
---|
18 | hope that it will be useful, but WITHOUT ANY WARRANTY of any kind.
|
---|
19 |
|
---|
20 | The contents of this file may alternatively be used under the terms
|
---|
21 | of the Common Development and Distribution License Version 1.0
|
---|
22 | (CDDL) only, as it comes in the "COPYING.CDDL" file of the
|
---|
23 | VirtualBox OSE distribution, in which case the provisions of the
|
---|
24 | CDDL are applicable instead of those of the GPL.
|
---|
25 |
|
---|
26 | You may elect to license modified versions of this file under the
|
---|
27 | terms and conditions of either the GPL or the CDDL or both.
|
---|
28 | """
|
---|
29 | __version__ = "$Revision: 76553 $"
|
---|
30 |
|
---|
31 | # Standard python imports.
|
---|
32 | import os;
|
---|
33 | import sys;
|
---|
34 | import threading;
|
---|
35 |
|
---|
36 | # Validation Kit imports.
|
---|
37 | from common import constants;
|
---|
38 | from common import utils, webutils;
|
---|
39 | import testboxcommons;
|
---|
40 | from testboxcommons import TestBoxException;
|
---|
41 | from testboxscript import TBS_EXITCODE_NEED_UPGRADE;
|
---|
42 | from testboxupgrade import upgradeFromZip;
|
---|
43 | from testboxtasks import TestBoxExecTask, TestBoxCleanupTask, TestBoxTestDriverTask;
|
---|
44 |
|
---|
45 | # Figure where we are.
|
---|
46 | try: __file__
|
---|
47 | except: __file__ = sys.argv[0];
|
---|
48 | g_ksTestScriptDir = os.path.dirname(os.path.abspath(__file__));
|
---|
49 |
|
---|
50 |
|
---|
51 |
|
---|
52 | class TestBoxCommand(object):
|
---|
53 | """
|
---|
54 | Implementation of Test Box command.
|
---|
55 | """
|
---|
56 |
|
---|
57 | ## The time to wait on the current task to abort.
|
---|
58 | kcSecStopTimeout = 360
|
---|
59 | ## The time to wait on the current task to abort before rebooting.
|
---|
60 | kcSecStopBeforeRebootTimeout = 360
|
---|
61 |
|
---|
62 | def __init__(self, oTestBoxScript):
|
---|
63 | """
|
---|
64 | Class instance init
|
---|
65 | """
|
---|
66 | self._oTestBoxScript = oTestBoxScript;
|
---|
67 | self._oCurTaskLock = threading.RLock();
|
---|
68 | self._oCurTask = None;
|
---|
69 |
|
---|
70 | # List of available commands and their handlers
|
---|
71 | self._dfnCommands = \
|
---|
72 | {
|
---|
73 | constants.tbresp.CMD_IDLE: self._cmdIdle,
|
---|
74 | constants.tbresp.CMD_WAIT: self._cmdWait,
|
---|
75 | constants.tbresp.CMD_EXEC: self._cmdExec,
|
---|
76 | constants.tbresp.CMD_ABORT: self._cmdAbort,
|
---|
77 | constants.tbresp.CMD_REBOOT: self._cmdReboot,
|
---|
78 | constants.tbresp.CMD_UPGRADE: self._cmdUpgrade,
|
---|
79 | constants.tbresp.CMD_UPGRADE_AND_REBOOT: self._cmdUpgradeAndReboot,
|
---|
80 | constants.tbresp.CMD_SPECIAL: self._cmdSpecial,
|
---|
81 | }
|
---|
82 |
|
---|
83 | def _cmdIdle(self, oResponse, oConnection):
|
---|
84 | """
|
---|
85 | Idle response, no ACK.
|
---|
86 | """
|
---|
87 | oResponse.checkParameterCount(1);
|
---|
88 |
|
---|
89 | # The dispatch loop will delay for us, so nothing to do here.
|
---|
90 | _ = oConnection; # Leave the connection open.
|
---|
91 | return True;
|
---|
92 |
|
---|
93 | def _cmdWait(self, oResponse, oConnection):
|
---|
94 | """
|
---|
95 | Gang scheduling wait response, no ACK.
|
---|
96 | """
|
---|
97 | oResponse.checkParameterCount(1);
|
---|
98 |
|
---|
99 | # The dispatch loop will delay for us, so nothing to do here.
|
---|
100 | _ = oConnection; # Leave the connection open.
|
---|
101 | return True;
|
---|
102 |
|
---|
103 | def _cmdExec(self, oResponse, oConnection):
|
---|
104 | """
|
---|
105 | Execute incoming command
|
---|
106 | """
|
---|
107 |
|
---|
108 | # Check if required parameters given and make a little sense.
