2020-01-30 17:15:02 +00:00
|
|
|
#!/usr/bin/env python3
|
2017-07-22 15:12:15 +01:00
|
|
|
#
|
|
|
|
# This file is part of the MicroPython project, http://micropython.org/
|
|
|
|
#
|
|
|
|
# The MIT License (MIT)
|
|
|
|
#
|
2021-04-21 02:00:43 +01:00
|
|
|
# Copyright (c) 2014-2021 Damien P. George
|
2017-10-07 22:04:57 +01:00
|
|
|
# Copyright (c) 2017 Paul Sokolovsky
|
2017-07-22 15:12:15 +01:00
|
|
|
#
|
|
|
|
# Permission is hereby granted, free of charge, to any person obtaining a copy
|
|
|
|
# of this software and associated documentation files (the "Software"), to deal
|
|
|
|
# in the Software without restriction, including without limitation the rights
|
|
|
|
# to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
|
|
|
# copies of the Software, and to permit persons to whom the Software is
|
|
|
|
# furnished to do so, subject to the following conditions:
|
|
|
|
#
|
|
|
|
# The above copyright notice and this permission notice shall be included in
|
|
|
|
# all copies or substantial portions of the Software.
|
|
|
|
#
|
|
|
|
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
|
|
|
# IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
|
|
|
# FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
|
|
|
# AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
|
|
|
# LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
|
|
|
# OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
|
|
|
|
# THE SOFTWARE.
|
2014-10-26 15:39:22 +00:00
|
|
|
|
2014-03-24 12:42:06 +00:00
|
|
|
"""
|
|
|
|
pyboard interface
|
|
|
|
|
|
|
|
This module provides the Pyboard class, used to communicate with and
|
2017-10-07 22:04:57 +01:00
|
|
|
control a MicroPython device over a communication channel. Both real
|
|
|
|
boards and emulated devices (e.g. running in QEMU) are supported.
|
|
|
|
Various communication channels are supported, including a serial
|
|
|
|
connection, telnet-style network connection, external process
|
|
|
|
connection.
|
2014-03-24 12:42:06 +00:00
|
|
|
|
|
|
|
Example usage:
|
|
|
|
|
|
|
|
import pyboard
|
|
|
|
pyb = pyboard.Pyboard('/dev/ttyACM0')
|
2015-06-28 13:01:27 +01:00
|
|
|
|
|
|
|
Or:
|
|
|
|
|
|
|
|
pyb = pyboard.Pyboard('192.168.1.1')
|
|
|
|
|
|
|
|
Then:
|
|
|
|
|
2014-03-24 12:42:06 +00:00
|
|
|
pyb.enter_raw_repl()
|
2019-03-23 08:49:12 +00:00
|
|
|
pyb.exec('import pyb')
|
2014-05-03 18:14:34 +01:00
|
|
|
pyb.exec('pyb.LED(1).on()')
|
2014-03-24 12:42:06 +00:00
|
|
|
pyb.exit_raw_repl()
|
|
|
|
|
2015-08-08 13:03:08 +01:00
|
|
|
Note: if using Python2 then pyb.exec must be written as pyb.exec_.
|
2014-04-03 22:12:01 +01:00
|
|
|
To run a script from the local machine on the board and print out the results:
|
|
|
|
|
|
|
|
import pyboard
|
|
|
|
pyboard.execfile('test.py', device='/dev/ttyACM0')
|
|
|
|
|
2014-05-03 18:14:34 +01:00
|
|
|
This script can also be run directly. To execute a local script, use:
|
|
|
|
|
2014-10-26 15:39:22 +00:00
|
|
|
./pyboard.py test.py
|
|
|
|
|
|
|
|
Or:
|
|
|
|
|
2014-05-03 18:14:34 +01:00
|
|
|
python pyboard.py test.py
|
|
|
|
|
2014-03-24 12:42:06 +00:00
|
|
|
"""
|
|
|
|
|
2014-10-26 15:39:22 +00:00
|
|
|
import sys
|
2014-03-24 12:42:06 +00:00
|
|
|
import time
|
2017-04-04 15:46:02 +01:00
|
|
|
import os
|
2020-08-12 20:30:33 +01:00
|
|
|
import ast
|
2014-03-24 12:42:06 +00:00
|
|
|
|
2015-08-08 13:03:08 +01:00
|
|
|
try:
|
|
|
|
stdout = sys.stdout.buffer
|
|
|
|
except AttributeError:
|
|
|
|
# Python2 doesn't have buffer attr
|
|
|
|
stdout = sys.stdout
|
|
|
|
|
2020-02-27 04:36:53 +00:00
|
|
|
|
2015-04-19 21:31:28 +01:00
|
|
|
def stdout_write_bytes(b):
|
2015-11-07 09:11:12 +00:00
|
|
|
b = b.replace(b"\x04", b"")
|
2015-08-08 13:03:08 +01:00
|
|
|
stdout.write(b)
|
|
|
|
stdout.flush()
|
2015-04-19 21:31:28 +01:00
|
|
|
|
2020-02-27 04:36:53 +00:00
|
|
|
|
2018-08-05 00:45:02 +01:00
|
|
|
class PyboardError(Exception):
|
2014-04-13 13:48:33 +01:00
|
|
|
pass
|
|
|
|
|
2020-02-27 04:36:53 +00:00
|
|
|
|
2015-06-28 13:01:27 +01:00
|
|
|
class TelnetToSerial:
|
|
|
|
def __init__(self, ip, user, password, read_timeout=None):
|
