WS2812B LED-Stripes and Matrix

Monday, June 24. 2019

I'm rather fond of WS2812B 'Neopixel' led strips and the elgant, minimalistic construction it allows in combination with Nodemcu as the controller. It takes a fat power source (like Meanwell ) connected to the red and white power cables of the strip, on the 3 connections at the data cable of the strip the nodemcu is hooked in with Vin to red, GND to black and the yellow cable to one of  the Nodemcu's data pins. Add a program on the Nodemcu that supports mosquitto, OTA updates and makes use of the FastLED library to control the leds and you are ready to go.

Create your own effects or adapt something open sourced by others - a search on 'ws2812b fastled effect' is a nice start. The prices are moderate, not far from what a Phillips Hue Ledstrip (2m, 36 LED elements) will cost you for 5m of LED strip with 300 Led elements.

Those LED strips come in a number of variants, 30 or 60 (or even 144) leds per meter, IP65 water resistant ones that come with an adhesive back side (an anti-feature for me) and IP67 ones in a silicone tube. The matrix is special, it is a 16cmx16cm plate with 16x16 LEDs mounted on it, connected into a single line that sort of zig-zags over the plate, the first row in a left to right orientation, the second row right to left and then left to right again... You can search and select from the rich supply of 16x16 pixel art left over from console game programming, format the image files to fit with the zig-zag orientation of the matrix and you have a flexible display for retro style icons.

There are some videos on youtube how to create that which I found really helpful even when I ended doing things in a slightly different way. Once everything has been installed and set up the question comes up how to get new icons to display (web search and considerable afterwork) and how to obtain the rgb information for the pic in the correct order. There is another tutorial for that recommending a program lcd-image converter and manually merging rows of pixel data. That program is even available for Arch Linus but unfortunately it crahes a lot. And the manual merging of image data isn't really a viable option.

After some fruitless trials along those lines I came up with my own solution in the form a tiny bash script using image magick's convert which creates an array of rgb values in the right order from a supplied 16x16 .bmp file.


#!/bin/bash

# convert banane.bmp rgb:- | xxd -g3 -c48

#echo $0 $1

`convert $1 rgb:- | xxd -g3 -c48 > ccxx.tmp`

t=0

input="./ccxx.tmp"
while IFS= read -r line
do
  a=( $line )
  var=$((var+1))
  #echo "$line"
  if (( $var % 2 )); then
     echo 0x${a[16]}, 0x${a[15]}, 0x${a[14]}, 0x${a[13]}, 0x${a[12]}, 0x${a[11]}, 0x${a[10]}, 0x${a[9]}, 0x${a[8]}, 0x${a[7]}, 0x${a[6]}, 0x${a[5]}, 0x${a[4]}, 0x${a[3]}, 0x${a[2]}, 0x${a[1]},
  else
     echo 0x${a[1]}, 0x${a[2]}, 0x${a[3]}, 0x${a[4]}, 0x${a[5]}, 0x${a[6]}, 0x${a[7]}, 0x${a[8]}, 0x${a[9]}, 0x${a[10]}, 0x${a[11]}, 0x${a[12]}, 0x${a[13]}, 0x${a[14]}, 0x${a[15]}, 0x${a[16]},
  fi
done < "$input"
 

The process is not perfect though, for some reason the colors often turn out quite different on the lcd display than what they looked on the monitor and I ended with several loops of edit and copy again. I'll end this with 3 pixel arrays as a bonus:

