Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update PSOC6 postbuild prints #9892

Merged
merged 1 commit into from Mar 1, 2019
Merged

Update PSOC6 postbuild prints #9892

merged 1 commit into from Mar 1, 2019

Conversation

orenc17
Copy link
Contributor

@orenc17 orenc17 commented Feb 28, 2019

Description

  • Change the way a PSA target is detected
  • Print a full path of the m0 image we are hooking with

Pull request type

[ ] Fix
[X] Refactor
[ ] Target update
[ ] Functionality change
[ ] Docs update
[ ] Test update
[ ] Breaking change

Reviewers

Release Notes

@ciarmcom ciarmcom requested review from a team February 28, 2019 18:00
@ciarmcom
Copy link
Member

@orenc17, thank you for your changes.
@ARMmbed/mbed-os-tools @ARMmbed/mbed-os-maintainers please review.

m0hexf = next((f for f in hex_files if os.path.basename(f) == os.path.basename(hexf)), m0hexf)

if m0hexf:
toolchain.notify.debug("M0 core image file found: %s." % os.path.basename(m0hexf))
toolchain.notify.info("M0 core image file found: %s." % m0hexf)
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Any particular reason for 'debug' -> 'info'?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It is critical for the user to know which m0 image is merged with the application
Info always prints the message, debug only in verbose mode

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Sweet. That's what I figured.

@cmonr
Copy link
Contributor

cmonr commented Feb 28, 2019

CI started

@mbed-ci
Copy link

mbed-ci commented Mar 1, 2019

Test run: SUCCESS

Summary: 13 of 13 test jobs passed
Build number : 1
Build artifacts

@@ -120,13 +120,13 @@ def find_cm0_image(toolchain, resources, elf, hexf, hex_filename):
from tools.resources import FileType
hex_files = resources.get_file_paths(FileType.HEX)
m0hexf = next((f for f in hex_files if os.path.basename(f) == hex_filename), None)
if toolchain.target.name.endswith('_PSA'):
if toolchain.target.is_PSA_non_secure_target:
Copy link
Contributor

@cmonr cmonr Mar 1, 2019

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Making sure before the big green button is pressed.

https://github.com/ARMmbed/mbed-os/blob/master/targets/targets.json#L8043

The only current valid target for this is the FUTURE_SEQUANA_PSA correct? Not FUTURE_SEQUANA_M0_PSA?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

find_cm0_image is only executed for M4 targets (those with hex_filename set in targets.json). Therefore, toolchain.target.name.endswith('_PSA') is true only for FUTURE_SEQUANA_PSA, hence this change is safe.

@0xc0170
Copy link
Contributor

0xc0170 commented Mar 1, 2019

cc @ARMmbed/team-cypress

@0xc0170 0xc0170 merged commit 7ed16fb into ARMmbed:master Mar 1, 2019
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

6 participants