2018-10-16 11:36:24 +01:00
|
|
|
self.tn = None
|
2015-06-28 13:01:27 +01:00
|
|
|
import telnetlib
|
2020-02-27 04:36:53 +00:00
|
|
|
|
2015-06-28 13:01:27 +01:00
|
|
|
self.tn = telnetlib.Telnet(ip, timeout=15)
|
|
|
|
self.read_timeout = read_timeout
|
|
|
|
if b"Login as:" in self.tn.read_until(b"Login as:", timeout=read_timeout):
|
|
|
|
self.tn.write(bytes(user, "ascii") + b"\r\n")
|
|
|
|
|
|
|
|
if b"Password:" in self.tn.read_until(b"Password:", timeout=read_timeout):
|
|
|
|
# needed because of internal implementation details of the telnet server
|
|
|
|
time.sleep(0.2)
|
|
|
|
self.tn.write(bytes(password, "ascii") + b"\r\n")
|
|
|
|
|
|
|
|
if b"for more information." in self.tn.read_until(
|
|
|
|
b'Type "help()" for more information.', timeout=read_timeout
|
|
|
|
):
|
2017-05-29 08:08:14 +01:00
|
|
|
# login successful
|
2015-06-28 13:01:27 +01:00
|
|
|
from collections import deque
|
2020-02-27 04:36:53 +00:00
|
|
|
|
2015-06-28 13:01:27 +01:00
|
|
|
self.fifo = deque()
|
|
|
|
return
|
|
|
|
|
|
|
|
raise PyboardError("Failed to establish a telnet connection with the board")
|
|
|
|
|
|
|
|
def __del__(self):
|
|
|
|
self.close()
|
|
|
|
|
|
|
|
def close(self):
|
2018-10-16 11:36:24 +01:00
|
|
|
if self.tn:
|
2015-06-28 13:01:27 +01:00
|
|
|
self.tn.close()
|
|
|
|
|
|
|
|
def read(self, size=1):
|
|
|
|
while len(self.fifo) < size:
|
|
|
|
timeout_count = 0
|
|
|
|
data = self.tn.read_eager()
|
|
|
|
if len(data):
|
|
|
|
self.fifo.extend(data)
|
|
|
|
timeout_count = 0
|
|
|
|
else:
|
|
|
|
time.sleep(0.25)
|
|
|
|
if self.read_timeout is not None and timeout_count > 4 * self.read_timeout:
|
|
|
|
break
|
|
|
|
timeout_count += 1
|
|
|
|
|
|
|
|
data = b""
|
|
|
|
while len(data) < size and len(self.fifo) > 0:
|
|
|
|
data += bytes([self.fifo.popleft()])
|
|
|
|
return data
|
|
|
|
|
|
|
|
def write(self, data):
|
|
|
|
self.tn.write(data)
|
|
|
|
return len(data)
|
|
|
|
|
|
|
|
def inWaiting(self):
|
|
|
|
n_waiting = len(self.fifo)
|
|
|
|
if not n_waiting:
|
|
|
|
data = self.tn.read_eager()
|
|
|
|
self.fifo.extend(data)
|
|
|
|
return len(data)
|
|
|
|
else:
|
|
|
|
return n_waiting
|
|
|
|
|
2017-04-04 15:46:02 +01:00
|
|
|
|
|
|
|
class ProcessToSerial:
|
|
|
|
"Execute a process and emulate serial connection using its stdin/stdout."
|
|
|
|
|
|
|
|
def __init__(self, cmd):
|
|
|
|
import subprocess
|
2020-02-27 04:36:53 +00:00
|
|
|
|
2018-07-22 15:30:37 +01:00
|
|
|
self.subp = subprocess.Popen(
|
|
|
|
cmd,
|
|
|
|
bufsize=0,
|
|
|
|
shell=True,
|
|
|
|
preexec_fn=os.setsid,
|
2017-04-04 15:46:02 +01:00
|
|
|
stdin=subprocess.PIPE,
|
|
|
|
stdout=subprocess.PIPE,
|
|
|
|
)
|
|
|
|
|
|
|
|
# Initially was implemented with selectors, but that adds Python3
|
|
|
|
# dependency. However, there can be race conditions communicating
|
|
|
|
# with a particular child process (like QEMU), and selectors may
|
|
|
|
# still work better in that case, so left inplace for now.
|
|
|
|
#
|
|
|
|
# import selectors
|
|
|
|
# self.sel = selectors.DefaultSelector()
|
|
|
|
# self.sel.register(self.subp.stdout, selectors.EVENT_READ)
|
|
|
|
|
|
|
|
import select
|
2020-02-27 04:36:53 +00:00
|
|
|
|
2017-04-04 15:46:02 +01:00
|
|
|
self.poll = select.poll()
|
|
|
|
self.poll.register(self.subp.stdout.fileno())
|
|
|
|
|
|
|
|
def close(self):
|
|
|
|
import signal
|
2020-02-27 04:36:53 +00:00
|
|
|
|
2017-04-04 15:46:02 +01:00
|
|
|
os.killpg(os.getpgid(self.subp.pid), signal.SIGTERM)
|
|
|
|
|
|
|
|
def read(self, size=1):
|
|
|
|
data = b""
|
|
|
|
while len(data) < size:
|
|
|
|
data += self.subp.stdout.read(size - len(data))
|
|
|
|
return data
|
|
|
|
|
|
|
|
def write(self, data):
|
|
|
|
self.subp.stdin.write(data)
|
|
|
|
return len(data)
|
|
|
|
|
|
|
|
def inWaiting(self):
|
|
|
|
# res = self.sel.select(0)
|
|
|
|
res = self.poll.poll(0)
|
|
|
|
if res:
|
|
|
|
return 1
|
|
|
|
return 0
|
|
|
|
|
|
|
|
|
|
|
|
class ProcessPtyToTerminal:
|
|
|
|
"""Execute a process which creates a PTY and prints slave PTY as
|
|
|
|
first line of its output, and emulate serial connection using
|
|
|
|
this PTY."""