const long herz[]  =
{
0x000000, 0x000000, 0x000000, 0x000000, 0x000000, 0x000000, 0x000000, 0x000000, 0x000000, 0x000000, 0x000000, 0x000000, 0x000000, 0x000000, 0x000000, 0x000000,
0x000000, 0x000000, 0x000000, 0x000000, 0x000000, 0x000000, 0x000000, 0x000000, 0x000000, 0x000000, 0x000000, 0x000000, 0x000000, 0x000000, 0x000000, 0x000000,
0x000000, 0x000000, 0x330000, 0xcc0000, 0xcc0000, 0x330000, 0x000000, 0x000000, 0x000000, 0x000000, 0x330000, 0xcc0000, 0xcc0000, 0x330000, 0x000000, 0x000000,
0x000000, 0x660000, 0xcc3333, 0xcc3333, 0xcc0000, 0xcc0000, 0x660000, 0x000000, 0x000000, 0x660000, 0xcc0000, 0xcc0000, 0xcc0000, 0xcc0000, 0x330000, 0x000000,
0xcc0000, 0xff0000, 0xff0000, 0xff0000, 0xff0000, 0xff0000, 0xcc0000, 0x990000, 0x660000, 0xcc0000, 0xff0000, 0xff3333, 0xffcccc, 0xffffff, 0xcc3333, 0x330000,
0xcc0000, 0xcc3333, 0xffcccc, 0xff3333, 0xff0000, 0xff0000, 0xff0000, 0xff0000, 0xff0000, 0xff0000, 0xff0000, 0xff0000, 0xff0000, 0xff0000, 0xff0000, 0xff0000,
0xff0000, 0xff0000, 0xff0000, 0xff0000, 0xff0000, 0xff0000, 0xff0000, 0xff0000, 0xff0000, 0xff0000, 0xff0000, 0xff0000, 0xff0000, 0xff0000, 0xcc0000, 0xcc0000,
0x330000, 0xcc0000, 0xff0000, 0xff0000, 0xff0000, 0xff0000, 0xff0000, 0xff0000, 0xff0000, 0xff0000, 0xff0000, 0xff0000, 0xff0000, 0xff0000, 0xcc0000, 0x000000,
0x000000, 0x000000, 0xcc0000, 0xff0000, 0xff0000, 0xff0000, 0xff0000, 0xff0000, 0xff0000, 0xff0000, 0xff0000, 0xff0000, 0xff0000, 0xcc0000, 0x330000, 0x000000,
0x000000, 0x000000, 0x330000, 0xcc0000, 0xff0000, 0xff0000, 0xff0000, 0xff0000, 0xff0000, 0xff0000, 0xff0000, 0xff0000, 0xcc0000, 0x000000, 0x000000, 0x000000,
0x000000, 0x000000, 0x000000, 0x000000, 0xcc0000, 0xff0000, 0xff0000, 0xff0000, 0xff0000, 0xff0000, 0xff0000, 0xcc0000, 0x330000, 0x000000, 0x000000, 0x000000,
0x000000, 0x000000, 0x000000, 0x000000, 0x330000, 0xcc0000, 0xff0000, 0xff0000, 0xff0000, 0xff0000, 0xcc0000, 0x000000, 0x000000, 0x000000, 0x000000, 0x000000,
0x000000, 0x000000, 0x000000, 0x000000, 0x000000, 0x000000, 0xcc0000, 0xff0000, 0xff0000, 0xcc0000, 0x330000, 0x000000, 0x000000, 0x000000, 0x000000, 0x000000,
0x000000, 0x000000, 0x000000, 0x000000, 0x000000, 0x000000, 0x330000, 0xcc0000, 0xcc0000, 0x000000, 0x000000, 0x000000, 0x000000, 0x000000, 0x000000, 0x000000,
0x000000, 0x000000, 0x000000, 0x000000, 0x000000, 0x000000, 0x000000, 0x000000, 0xff0000, 0x000000, 0x000000, 0x000000, 0x000000, 0x000000, 0x000000, 0x000000,
0x000000, 0x000000, 0x000000, 0x000000, 0x000000, 0x000000, 0x000000, 0x000000, 0x000000, 0x000000, 0x000000, 0x000000, 0x000000, 0x000000, 0x000000, 0x000000
};

