blob: 2196a1dc3124c60acdd5a4a5fecccc3493ecd75c [file] [log] [blame] [edit]
// Copyright 2019 The Chromium OS Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
package wifi
import (
"bufio"
"context"
"io"
"os"
"strings"
"time"
"chromiumos/tast/common/shillconst"
"chromiumos/tast/common/testexec"
"chromiumos/tast/ctxutil"
"chromiumos/tast/errors"
"chromiumos/tast/local/shill"
"chromiumos/tast/local/upstart"
"chromiumos/tast/testing"
)
func init() {
testing.AddTest(&testing.Test{
Func: HostapHwsim,
Desc: "Run selected hostap tests using a set of simulated WiFi clients/APs",
Contacts: []string{
"chromeos-wifi-champs@google.com", // WiFi oncall rotation; or http://b/new?component=893827
"briannorris@chromium.org", // Test author
},
SoftwareDeps: []string{"hostap_hwsim"},
// For running manually, with specific 'run-all.sh' arguments (e.g., specific tests or
// modules).
Vars: []string{"wifi.HostapHwsim.runArgs"},
Params: []testing.Param{
{
Name: "validity",
// Keep this test list short, as it can take a while to run many modules.
Val: []string{
"module_wpa_supplicant", // unit tests for wpa_supplicant
"module_hostapd", // unit tests for hostapd
"scan_random_mac", // example scanning test
},
// Only target the 'validity' list for mainline, as anything more can take a
// long time.
ExtraAttr: []string{"group:mainline"},
},
{
Name: "full",
// List all modules known to be working. Note that we don't run this regularly
// (reasons noted below), so it's subject to error.
Val: []string{
"-f",
"oce",
"scan", // NB (https://crbug.com/1060000): 'scan_only' is flaky.
"owe",
"wpas_wmm_ac",
"bgscan",
"kernel",
"wep",
"ieee8021x",
// We can run the dbus module, but it will all be skipped due to
// missing Python module (pygobject). Include it, in case the library
// becomes available in the future.
"dbus",
"monitor_interface",
"wpas_config",
"pmksa_cache",
"dfs",
"sae",
"ap_ft",
"ssid",
"cfg80211",
"radius",
"eap_proto",
"connect_cmd",
"autoscan",
// Not all suites are enumerated here, but it's useful to list modules
// which are intentionally *not* run, in case there are subtle reasons
// why they won't work.
//
// Known flaky (offchannel_tx_roc_grpform and
// offchannel_tx_roc_grpform2).
// "offchannel_tx",
},
// Not currently targeted for mainline, as the tests can take a long time and
// are probably only most useful as less-frequent, non-Commit-Queue-blocking
// usage -- for example, for testing wholesale wpa_supplicant upgrades.
// Consider running this nightly in the future.
// Tests can take a while: 13 minutes for the ~20 modules I first
// benchmarked, and ~an hour on some ARM devices. Give some headroom
// beyond that.
Timeout: 120 * 2 * time.Minute,
},
},
})
}
func getProhibited(ctx context.Context, m *shill.Manager) ([]string, error) {
props, err := m.GetProperties(ctx)
if err != nil {
return nil, errors.Wrap(err, "failed to get properties")
}
prohibited, err := props.GetString(shillconst.ManagerPropertyProhibitedTechnologies)
if err != nil {
return nil, err
}
// NB: "Split" produces a slice of length 1 for empty strings, rather than an empty slice. Callers do not expect
// that.
if prohibited == "" {
return nil, nil
}
return strings.Split(prohibited, ","), nil
}
func setProhibited(ctx context.Context, m *shill.Manager, technologies []string) error {
str := strings.Join(technologies, ",")
return m.SetProperty(ctx, shillconst.ManagerPropertyProhibitedTechnologies, str)
}
func HostapHwsim(fullCtx context.Context, s *testing.State) {
// Save a few seconds for cleanup.
ctx, cancel := ctxutil.Shorten(fullCtx, time.Second*5)
defer cancel()
// Arguments passed to the run-all wrapper script. Useful args:
// --vm: tell the test wrapper we're launching directly within a VM.
// Among other things, this means we take care of our own logs (and
// the wrapper doesn't tar them up into /tmp for us).
// --trace: collect additional tracing results via trace-cmd (not
// included by default; include dev-util/trace-cmd ebuild if
// desired).
// -f <module1> [<module2> ...]: run tests from these module(s).
// <test1> [<test2> ...]: when not using -f, run individual test cases.
//
// If no <testX> or <moduleX> args are provided, run all tests.
//
// By default, we only select modules/tests are currently known to pass
// reliably (defaultTestList), but for manual invocation, one can
// provide a precise test list via the 'wifi.HostapHwsim.runArgs'
// var.
var testArgs = []string{
"--vm",
}
defaultTestList := s.Param().([]string)
var runArgs []string
if testList, ok := s.Var("wifi.HostapHwsim.runArgs"); ok {
runArgs = append(testArgs, strings.Fields(testList)...)
} else {
runArgs = append(testArgs, defaultTestList...)
}
s.Log("Preparing wpa_supplicant and shill")
m, err := shill.NewManager(ctx)
if err != nil {
s.Fatal("Failed to connect to shill Manager: ", err)
}
origProhibited, err := getProhibited(ctx, m)
if err != nil {
s.Fatal("Failed to get ProhibitedTechnologies: ", err)
}
var alreadyProhibited bool
// We don't want shill to manage any WiFi devices created by this test.
for _, t := range origProhibited {
if t == string(shill.TechnologyWifi) {
alreadyProhibited = true
}
}
prohibited := origProhibited
if !alreadyProhibited {
prohibited = append(prohibited, string(shill.TechnologyWifi))
}
if err := setProhibited(ctx, m, prohibited); err != nil {
s.Fatal("Could not prohibit WiFi from shill: ", err)
}
defer func() {
// Reset to original prohibition list.
if err := setProhibited(fullCtx, m, origProhibited); err != nil {
s.Error("Could not reset shill prohibited technologies: ", err)
}
}()
// Get the system wpa_supplicant out of the way; hwsim tests spin up
// several of their own instances.
if err := upstart.StopJob(ctx, "wpasupplicant"); err != nil {
s.Fatal("Failed to stop wpasupplicant: ", err)
}
defer upstart.StartJob(fullCtx, "wpasupplicant")
s.Log("Running hwsim tests, args: ", runArgs)
cmd := testexec.CommandContext(ctx, "./run-all.sh", runArgs...)
// Hwsim tests like to run from their own directory.
cmd.Dir = "/usr/local/libexec/hostap/tests/hwsim"
// Log to the output directory, so they get captured for later
// analysis.
cmd.Env = append(os.Environ(), "LOGDIR="+s.OutDir())
stdout, err := cmd.StdoutPipe()
if err != nil {
s.Fatal("Failed to get stdout: ", err)
}
stderr, err := cmd.StderrPipe()
if err != nil {
s.Fatal("Failed to get stderr: ", err)
}
if err := cmd.Start(); err != nil {
s.Fatal("Failed to start test wrapper: ", err)
}
// Log stdout/stderr in real-time. These tests can take a little while,
// so the progress output is useful.
multi := io.MultiReader(stdout, stderr)
in := bufio.NewScanner(multi)
for in.Scan() {
s.Log(in.Text())
}
if err := in.Err(); err != nil {
s.Error("Scanner error: ", err)
}
if err := cmd.Wait(); err != nil {
s.Fatal("Hwsim tests failed (see result logs for more info): ", err)
}
}