|
|
|
|
|
|
|
|
def __init__(self, cmd):
|
|
|
|
import subprocess
|
|
|
|
import re
|
|
|
|
import serial
|
2020-02-27 04:36:53 +00:00
|
|
|
|
2017-04-04 22:44:59 +01:00
|
|
|
self.subp = subprocess.Popen(
|
|
|
|
cmd.split(),
|
|
|
|
bufsize=0,
|
|
|
|
shell=False,
|
|
|
|
preexec_fn=os.setsid,
|
2017-04-04 15:46:02 +01:00
|
|
|
stdin=subprocess.PIPE,
|
|
|
|
stdout=subprocess.PIPE,
|
|
|
|
stderr=subprocess.PIPE,
|
|
|
|
)
|
|
|
|
pty_line = self.subp.stderr.readline().decode("utf-8")
|
|
|
|
m = re.search(r"/dev/pts/[0-9]+", pty_line)
|
|
|
|
if not m:
|
|
|
|
print("Error: unable to find PTY device in startup line:", pty_line)
|
|
|
|
self.close()
|
|
|
|
sys.exit(1)
|
|
|
|
pty = m.group()
|
2017-04-05 10:30:39 +01:00
|
|
|
# rtscts, dsrdtr params are to workaround pyserial bug:
|
|
|
|
# http://stackoverflow.com/questions/34831131/pyserial-does-not-play-well-with-virtual-port
|
|
|
|
self.ser = serial.Serial(pty, interCharTimeout=1, rtscts=True, dsrdtr=True)
|
2017-04-04 15:46:02 +01:00
|
|
|
|
|
|
|
def close(self):
|
|
|
|
import signal
|
2020-02-27 04:36:53 +00:00
|
|
|
|
2017-04-04 15:46:02 +01:00
|
|
|
os.killpg(os.getpgid(self.subp.pid), signal.SIGTERM)
|
|
|
|
|
|
|
|
def read(self, size=1):
|
|
|
|
return self.ser.read(size)
|
|
|
|
|
|
|
|
def write(self, data):
|
|
|
|
return self.ser.write(data)
|
|
|
|
|
|
|
|
def inWaiting(self):
|
|
|
|
return self.ser.inWaiting()
|
|
|
|
|
|
|
|
|
2014-03-24 12:42:06 +00:00
|
|
|
class Pyboard:
|
2021-04-21 02:00:43 +01:00
|
|
|
def __init__(
|
|
|
|
self, device, baudrate=115200, user="micro", password="python", wait=0, exclusive=True
|
|
|
|
):
|
2021-05-29 02:04:01 +01:00
|
|
|
self.in_raw_repl = False
|
2020-10-08 13:58:02 +01:00
|
|
|
self.use_raw_paste = True
|
2017-04-04 15:46:02 +01:00
|
|
|
if device.startswith("exec:"):
|
|
|
|
self.serial = ProcessToSerial(device[len("exec:") :])
|
|
|
|
elif device.startswith("execpty:"):
|
|
|
|
self.serial = ProcessPtyToTerminal(device[len("qemupty:") :])
|
|
|
|
elif device and device[0].isdigit() and device[-1].isdigit() and device.count(".") == 3:
|
2015-06-28 13:01:27 +01:00
|
|
|
# device looks like an IP address
|
|
|
|
self.serial = TelnetToSerial(device, user, password, read_timeout=10)
|
|
|
|
else:
|
|
|
|
import serial
|
2020-02-27 04:36:53 +00:00
|
|
|
|
2021-04-21 02:00:43 +01:00
|
|
|
# Set options, and exclusive if pyserial supports it
|
|
|
|
serial_kwargs = {"baudrate": baudrate, "interCharTimeout": 1}
|
|
|
|
if serial.__version__ >= "3.3":
|
|
|
|
serial_kwargs["exclusive"] = exclusive
|
|
|
|
|
2015-12-01 06:13:50 +00:00
|
|
|
delayed = False
|
|
|
|
for attempt in range(wait + 1):
|
|
|
|
try:
|
2021-04-21 02:00:43 +01:00
|
|
|
self.serial = serial.Serial(device, **serial_kwargs)
|
2015-12-01 06:13:50 +00:00
|
|
|
break
|
2015-12-08 12:55:28 +00:00
|
|
|
except (OSError, IOError): # Py2 and Py3 have different errors
|
2015-12-01 06:13:50 +00:00
|
|
|
if wait == 0:
|
|
|
|
continue
|
|
|
|
if attempt == 0:
|
|
|
|
sys.stdout.write("Waiting {} seconds for pyboard ".format(wait))
|
|
|
|
delayed = True
|
|
|
|
time.sleep(1)
|
|
|
|
sys.stdout.write(".")
|
|
|
|
sys.stdout.flush()
|
|
|
|
else:
|
|
|
|
if delayed:
|
|
|
|
print("")
|
|
|
|
raise PyboardError("failed to access " + device)
|
|
|
|
if delayed:
|
|
|
|
print("")
|
2014-03-24 12:42:06 +00:00
|
|
|
|
|
|
|
def close(self):
|
|
|
|
self.serial.close()
|
|
|
|
|
2014-10-26 15:39:22 +00:00
|
|
|
def read_until(self, min_num_bytes, ending, timeout=10, data_consumer=None):
|
2019-04-25 04:24:32 +01:00
|
|
|
# if data_consumer is used then data is not accumulated and the ending must be 1 byte long
|
|
|
|
assert data_consumer is None or len(ending) == 1
|
|
|
|
|
2014-04-14 01:47:36 +01:00
|
|
|
data = self.serial.read(min_num_bytes)
|
2014-10-26 15:39:22 +00:00
|
|
|
if data_consumer:
|
|
|
|
data_consumer(data)
|
2014-04-14 01:47:36 +01:00
|
|
|
timeout_count = 0
|
|
|
|
while True:
|
2014-10-26 15:39:22 +00:00
|
|
|
if data.endswith(ending):
|
2014-04-14 01:47:36 +01:00
|
|
|
break
|
2014-10-26 15:39:22 +00:00
|
|
|
elif self.serial.inWaiting() > 0:
|
|
|
|
new_data = self.serial.read(1)
|
|
|
|
if data_consumer:
|
|
|
|
data_consumer(new_data)
|
2019-04-25 04:24:32 +01:00
|
|
|
data = new_data
