I looked over the commit, looks good. I will try to get a chance to pull it 
down and try it out later today.

When I was first writing this stuff into the hackulink driver (and every 
time I would do a system reinstall) I found there a range of python pcap 
modules, and they had APIs that all varied. I would recommend adding the 
specific python module that I called out in my other thread to make 
installs easier.

On Sunday, November 6, 2016 at 8:54:14 AM UTC-6, mwall wrote:
>
> On Saturday, November 5, 2016 at 10:24:08 PM UTC-4, Jerome Helbert wrote:
>>
>> I posted a modified version of the interceptor a few weeks ago, I used 
>> the libpcap libraries to sniff the data stream directly (no need to run 
>> tcpdump or ngrep or any of that external to the driver. 
>>
>>>
>>>>>>>>
> jerome,
>
> i merged your pcap changes into the interceptor driver at commit 59f09a6 
> (driver version 0.15).  do you mind giving it a try?
>
> you will need a configuration something like this:
>
> [Interceptor]
>     driver = user.interceptor
>     device_type = acurite-bridge
>     mode = sniff
>     iface = eth0
>     filter = src host X && dst port Y and greater 61
>
> plus a sensor map if you have anything beyond just a single 5n1 sensor 
> cluster.
>
> the implementation should be general enough to work with the os lw30x and 
> fine offset hardware too, but those will probably need some adjustments to 
> the pcap data parsing.
>
> m 
>

-- 
You received this message because you are subscribed to the Google Groups 
"weewx-user" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/d/optout.

Reply via email to