1
0
mirror of https://github.com/mjg59/python-broadlink.git synced 2024-11-22 15:10:12 +01:00

Merge pull request #506 from felipediel/revert-retry-intvl

Revert retry_intvl
This commit is contained in:
Felipe Martins Diel 2021-01-12 16:43:33 -03:00 committed by GitHub
commit cc1aa03203
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
2 changed files with 7 additions and 7 deletions

View File

@ -262,7 +262,7 @@ class device:
"""Return device type."""
return self.type
def send_packet(self, command: int, payload: bytes, retry_intvl: float = 1.0) -> bytes:
def send_packet(self, command: int, payload: bytes) -> bytes:
"""Send a packet to the device."""
self.count = ((self.count + 1) | 0x8000) & 0xFFFF
packet = bytearray(0x38)
@ -315,7 +315,7 @@ class device:
while True:
time_left = timeout - (time.time() - start_time)
conn.settimeout(min(retry_intvl, time_left))
conn.settimeout(min(1, time_left))
conn.sendto(packet, self.host)
try:

View File

@ -13,10 +13,10 @@ class rm(device):
device.__init__(self, *args, **kwargs)
self.type = "RM2"
def _send(self, command: int, data: bytes = b'', retry_intvl: float = 1.0) -> bytes:
def _send(self, command: int, data: bytes = b'') -> bytes:
"""Send a packet to the device."""
packet = struct.pack("<I", command) + data
resp = self.send_packet(0x6A, packet, retry_intvl=retry_intvl)
resp = self.send_packet(0x6A, packet)
check_error(resp[0x22:0x24])
payload = self.decrypt(resp[0x38:])
return payload[0x4:]
@ -27,7 +27,7 @@ class rm(device):
def send_data(self, data: bytes) -> None:
"""Send a code to the device."""
self._send(0x2, data=data, retry_intvl=5)
self._send(0x2, data)
def enter_learning(self) -> None:
"""Enter infrared learning mode."""
@ -71,10 +71,10 @@ class rm4(rm):
device.__init__(self, *args, **kwargs)
self.type = "RM4"
def _send(self, command: int, data: bytes = b'', retry_intvl: float = 1.0) -> bytes:
def _send(self, command: int, data: bytes = b'') -> bytes:
"""Send a packet to the device."""
packet = struct.pack("<HI", len(data) + 4, command) + data
resp = self.send_packet(0x6A, packet, retry_intvl=retry_intvl)
resp = self.send_packet(0x6A, packet)
check_error(resp[0x22:0x24])
payload = self.decrypt(resp[0x38:])
p_len = struct.unpack("<H", payload[:0x2])[0]