|
|
|
|
else:
|
|
|
|
data = data + new_data
|
2014-10-26 15:39:22 +00:00
|
|
|
timeout_count = 0
|
2014-04-14 01:47:36 +01:00
|
|
|
else:
|
|
|
|
timeout_count += 1
|
2015-07-29 00:21:22 +01:00
|
|
|
if timeout is not None and timeout_count >= 100 * timeout:
|
2014-04-14 01:47:36 +01:00
|
|
|
break
|
2015-07-25 22:49:25 +01:00
|
|
|
time.sleep(0.01)
|
2014-04-14 01:47:36 +01:00
|
|
|
return data
|
|
|
|
|
2021-05-29 02:21:19 +01:00
|
|
|
def enter_raw_repl(self, soft_reset=True):
|
2014-10-26 15:39:22 +00:00
|
|
|
self.serial.write(b"\r\x03\x03") # ctrl-C twice: interrupt any running program
|
2015-06-15 23:28:04 +01:00
|
|
|
|
|
|
|
# flush input (without relying on serial.flushInput())
|
|
|
|
n = self.serial.inWaiting()
|
|
|
|
while n > 0:
|
|
|
|
self.serial.read(n)
|
|
|
|
n = self.serial.inWaiting()
|
|
|
|
|
2014-03-24 12:42:06 +00:00
|
|
|
self.serial.write(b"\r\x01") # ctrl-A: enter raw REPL
|
2021-05-29 02:21:19 +01:00
|
|
|
|
|
|
|
if soft_reset:
|
|
|
|
data = self.read_until(1, b"raw REPL; CTRL-B to exit\r\n>")
|
|
|
|
if not data.endswith(b"raw REPL; CTRL-B to exit\r\n>"):
|
|
|
|
print(data)
|
|
|
|
raise PyboardError("could not enter raw repl")
|
|
|
|
|
|
|
|
self.serial.write(b"\x04") # ctrl-D: soft reset
|
|
|
|
|
|
|
|
# Waiting for "soft reboot" independently to "raw REPL" (done below)
|
|
|
|
# allows boot.py to print, which will show up after "soft reboot"
|
|
|
|
# and before "raw REPL".
|
|
|
|
data = self.read_until(1, b"soft reboot\r\n")
|
|
|
|
if not data.endswith(b"soft reboot\r\n"):
|
|
|
|
print(data)
|
|
|
|
raise PyboardError("could not enter raw repl")
|
|
|
|
|
2015-12-04 00:05:53 +00:00
|
|
|
data = self.read_until(1, b"raw REPL; CTRL-B to exit\r\n")
|
|
|
|
if not data.endswith(b"raw REPL; CTRL-B to exit\r\n"):
|
2014-03-24 12:42:06 +00:00
|
|
|
print(data)
|
2014-04-13 13:48:33 +01:00
|
|
|
raise PyboardError("could not enter raw repl")
|
2014-03-24 12:42:06 +00:00
|
|
|
|
2021-05-29 02:04:01 +01:00
|
|
|
self.in_raw_repl = True
|
|
|
|
|
2014-03-24 12:42:06 +00:00
|
|
|
def exit_raw_repl(self):
|
|
|
|
self.serial.write(b"\r\x02") # ctrl-B: enter friendly REPL
|
2021-05-29 02:04:01 +01:00
|
|
|
self.in_raw_repl = False
|
2014-03-24 12:42:06 +00:00
|
|
|
|
2014-11-30 21:30:53 +00:00
|
|
|
def follow(self, timeout, data_consumer=None):
|
2014-10-26 15:39:22 +00:00
|
|
|
# wait for normal output
|
2014-11-30 21:30:53 +00:00
|
|
|
data = self.read_until(1, b"\x04", timeout=timeout, data_consumer=data_consumer)
|
2014-10-26 15:39:22 +00:00
|
|
|
if not data.endswith(b"\x04"):
|
|
|
|
raise PyboardError("timeout waiting for first EOF reception")
|
|
|
|
data = data[:-1]
|
2014-03-24 12:42:06 +00:00
|
|
|
|
2014-10-26 15:39:22 +00:00
|
|
|
# wait for error output
|
2015-06-15 23:28:04 +01:00
|
|
|
data_err = self.read_until(1, b"\x04", timeout=timeout)
|
|
|
|
if not data_err.endswith(b"\x04"):
|
2014-10-26 15:39:22 +00:00
|
|
|
raise PyboardError("timeout waiting for second EOF reception")
|
2015-07-25 22:44:56 +01:00
|
|
|
data_err = data_err[:-1]
|
2014-10-26 15:39:22 +00:00
|
|
|
|
|
|
|
# return normal and error output
|
|
|
|
return data, data_err
|
|
|
|
|
2020-10-08 13:58:02 +01:00
|
|
|
def raw_paste_write(self, command_bytes):
|
|
|
|
# Read initial header, with window size.
|
|
|
|
data = self.serial.read(2)
|
|
|
|
window_size = data[0] | data[1] << 8
|
|
|
|
window_remain = window_size
|
|
|
|
|
|
|
|
# Write out the command_bytes data.
|
|
|
|
i = 0
|
|
|
|
while i < len(command_bytes):
|
|
|
|
while window_remain == 0 or self.serial.inWaiting():
|
|
|
|
data = self.serial.read(1)
|
|
|
|
if data == b"\x01":
|
|
|
|
# Device indicated that a new window of data can be sent.
|
|
|
|
window_remain += window_size
|
|
|
|
elif data == b"\x04":
|
|
|
|
# Device indicated abrupt end. Acknowledge it and finish.
|
|
|
|
self.serial.write(b"\x04")
|
|
|
|
return
|
|
|
|
else:
|
|
|
|
# Unexpected data from device.
|
|
|
|
raise PyboardError("unexpected read during raw paste: {}".format(data))
|
|
|
|
# Send out as much data as possible that fits within the allowed window.
|
|
|
|
b = command_bytes[i : min(i + window_remain, len(command_bytes))]
|
|
|
|
self.serial.write(b)
|
|
|
|
window_remain -= len(b)
|
|
|
|
i += len(b)