|
---|
109 | idResult = oResponse.getIntChecked( constants.tbresp.EXEC_PARAM_RESULT_ID, 1);
|
---|
110 | sScriptZips = oResponse.getStringChecked(constants.tbresp.EXEC_PARAM_SCRIPT_ZIPS);
|
---|
111 | sScriptCmdLine = oResponse.getStringChecked(constants.tbresp.EXEC_PARAM_SCRIPT_CMD_LINE);
|
---|
112 | cSecTimeout = oResponse.getIntChecked( constants.tbresp.EXEC_PARAM_TIMEOUT, 30);
|
---|
113 | oResponse.checkParameterCount(5);
|
---|
114 |
|
---|
115 | sScriptFile = utils.argsGetFirst(sScriptCmdLine);
|
---|
116 | if sScriptFile is None:
|
---|
117 | raise TestBoxException('Bad script command line: "%s"' % (sScriptCmdLine,));
|
---|
118 | if len(os.path.basename(sScriptFile)) < len('t.py'):
|
---|
119 | raise TestBoxException('Script file name too short: "%s"' % (sScriptFile,));
|
---|
120 | if len(sScriptZips) < len('x.zip'):
|
---|
121 | raise TestBoxException('Script zip name too short: "%s"' % (sScriptFile,));
|
---|
122 |
|
---|
123 | # One task at the time.
|
---|
124 | if self.isRunning():
|
---|
125 | raise TestBoxException('Already running other command');
|
---|
126 |
|
---|
127 | # Don't bother running the task without the shares mounted.
|
---|
128 | self._oTestBoxScript.mountShares(); # Raises exception on failure.
|
---|
129 |
|
---|
130 | # Kick off the task and ACK the command.
|
---|
131 | self._oCurTaskLock.acquire();
|
---|
132 | try:
|
---|
133 | self._oCurTask = TestBoxExecTask(self._oTestBoxScript, idResult = idResult, sScriptZips = sScriptZips,
|
---|
134 | sScriptCmdLine = sScriptCmdLine, cSecTimeout = cSecTimeout);
|
---|
135 | finally:
|
---|
136 | self._oCurTaskLock.release();
|
---|
137 | oConnection.sendAckAndClose(constants.tbresp.CMD_EXEC);
|
---|
138 | return True;
|
---|
139 |
|
---|
140 | def _cmdAbort(self, oResponse, oConnection):
|
---|
141 | """
|
---|
142 | Abort background task
|
---|
143 | """
|
---|
144 | oResponse.checkParameterCount(1);
|
---|
145 | oConnection.sendAck(constants.tbresp.CMD_ABORT);
|
---|
146 |
|
---|
147 | oCurTask = self._getCurTask();
|
---|
148 | if oCurTask is not None:
|
---|
149 | oCurTask.terminate();
|
---|
150 | oCurTask.flushLogOnConnection(oConnection);
|
---|
151 | oConnection.close();
|
---|
152 | oCurTask.wait(self.kcSecStopTimeout);
|
---|
153 |
|
---|
154 | return True;
|
---|
155 |
|
---|
156 | def doReboot(self):
|
---|
157 | """
|
---|
158 | Worker common to _cmdReboot and _doUpgrade that performs a system reboot.
|
---|
159 | """
|
---|
160 | # !! Not more exceptions beyond this point !!
|
---|
161 | testboxcommons.log('Rebooting');
|
---|
162 |
|
---|
163 | # Stop anything that might be executing at this point.
|
---|
164 | oCurTask = self._getCurTask();
|
---|
165 | if oCurTask is not None:
|
---|
166 | oCurTask.terminate();
|
---|
167 | oCurTask.wait(self.kcSecStopBeforeRebootTimeout);
|
---|
168 |
|
---|
169 | # Invoke shutdown command line utility.
|
---|
170 | sOs = utils.getHostOs();
|
---|
171 | asCmd2 = None;
|
---|
172 | if sOs == 'win':
|
---|
173 | asCmd = ['shutdown', '/r', '/t', '0', '/c', '"ValidationKit triggered reboot"', '/d', '4:1'];
|
---|
174 | elif sOs == 'os2':
|
---|
175 | asCmd = ['setboot', '/B'];
|
---|
176 | elif sOs in ('solaris',):
|
---|
177 | asCmd = ['/usr/sbin/reboot', '-p'];
|
---|
178 | asCmd2 = ['/usr/sbin/reboot']; # Hack! S10 doesn't have -p, but don't know how to reliably detect S10.