const long cool_smiley[]  =
{
0x000000, 0x000000, 0x000000, 0x000000, 0x000000, 0x332001, 0x835601, 0xa87204, 0xa57005, 0x7f5601, 0x271700, 0x000000, 0x000000, 0x000000, 0x000000, 0x000000,
0x000000, 0x000000, 0x000000, 0x472e00, 0xc28814, 0xb77a08, 0xb77a08, 0xb77a08, 0xb77a08, 0xb77a08, 0xb77a08, 0xc28916, 0x4d3201, 0x000000, 0x000000, 0x000000,
0x000000, 0x000000, 0x694602, 0xb77a08, 0xb77a08, 0xb77a08, 0xb77a08, 0xb77a08, 0xb77a08, 0xb77a08, 0xb77a08, 0xb77a08, 0xb77a08, 0x634102, 0x000000, 0x000000,
0x000000, 0x402800, 0xb77a08, 0xb77a08, 0xb77b08, 0xb57804, 0xb57804, 0xb77a08, 0xb77a08, 0xb77a08, 0xb77a08, 0xb77a08, 0xb77a08, 0xb77a08, 0x4d3201, 0x000000,
0x000000, 0xb8841a, 0xa29878, 0x807342, 0x9e843a, 0x9f863e, 0xa38c45, 0xb67a07, 0xb67a07, 0xa18b47, 0x9e853d, 0x9e853d, 0x8b815d, 0xa49b7f, 0xb88114, 0x000000,
0x543906, 0x685932, 0x6b6553, 0x31280f, 0x31280f, 0x31280f, 0x31280f, 0x31280f, 0x342b13, 0x31280f, 0x31280f, 0x31280f, 0x31280f, 0x000000, 0x4f4220, 0x503907,
0x5a3d02, 0xbdad7f, 0x000000, 0x000000, 0x31280f, 0x31280f, 0x31280f, 0xb77a08, 0xb77a08, 0x000000, 0x000000, 0x31280f, 0x31280f, 0x31280f, 0xb77a08, 0x986702,
0xb97b04, 0xb77a08, 0x716330, 0x000000, 0x000000, 0x000000, 0x473f28, 0xb77a08, 0xb77a08, 0x473f28, 0x000000, 0x000000, 0x000000, 0x473f28, 0xc28814, 0xc28814,
0xc28814, 0xb77a08, 0xb77a08, 0xb77a08, 0xb77a08, 0xb77a08, 0xb77a08, 0xb77a08, 0xb77a08, 0xb77a08, 0xb77a08, 0xb77a08, 0xb77a08, 0xb77a08, 0xb77a08, 0xb47804,
0x986702, 0xb77a08, 0xb77a08, 0xb77a08, 0xb77a08, 0xb77a08, 0xb77a08, 0xb77a08, 0xb77a08, 0xb77a08, 0xb77a08, 0xb77a08, 0xb77a08, 0xb77a08, 0xb77a08, 0x5c3e02,
0x452e01, 0xb77a08, 0xb77a08, 0xb77a08, 0x473f28, 0xb77a08, 0xb77a08, 0xb77a08, 0xb77a08, 0xb77a08, 0x473f28, 0xb77a08, 0xb77a08, 0xb77a08, 0xb77a08, 0x402800,
0x000000, 0xb77a08, 0xb77a08, 0xb77a08, 0xb77a08, 0x473f28, 0x473f28, 0xb77a08, 0xb77a08, 0xb77a08, 0x473f28, 0x473f28, 0xb77a08, 0xb77a08, 0xc38b18, 0x000000,
0x000000, 0x5c3d02, 0xb77a08, 0xb77a08, 0xb77a08, 0x473f28, 0x473f28, 0x473f28, 0x473f28, 0x473f28, 0xb77a08, 0xb77a08, 0xb77a08, 0xb77a08, 0x4d3201, 0x000000,
0x000000, 0x000000, 0x694602, 0xc28814, 0xb77a08, 0xb77a08, 0xb77a08, 0xb77a08, 0xb77a08, 0xb77a08, 0xb77a08, 0xb77a08, 0xb77a08, 0x694602, 0x000000, 0x000000,
0x000000, 0x000000, 0x000000, 0x533802, 0xc48c18, 0xb77a08, 0xb77a08, 0xc28814, 0xb77a08, 0xb77a08, 0xb77a08, 0xb77a08, 0x4d3201, 0x000000, 0x000000, 0x000000,
0x000000, 0x000000, 0x000000, 0x000000, 0x000000, 0x472e00, 0xa16d03, 0xbd7f04, 0xbd7f04, 0xa56f03, 0x533802, 0x000000, 0x000000, 0x000000, 0x000000, 0x000000
  };