|
|
|
|
|
|
|
|
# Indicate end of data.
|
|
|
|
self.serial.write(b"\x04")
|
|
|
|
|
|
|
|
# Wait for device to acknowledge end of data.
|
|
|
|
data = self.read_until(1, b"\x04")
|
|
|
|
if not data.endswith(b"\x04"):
|
|
|
|
raise PyboardError("could not complete raw paste: {}".format(data))
|
|
|
|
|
2015-05-17 06:48:54 +01:00
|
|
|
def exec_raw_no_follow(self, command):
|
2014-10-19 14:54:52 +01:00
|
|
|
if isinstance(command, bytes):
|
|
|
|
command_bytes = command
|
|
|
|
else:
|
2015-04-19 21:31:28 +01:00
|
|
|
command_bytes = bytes(command, encoding="utf8")
|
2014-10-26 15:39:22 +00:00
|
|
|
|
2015-06-15 23:28:04 +01:00
|
|
|
# check we have a prompt
|
|
|
|
data = self.read_until(1, b">")
|
|
|
|
if not data.endswith(b">"):
|
|
|
|
raise PyboardError("could not enter raw repl")
|
|
|
|
|
2020-10-08 13:58:02 +01:00
|
|
|
if self.use_raw_paste:
|
|
|
|
# Try to enter raw-paste mode.
|
|
|
|
self.serial.write(b"\x05A\x01")
|
|
|
|
data = self.serial.read(2)
|
|
|
|
if data == b"R\x00":
|
|
|
|
# Device understood raw-paste command but doesn't support it.
|
|
|
|
pass
|
|
|
|
elif data == b"R\x01":
|
|
|
|
# Device supports raw-paste mode, write out the command using this mode.
|
|
|
|
return self.raw_paste_write(command_bytes)
|
|
|
|
else:
|
|
|
|
# Device doesn't support raw-paste, fall back to normal raw REPL.
|
|
|
|
data = self.read_until(1, b"w REPL; CTRL-B to exit\r\n>")
|
|
|
|
if not data.endswith(b"w REPL; CTRL-B to exit\r\n>"):
|
|
|
|
print(data)
|
|
|
|
raise PyboardError("could not enter raw repl")
|
|
|
|
# Don't try to use raw-paste mode again for this connection.
|
|
|
|
self.use_raw_paste = False
|
|
|
|
|
|
|
|
# Write command using standard raw REPL, 256 bytes every 10ms.
|
2014-12-20 18:09:04 +00:00
|
|
|
for i in range(0, len(command_bytes), 256):
|
|
|
|
self.serial.write(command_bytes[i : min(i + 256, len(command_bytes))])
|
2014-03-24 12:42:06 +00:00
|
|
|
time.sleep(0.01)
|
|
|
|
self.serial.write(b"\x04")
|
2014-10-26 15:39:22 +00:00
|
|
|
|
|
|
|
# check if we could exec command
|
2014-03-24 12:42:06 +00:00
|
|
|
data = self.serial.read(2)
|
|
|
|
if data != b"OK":
|
2017-10-05 21:40:19 +01:00
|
|
|
raise PyboardError("could not exec command (response: %r)" % data)
|
2014-10-26 15:39:22 +00:00
|
|
|
|
2015-05-17 06:48:54 +01:00
|
|
|
def exec_raw(self, command, timeout=10, data_consumer=None):
|
|
|
|
self.exec_raw_no_follow(command)
|
2014-11-30 21:30:53 +00:00
|
|
|
return self.follow(timeout, data_consumer)
|
2014-10-26 15:39:22 +00:00
|
|
|
|
|
|
|
def eval(self, expression):
|
2015-08-08 13:03:08 +01:00
|
|
|
ret = self.exec_("print({})".format(expression))
|
2014-10-26 15:39:22 +00:00
|
|
|
ret = ret.strip()
|
|
|
|
return ret
|
|
|
|
|
2019-07-10 07:48:37 +01:00
|
|
|
def exec_(self, command, data_consumer=None):
|
|
|
|
ret, ret_err = self.exec_raw(command, data_consumer=data_consumer)
|
2014-10-26 15:39:22 +00:00
|
|
|
if ret_err:
|
|
|
|
raise PyboardError("exception", ret, ret_err)
|
|
|
|
return ret
|
2014-04-03 22:12:01 +01:00
|
|
|
|
|
|
|
def execfile(self, filename):
|
2015-04-19 21:31:28 +01:00
|
|
|
with open(filename, "rb") as f:
|
2014-04-03 22:12:01 +01:00
|
|
|
pyfile = f.read()
|
2015-08-08 13:03:08 +01:00
|
|
|
return self.exec_(pyfile)
|
2014-03-24 12:42:06 +00:00
|
|
|
|
|
|
|
def get_time(self):
|
2015-04-19 21:31:28 +01:00
|
|
|
t = str(self.eval("pyb.RTC().datetime()"), encoding="utf8")[1:-1].split(", ")
|
2014-04-21 20:18:37 +01:00
|
|
|
return int(t[4]) * 3600 + int(t[5]) * 60 + int(t[6])
|
2014-03-24 12:42:06 +00:00
|
|
|
|
2019-07-10 07:48:37 +01:00
|
|
|
def fs_ls(self, src):
|
|
|
|
cmd = (
|
|
|
|
"import uos\nfor f in uos.ilistdir(%s):\n"
|
|
|
|
" print('{:12} {}{}'.format(f[3]if len(f)>3 else 0,f[0],'/'if f[1]&0x4000 else ''))"
|
|
|
|
% (("'%s'" % src) if src else "")
|
2020-02-27 04:36:53 +00:00
|
|
|
)
|
2019-07-10 07:48:37 +01:00
|
|
|
self.exec_(cmd, data_consumer=stdout_write_bytes)
|
|
|
|