|
---|
179 | else:
|
---|
180 | asCmd = ['/sbin/shutdown', '-r', 'now'];
|
---|
181 | try:
|
---|
182 | utils.sudoProcessOutputChecked(asCmd);
|
---|
183 | except Exception as oXcpt:
|
---|
184 | if asCmd2 is not None:
|
---|
185 | try:
|
---|
186 | utils.sudoProcessOutputChecked(asCmd2);
|
---|
187 | except Exception as oXcpt:
|
---|
188 | testboxcommons.log('Error executing reboot command "%s" as well as "%s": %s' % (asCmd, asCmd2, oXcpt));
|
---|
189 | return False;
|
---|
190 | testboxcommons.log('Error executing reboot command "%s": %s' % (asCmd, oXcpt));
|
---|
191 | return False;
|
---|
192 |
|
---|
193 | # Quit the script.
|
---|
194 | while True:
|
---|
195 | sys.exit(32);
|
---|
196 | return True;
|
---|
197 |
|
---|
198 | def _cmdReboot(self, oResponse, oConnection):
|
---|
199 | """
|
---|
200 | Reboot Test Box
|
---|
201 | """
|
---|
202 | oResponse.checkParameterCount(1);
|
---|
203 | oConnection.sendAckAndClose(constants.tbresp.CMD_REBOOT);
|
---|
204 | return self.doReboot();
|
---|
205 |
|
---|
206 | def _doUpgrade(self, oResponse, oConnection, fReboot):
|
---|
207 | """
|
---|
208 | Common worker for _cmdUpgrade and _cmdUpgradeAndReboot.
|
---|
209 | Will sys.exit on success!
|
---|
210 | """
|
---|
211 |
|
---|
212 | #
|
---|
213 | # The server specifies a ZIP archive with the new scripts. It's ASSUMED
|
---|
214 | # that the zip is of selected files at g_ksValidationKitDir in SVN. It's
|
---|
215 | # further ASSUMED that we're executing from
|
---|
216 | #
|
---|
217 | sZipUrl = oResponse.getStringChecked(constants.tbresp.UPGRADE_PARAM_URL)
|
---|
218 | oResponse.checkParameterCount(2);
|
---|
219 |
|
---|
220 | if utils.isRunningFromCheckout():
|
---|
221 | raise TestBoxException('Cannot upgrade when running from the tree!');
|
---|
222 | oConnection.sendAckAndClose(constants.tbresp.CMD_UPGRADE_AND_REBOOT if fReboot else constants.tbresp.CMD_UPGRADE);
|
---|
223 |
|
---|
224 | testboxcommons.log('Upgrading...');
|
---|
225 |
|
---|
226 | #
|
---|
227 | # Download the file and install it.
|
---|
228 | #
|
---|
229 | sDstFile = os.path.join(g_ksTestScriptDir, 'VBoxTestBoxScript.zip');
|
---|
230 | if os.path.exists(sDstFile):
|
---|
231 | os.unlink(sDstFile);
|
---|
232 | fRc = webutils.downloadFile(sZipUrl, sDstFile, self._oTestBoxScript.getPathBuilds(), testboxcommons.log);
|
---|
233 | if fRc is not True:
|
---|
234 | return False;
|
---|
235 |
|
---|
236 | if upgradeFromZip(sDstFile) is not True:
|
---|
237 | return False;
|
---|
238 |
|
---|
239 | #
|
---|
240 | # Restart the system or the script (we have a parent script which
|
---|
241 | # respawns us when we quit).
|
---|
242 | #
|
---|
243 | if fReboot:
|
---|
244 | self.doReboot();
|
---|
245 | sys.exit(TBS_EXITCODE_NEED_UPGRADE);
|
---|
246 | return False; # shuts up pylint (it will probably complain later when it learns DECL_NO_RETURN).
|
---|
247 |
|
---|
248 | def _cmdUpgrade(self, oResponse, oConnection):
|
---|
249 | """
|
---|
250 | Upgrade Test Box Script
|
---|
251 | """
|
---|
252 | return self._doUpgrade(oResponse, oConnection, False);
|
---|
253 |
|
---|
254 | def _cmdUpgradeAndReboot(self, oResponse, oConnection):
|
---|
255 | """
|
---|
256 | Upgrade Test Box Script
|
---|
257 | """
|
---|
258 | return self._doUpgrade(oResponse, oConnection, True);
|
---|
259 |
|
---|
260 | def _cmdSpecial(self, oResponse, oConnection):
|
---|
261 | """
|
---|
262 | Reserved for future fun.
|
---|
263 | """
|
---|
264 | oConnection.sendReplyAndClose(constants.tbreq.COMMAND_NOTSUP, constants.tbresp.CMD_SPECIAL);
|
---|
265 | testboxcommons.log('Special command %s not supported...' % (oResponse,));
|
---|
266 | return False;
|
---|
267 |
|
---|
268 |
|
---|
269 | def handleCommand(self, oResponse, oConnection):
|
---|
270 | """
|
---|
271 | Handles a command from the test manager.
