From 141ac67901b7f37fe1d7bc12dfa85fe95b86fca2 Mon Sep 17 00:00:00 2001 From: Jonathan Rico Date: Mon, 15 Aug 2022 13:25:17 +0200 Subject: [PATCH] remove `recover` function was only needed for the case where CTRL-AP was secured on nRF53 Signed-off-by: Jonathan Rico --- targettest/targettest/devkit.py | 12 ------------ targettest/targettest/provision.py | 2 +- 2 files changed, 1 insertion(+), 13 deletions(-) diff --git a/targettest/targettest/devkit.py b/targettest/targettest/devkit.py index 753be81..4a80248 100644 --- a/targettest/targettest/devkit.py +++ b/targettest/targettest/devkit.py @@ -39,8 +39,6 @@ def select_core(api, core): @contextmanager def SeggerDevice(family='UNKNOWN', id=None, core='APP'): with SeggerEmulator(family, id, core=core) as api: - print(f'[{id}] connecting...') - try: api.connect_to_device() except APIError.APIError as e: @@ -182,16 +180,6 @@ def get_serial_port(id): # on nRF53 DKs. return api.enum_emu_com_ports(id)[-1].path -def recover(id, family): - with SeggerEmulator(family, id) as api: - print(f'[{id}] recover') - if family != 'NRF52': - select_core(api, 'NET') - api.recover() - - select_core(api, 'APP') - api.recover() - def flash(id, family, hex_path, core='APP', reset=True): with SeggerDevice(family, id, core) as cpu: print(f'[{id}] [{family}-{core}] Flashing with {str(hex_path)}') diff --git a/targettest/targettest/provision.py b/targettest/targettest/provision.py index b24fcc8..d56d9df 100644 --- a/targettest/targettest/provision.py +++ b/targettest/targettest/provision.py @@ -2,7 +2,7 @@ import time import pathlib from contextlib import contextmanager -from targettest.devkit import Devkit, recover, flash, reset +from targettest.devkit import Devkit, flash, reset from targettest.uart_channel import UARTRPCChannel