|
|
|
|
def fs_cat(self, src, chunk_size=256):
|
|
|
|
cmd = (
|
|
|
|
"with open('%s') as f:\n while 1:\n"
|
|
|
|
" b=f.read(%u)\n if not b:break\n print(b,end='')" % (src, chunk_size)
|
2020-02-27 04:36:53 +00:00
|
|
|
)
|
2019-07-10 07:48:37 +01:00
|
|
|
self.exec_(cmd, data_consumer=stdout_write_bytes)
|
|
|
|
|
|
|
|
def fs_get(self, src, dest, chunk_size=256):
|
|
|
|
self.exec_("f=open('%s','rb')\nr=f.read" % src)
|
|
|
|
with open(dest, "wb") as f:
|
|
|
|
while True:
|
|
|
|
data = bytearray()
|
|
|
|
self.exec_("print(r(%u))" % chunk_size, data_consumer=lambda d: data.extend(d))
|
|
|
|
assert data.endswith(b"\r\n\x04")
|
2020-08-12 20:30:33 +01:00
|
|
|
try:
|
|
|
|
data = ast.literal_eval(str(data[:-3], "ascii"))
|
|
|
|
if not isinstance(data, bytes):
|
|
|
|
raise ValueError("Not bytes")
|
|
|
|
except (UnicodeError, ValueError) as e:
|
|
|
|
raise PyboardError("fs_get: Could not interpret received data: %s" % str(e))
|
2019-07-10 07:48:37 +01:00
|
|
|
if not data:
|
|
|
|
break
|
|
|
|
f.write(data)
|
|
|
|
self.exec_("f.close()")
|
|
|
|
|
|
|
|
def fs_put(self, src, dest, chunk_size=256):
|
|
|
|
self.exec_("f=open('%s','wb')\nw=f.write" % dest)
|
|
|
|
with open(src, "rb") as f:
|
|
|
|
while True:
|
|
|
|
data = f.read(chunk_size)
|
|
|
|
if not data:
|
|
|
|
break
|
|
|
|
if sys.version_info < (3,):
|
|
|
|
self.exec_("w(b" + repr(data) + ")")
|
|
|
|
else:
|
|
|
|
self.exec_("w(" + repr(data) + ")")
|
|
|
|
self.exec_("f.close()")
|
|
|
|
|
|
|
|
def fs_mkdir(self, dir):
|
|
|
|
self.exec_("import uos\nuos.mkdir('%s')" % dir)
|
|
|
|
|
|
|
|
def fs_rmdir(self, dir):
|
|
|
|
self.exec_("import uos\nuos.rmdir('%s')" % dir)
|
|
|
|
|
|
|
|
def fs_rm(self, src):
|
|
|
|
self.exec_("import uos\nuos.remove('%s')" % src)
|
|
|
|
|
2020-02-27 04:36:53 +00:00
|
|
|
|
2015-08-08 13:03:08 +01:00
|
|
|
# in Python2 exec is a keyword so one must use "exec_"
|
|
|
|
# but for Python3 we want to provide the nicer version "exec"
|
|
|
|
setattr(Pyboard, "exec", Pyboard.exec_)
|
|
|
|
|
2020-02-27 04:36:53 +00:00
|
|
|
|
2015-06-28 13:01:27 +01:00
|
|
|
def execfile(filename, device="/dev/ttyACM0", baudrate=115200, user="micro", password="python"):
|
|
|
|
pyb = Pyboard(device, baudrate, user, password)
|
2014-04-03 22:12:01 +01:00
|
|
|
pyb.enter_raw_repl()
|
|
|
|
output = pyb.execfile(filename)
|
2015-04-19 21:31:28 +01:00
|
|
|
stdout_write_bytes(output)
|
2014-04-03 22:12:01 +01:00
|
|
|
pyb.exit_raw_repl()
|
|
|
|
pyb.close()
|
|
|
|
|
2020-02-27 04:36:53 +00:00
|
|
|
|
2019-07-10 07:48:37 +01:00
|
|
|
def filesystem_command(pyb, args):
|
|
|
|
def fname_remote(src):
|
|
|
|
if src.startswith(":"):
|
|
|
|
src = src[1:]
|
|
|
|
return src
|
2020-02-27 04:36:53 +00:00
|
|
|
|
2019-07-10 07:48:37 +01:00
|
|
|
def fname_cp_dest(src, dest):
|
|
|
|
src = src.rsplit("/", 1)[-1]
|
|
|
|
if dest is None or dest == "":
|
|
|
|
dest = src
|
|
|
|
elif dest == ".":
|
|
|
|
dest = "./" + src
|
|
|
|
elif dest.endswith("/"):
|
|
|
|
dest += src
|
|
|
|
return dest
|
|
|
|
|
|
|
|
cmd = args[0]
|
|
|
|
args = args[1:]
|
|
|
|
try:
|
|
|
|
if cmd == "cp":
|
|
|
|
srcs = args[:-1]
|
|
|
|
dest = args[-1]
|
|
|
|
if srcs[0].startswith("./") or dest.startswith(":"):
|
|
|
|
op = pyb.fs_put
|
|
|
|
fmt = "cp %s :%s"
|
|
|
|
dest = fname_remote(dest)
|
|
|
|
else:
|
|
|
|
op = pyb.fs_get
|
|
|
|
fmt = "cp :%s %s"
|
|
|
|
for src in srcs:
|
|
|
|
src = fname_remote(src)
|
|
|
|
dest2 = fname_cp_dest(src, dest)
|
|
|
|
print(fmt % (src, dest2))
|
|
|
|
op(src, dest2)
|
|
|
|
else:
|
|
|
|
op = {
|
|
|
|
"ls": pyb.fs_ls,
|
|
|
|
"cat": pyb.fs_cat,
|
|
|
|
"mkdir": pyb.fs_mkdir,
|
|
|
|
"rmdir": pyb.fs_rmdir,
|
|
|
|
"rm": pyb.fs_rm,
|
|
|
|
}[cmd]
|
|
|
|
if cmd == "ls" and not args:
|
|
|
|
args = [""]
|
|
|
|
for src in args:
|
|
|
|
src = fname_remote(src)
|
|
|
|
print("%s :%s" % (cmd, src))
|
|
|
|
op(src)
|
|
|
|
except PyboardError as er:
|
|
|
|
print(str(er.args[2], "ascii"))