|
---|
272 |
|
---|
273 | Some commands will close the connection, others (generally the simple
|
---|
274 | ones) wont, leaving the caller the option to use it for log flushing.
|
---|
275 |
|
---|
276 | Returns success indicator.
|
---|
277 | Raises no exception.
|
---|
278 | """
|
---|
279 | try:
|
---|
280 | sCmdName = oResponse.getStringChecked(constants.tbresp.ALL_PARAM_RESULT);
|
---|
281 | except Exception as oXcpt:
|
---|
282 | oConnection.close();
|
---|
283 | return False;
|
---|
284 |
|
---|
285 | # Do we know the command?
|
---|
286 | fRc = False;
|
---|
287 | if sCmdName in self._dfnCommands:
|
---|
288 | testboxcommons.log(sCmdName);
|
---|
289 | try:
|
---|
290 | # Execute the handler.
|
---|
291 | fRc = self._dfnCommands[sCmdName](oResponse, oConnection)
|
---|
292 | except Exception as oXcpt:
|
---|
293 | # NACK the command if an exception is raised during parameter validation.
|
---|
294 | testboxcommons.log1Xcpt('Exception executing "%s": %s' % (sCmdName, oXcpt));
|
---|
295 | if oConnection.isConnected():
|
---|
296 | try:
|
---|
297 | oConnection.sendReplyAndClose(constants.tbreq.COMMAND_NACK, sCmdName);
|
---|
298 | except Exception as oXcpt2:
|
---|
299 | testboxcommons.log('Failed to NACK "%s": %s' % (sCmdName, oXcpt2));
|
---|
300 | elif sCmdName in [constants.tbresp.STATUS_DEAD, constants.tbresp.STATUS_NACK]:
|
---|
301 | testboxcommons.log('Received status instead of command: %s' % (sCmdName, ));
|
---|
302 | else:
|
---|
303 | # NOTSUP the unknown command.
|
---|
304 | testboxcommons.log('Received unknown command: %s' % (sCmdName, ));
|
---|
305 | try:
|
---|
306 | oConnection.sendReplyAndClose(constants.tbreq.COMMAND_NOTSUP, sCmdName);
|
---|
307 | except Exception as oXcpt:
|
---|
308 | testboxcommons.log('Failed to NOTSUP "%s": %s' % (sCmdName, oXcpt));
|
---|
309 | return fRc;
|
---|
310 |
|
---|
311 | def resumeIncompleteCommand(self):
|
---|
312 | """
|
---|
313 | Resumes an incomplete command at startup.
|
---|
314 |
|
---|
315 | The EXEC commands saves essential state information in the scratch area
|
---|
316 | so we can resume them in case the testbox panics or is rebooted.
|
---|
317 | Current "resume" means doing cleanups, but we may need to implement
|
---|
318 | test scenarios involving rebooting the testbox later.
|
---|
319 |
|
---|
320 | Returns (idTestBox, sTestBoxName, True) if a command was resumed,
|
---|
321 | otherwise (-1, '', False). Raises no exceptions.
|
---|
322 | """
|
---|
323 |
|
---|
324 | try:
|
---|
325 | oTask = TestBoxCleanupTask(self._oTestBoxScript);
|
---|
326 | except:
|
---|
327 | return (-1, '', False);
|
---|
328 |
|
---|
329 | self._oCurTaskLock.acquire();
|
---|
330 | self._oCurTask = oTask;
|
---|
331 | self._oCurTaskLock.release();
|
---|
332 |
|
---|
333 | return (oTask.idTestBox, oTask.sTestBoxName, True);
|
---|
334 |
|
---|
335 | def isRunning(self):
|
---|
336 | """
|
---|
337 | Check if we're running a task or not.
|
---|
338 | """
|
---|
339 | oCurTask = self._getCurTask();
|
---|
340 | return oCurTask is not None and oCurTask.isRunning();
|
---|
341 |
|
---|
342 | def flushLogOnConnection(self, oGivenConnection):
|
---|
343 | """
|
---|
344 | Flushes the log of any running task with a log buffer.
|
---|
345 | """
|
---|
346 | oCurTask = self._getCurTask();
|
---|
347 | if oCurTask is not None and isinstance(oCurTask, TestBoxTestDriverTask):
|
---|
348 | return oCurTask.flushLogOnConnection(oGivenConnection);
|
---|
349 | return None;
|
---|
350 |
|
---|
351 | def _getCurTask(self):
|
---|
352 | """ Gets the current task in a paranoidly safe manny. """
|
---|
353 | self._oCurTaskLock.acquire();
|
---|
354 | oCurTask = self._oCurTask;
|
---|
355 | self._oCurTaskLock.release();
|
---|
356 | return oCurTask;
|
---|
357 |
|
---|