I looked over the commit, looks good. I will try to get a chance to pull it down and try it out later today.
When I was first writing this stuff into the hackulink driver (and every time I would do a system reinstall) I found there a range of python pcap modules, and they had APIs that all varied. I would recommend adding the specific python module that I called out in my other thread to make installs easier. On Sunday, November 6, 2016 at 8:54:14 AM UTC-6, mwall wrote: > > On Saturday, November 5, 2016 at 10:24:08 PM UTC-4, Jerome Helbert wrote: >> >> I posted a modified version of the interceptor a few weeks ago, I used >> the libpcap libraries to sniff the data stream directly (no need to run >> tcpdump or ngrep or any of that external to the driver. >> >>> >>>>>>>> > jerome, > > i merged your pcap changes into the interceptor driver at commit 59f09a6 > (driver version 0.15). do you mind giving it a try? > > you will need a configuration something like this: > > [Interceptor] > driver = user.interceptor > device_type = acurite-bridge > mode = sniff > iface = eth0 > filter = src host X && dst port Y and greater 61 > > plus a sensor map if you have anything beyond just a single 5n1 sensor > cluster. > > the implementation should be general enough to work with the os lw30x and > fine offset hardware too, but those will probably need some adjustments to > the pcap data parsing. > > m > -- You received this message because you are subscribed to the Google Groups "weewx-user" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. For more options, visit https://groups.google.com/d/optout.