|
|
|
|
pyb.exit_raw_repl()
|
|
|
|
pyb.close()
|
|
|
|
sys.exit(1)
|
|
|
|
|
2020-02-27 04:36:53 +00:00
|
|
|
|
2019-12-11 03:56:33 +00:00
|
|
|
_injected_import_hook_code = """\
|
|
|
|
import uos, uio
|
|
|
|
class _FS:
|
|
|
|
class File(uio.IOBase):
|
|
|
|
def __init__(self):
|
|
|
|
self.off = 0
|
|
|
|
def ioctl(self, request, arg):
|
|
|
|
return 0
|
|
|
|
def readinto(self, buf):
|
|
|
|
buf[:] = memoryview(_injected_buf)[self.off:self.off + len(buf)]
|
|
|
|
self.off += len(buf)
|
|
|
|
return len(buf)
|
|
|
|
mount = umount = chdir = lambda *args: None
|
|
|
|
def stat(self, path):
|
|
|
|
if path == '_injected.mpy':
|
|
|
|
return tuple(0 for _ in range(10))
|
|
|
|
else:
|
|
|
|
raise OSError(-2) # ENOENT
|
|
|
|
def open(self, path, mode):
|
|
|
|
return self.File()
|
|
|
|
uos.mount(_FS(), '/_')
|
|
|
|
uos.chdir('/_')
|
|
|
|
from _injected import *
|
|
|
|
uos.umount('/_')
|
|
|
|
del _injected_buf, _FS
|
|
|
|
"""
|
|
|
|
|
2020-02-27 04:36:53 +00:00
|
|
|
|
2014-05-03 18:14:34 +01:00
|
|
|
def main():
|
|
|
|
import argparse
|
2020-02-27 04:36:53 +00:00
|
|
|
|
2014-05-03 18:14:34 +01:00
|
|
|
cmd_parser = argparse.ArgumentParser(description="Run scripts on the pyboard.")
|
2015-06-28 13:01:27 +01:00
|
|
|
cmd_parser.add_argument(
|
2020-03-25 17:31:18 +00:00
|
|
|
"-d",
|
2015-06-28 13:01:27 +01:00
|
|
|
"--device",
|
2020-03-25 17:23:01 +00:00
|
|
|
default=os.environ.get("PYBOARD_DEVICE", "/dev/ttyACM0"),
|
2015-06-28 13:01:27 +01:00
|
|
|
help="the serial device or the IP address of the pyboard",
|
|
|
|
)
|
|
|
|
cmd_parser.add_argument(
|
2020-03-25 17:23:01 +00:00
|
|
|
"-b",
|
|
|
|
"--baudrate",
|
|
|
|
default=os.environ.get("PYBOARD_BAUDRATE", "115200"),
|
|
|
|
help="the baud rate of the serial device",
|
2020-02-27 04:36:53 +00:00
|
|
|
)
|
2015-06-28 13:01:27 +01:00
|
|
|
cmd_parser.add_argument("-u", "--user", default="micro", help="the telnet login username")
|
|
|
|
cmd_parser.add_argument("-p", "--password", default="python", help="the telnet login password")
|
2015-07-31 05:25:43 +01:00
|
|
|
cmd_parser.add_argument("-c", "--command", help="program passed in as string")
|
2015-12-01 06:13:50 +00:00
|
|
|
cmd_parser.add_argument(
|
|
|
|
"-w",
|
|
|
|
"--wait",
|
|
|
|
default=0,
|
|
|
|
type=int,
|
|
|
|
help="seconds to wait for USB connected board to become available",
|
|
|
|
)
|
2021-08-25 02:27:07 +01:00
|
|
|
group = cmd_parser.add_mutually_exclusive_group()
|
|
|
|
group.add_argument(
|
2021-06-25 09:51:27 +01:00
|
|
|
"--soft-reset",
|
|
|
|
default=True,
|
2021-08-25 02:27:07 +01:00
|
|
|
action="store_true",
|
|
|
|
help="Whether to perform a soft reset when connecting to the board [default]",
|
|
|
|
)
|
|
|
|
group.add_argument(
|
|
|
|
"--no-soft-reset",
|
|
|
|
action="store_false",
|
|
|
|
dest="soft_reset",
|
2021-06-25 09:51:27 +01:00
|
|
|
)
|
2021-08-25 02:06:25 +01:00
|
|
|
group = cmd_parser.add_mutually_exclusive_group()
|
2019-12-28 19:38:27 +00:00
|
|
|
group.add_argument(
|
|
|
|
"--follow",
|
|
|
|
action="store_true",
|
2021-08-25 02:25:01 +01:00
|
|
|
default=None,
|
2019-12-28 19:38:27 +00:00
|
|
|
help="follow the output after running the scripts [default if no scripts given]",
|
|
|
|
)
|
|
|
|
group.add_argument(
|
|
|
|
"--no-follow",
|
2021-08-25 02:25:01 +01:00
|
|
|
action="store_false",
|
|
|
|
dest="follow",
|
2019-07-10 07:48:37 +01:00
|
|
|
)
|
2021-08-25 02:25:43 +01:00
|
|
|
group = cmd_parser.add_mutually_exclusive_group()
|
|
|
|
group.add_argument(
|
|
|
|
"--exclusive",
|
2021-04-21 02:00:43 +01:00
|
|
|
action="store_true",
|
2021-08-25 02:25:43 +01:00
|
|
|
default=True,
|
|
|
|
help="Open the serial device for exclusive access [default]",
|
|
|
|
)
|
|
|
|
group.add_argument(
|
|
|
|
"--no-exclusive",
|
|
|
|
action="store_false",
|
|
|
|
dest="exclusive",
|
2021-04-21 02:00:43 +01:00
|
|
|
)
|
2019-07-10 07:48:37 +01:00
|
|
|
cmd_parser.add_argument(
|
2021-02-12 11:15:43 +00:00
|
|
|
"-f",
|
|
|
|
"--filesystem",
|
|
|
|
action="store_true",
|
|
|
|
help="perform a filesystem action: "
|
|
|
|
"cp local :device | cp :device local | cat path | ls [path] | rm path | mkdir path | rmdir path",
|
2020-02-27 04:36:53 +00:00
|
|
|
)
|
2014-05-03 18:14:34 +01:00
|
|
|
cmd_parser.add_argument("files", nargs="*", help="input files")
|
|
|
|
args = cmd_parser.parse_args()
|
|
|
|
|
2016-12-15 00:29:33 +00:00
|
|
|
# open the connection to the pyboard
|
|
|
|
try:
|
2021-04-21 02:00:43 +01:00
|
|
|
pyb = Pyboard(
|
2021-08-25 02:25:43 +01:00
|
|
|
args.device, args.baudrate, args.user, args.password, args.wait, args.exclusive
|
2021-04-21 02:00:43 +01:00
|
|
|
)
|
2016-12-15 00:29:33 +00:00
|
|
|
except PyboardError as er:
|
|
|
|
print(er)
|
|
|
|
sys.exit(1)
|
|
|
|
|
|
|
|
# run any command or file(s)
|
2019-07-10 07:48:37 +01:00
|
|
|
if args.command is not None or args.filesystem or len(args.files):
|
2016-12-15 00:29:33 +00:00
|
|
|
# we must enter raw-REPL mode to execute commands
|
|
|
|
# this will do a soft-reset of the board
|
2014-10-26 15:39:22 +00:00
|
|
|
try:
|
2021-06-25 09:51:27 +01:00
|
|
|
pyb.enter_raw_repl(args.soft_reset)
|
2014-10-26 15:39:22 +00:00
|
|
|
except PyboardError as er:
|
|
|
|
print(er)
|
2017-04-02 18:46:32 +01:00
|
|
|
pyb.close()
|
2014-10-26 15:39:22 +00:00
|
|
|
sys.exit(1)
|
2015-07-31 05:25:43 +01:00
|
|
|
|
2016-12-15 00:29:33 +00:00
|
|
|
def execbuffer(buf):
|
|
|
|
try:
|
2021-08-25 02:25:01 +01:00
|
|
|
if args.follow is None or args.follow:
|
2019-12-28 19:38:27 +00:00
|
|
|
ret, ret_err = pyb.exec_raw(
|
|
|
|
buf, timeout=None, data_consumer=stdout_write_bytes
|
|
|
|
)
|
2021-08-25 02:25:01 +01:00
|
|
|
else:
|
|
|
|
pyb.exec_raw_no_follow(buf)
|
|
|
|
ret_err = None
|
2016-12-15 00:29:33 +00:00
|
|
|
except PyboardError as er:
|
|
|
|
print(er)
|
2017-04-02 18:46:32 +01:00
|
|
|
pyb.close()
|
2016-12-15 00:29:33 +00:00
|
|
|
sys.exit(1)
|
|
|
|
except KeyboardInterrupt:
|
|
|
|
sys.exit(1)
|
|
|
|
if ret_err:
|
|
|
|
pyb.exit_raw_repl()
|
|
|
|
pyb.close()
|
|
|
|
stdout_write_bytes(ret_err)
|
|
|
|
sys.exit(1)
|
|
|
|
|
2019-07-10 07:48:37 +01:00
|
|
|
# do filesystem commands, if given
|
|
|
|
if args.filesystem:
|
|
|
|
filesystem_command(pyb, args.files)
|
2020-01-28 19:55:44 +00:00
|
|
|
del args.files[:]
|
2019-07-10 07:48:37 +01:00
|
|
|
|
2016-12-15 00:29:33 +00:00
|
|
|
# run the command, if given
|
|
|
|
if args.command is not None:
|
|
|
|
execbuffer(args.command.encode("utf-8"))
|
|
|
|
|
|
|
|
# run any files
|
|
|
|
for filename in args.files:
|
|
|
|
with open(filename, "rb") as f:
|
|
|
|
pyfile = f.read()
|
2019-12-11 03:56:33 +00:00
|
|
|
if filename.endswith(".mpy") and pyfile[0] == ord("M"):
|
|
|
|
pyb.exec_("_injected_buf=" + repr(pyfile))
|
|
|
|
pyfile = _injected_import_hook_code
|
2016-12-15 00:29:33 +00:00
|
|
|
execbuffer(pyfile)
|
|
|
|
|
|
|
|
# exiting raw-REPL just drops to friendly-REPL mode
|
|
|
|
pyb.exit_raw_repl()
|
|
|
|
|
|
|
|
# if asked explicitly, or no files given, then follow the output
|
2019-07-10 07:48:37 +01:00
|
|
|
if args.follow or (args.command is None and not args.filesystem and len(args.files) == 0):
|
2014-10-26 15:39:22 +00:00
|
|
|
try:
|
2015-05-07 10:14:51 +01:00
|
|
|
ret, ret_err = pyb.follow(timeout=None, data_consumer=stdout_write_bytes)
|
2014-10-26 15:39:22 +00:00
|
|
|
except PyboardError as er:
|
|
|
|
print(er)
|
|
|
|
sys.exit(1)
|
|
|
|
except KeyboardInterrupt:
|
|
|
|
sys.exit(1)
|
|
|
|
if ret_err:
|
2016-12-15 00:29:33 +00:00
|
|
|
pyb.close()
|
2015-04-19 21:31:28 +01:00
|
|
|
stdout_write_bytes(ret_err)
|
2014-10-26 15:39:22 +00:00
|
|
|
sys.exit(1)
|
2014-05-03 18:14:34 +01:00
|
|
|
|
2016-12-15 00:29:33 +00:00
|
|
|
# close the connection to the pyboard
|
|
|
|
pyb.close()
|
|
|
|
|
2020-02-27 04:36:53 +00:00
|
|
|
|
2014-03-24 12:42:06 +00:00
|
|
|
if __name__ == "__main__":
|
2014-05-03 18:14:34 +01:00
|
|
|
main()
|