const long om[]  =
{

0x000000, 0x000000, 0x000000, 0x000000, 0x000000, 0x8a0001, 0x900001, 0x050000, 0x000000, 0x000000, 0x000000, 0x000000, 0x000000, 0x000000, 0x000000, 0x000000,
0x000000, 0x000000, 0x000000, 0x000000, 0x000000, 0x000000, 0x3b0000, 0x5f0000, 0x000000, 0xef0002, 0xee0002, 0x000000, 0x1f0000, 0x290000, 0x000000, 0x000000,
0x000000, 0x2c0000, 0xbe0001, 0xc20001, 0x000000, 0x000000, 0x000000, 0x950001, 0xc40001, 0x000000, 0x000000, 0x000000, 0x000000, 0x000000, 0x000000, 0x000000,
0x000000, 0x000000, 0x320000, 0x860001, 0xb70001, 0xc80001, 0x990001, 0x000000, 0xeb0002, 0xd70001, 0xd40001, 0xea0002, 0xfa0002, 0xed0002, 0x770000, 0x000000,
0x000000, 0x000000, 0x000000, 0x000000, 0xea0002, 0xf00002, 0xe50002, 0x000000, 0x4e0000, 0xfa0002, 0xfa0002, 0xfa0002, 0xf60002, 0xcf0001, 0x460000, 0x000000,
0x000000, 0x340000, 0xd30001, 0xf70002, 0xdf0002, 0x770000, 0xd90001, 0xf30002, 0x750000, 0x000000, 0x000000, 0x000000, 0xd60001, 0xb80001, 0x4e0000, 0x000000,
0x340000, 0xc70001, 0xda0001, 0xe90002, 0xfa0002, 0xe50002, 0x000000, 0x4e0000, 0xe60002, 0x6c0000, 0x000000, 0x000000, 0x8b0001, 0x6b0000, 0x000000, 0x000000,
0x000000, 0x000000, 0x000000, 0x000000, 0x770000, 0xa10001, 0xd40001, 0xc80001, 0x2b0000, 0xc20001, 0xfa0002, 0xe50002, 0x6c0000, 0x260000, 0xbf0001, 0x770000,
0xbf0001, 0x9d0001, 0x000000, 0x000000, 0x940001, 0xf40002, 0xf30002, 0x9a0001, 0x7f0000, 0xe90002, 0xfa0002, 0xe80002, 0x520000, 0x000000, 0x000000, 0x370000,
0x970001, 0x000000, 0x000000, 0x030000, 0xab0001, 0xe80002, 0xf00002, 0xf00002, 0xe80002, 0xe00002, 0xab0001, 0x1e0000, 0x000000, 0x000000, 0xa20001, 0xcf0001,
0xcb0001, 0xd30001, 0x380000, 0x000000, 0x000000, 0x000000, 0x000000, 0xc70001, 0xe60002, 0x740000, 0x000000, 0x1f0000, 0x000000, 0x000000, 0x6f0000, 0xb30001,
0x9f0001, 0xbb0001, 0x0f0000, 0x000000, 0x000000, 0x000000, 0x000000, 0xca0001, 0xe10002, 0x000000, 0xc30001, 0x6a0000, 0x000000, 0xc80001, 0xf80002, 0x770000,
0x000000, 0xf10002, 0xfa0002, 0xf40002, 0xf20002, 0xf10002, 0x000000, 0xe20002, 0xe50002, 0x6a0000, 0x060000, 0x010000, 0x3b0000, 0x9e0001, 0xe20002, 0x600000,
0x050000, 0xae0001, 0xf40002, 0xe10002, 0xcd0001, 0xd00001, 0xea0002, 0xfa0002, 0xc60001, 0x310000, 0xbe0001, 0xf70002, 0xfa0002, 0xf20002, 0x4e0000, 0x130000,
0x000000, 0x190000, 0x000000, 0x9d0001, 0x870001, 0x310000, 0x000000, 0x000000, 0xe10002, 0xfa0002, 0xfa0002, 0xfa0002, 0xf40002, 0xba0001, 0x330000, 0x000000,
0x000000, 0x000000, 0x1e0000, 0x4e0000, 0xba0001, 0xc70001, 0xb10001, 0x4e0000, 0x000000, 0x000000, 0x000000, 0x000000, 0x000000, 0x000000, 0x000000, 0x000000

};

 

 

 

rfid-tags for presence detection in smarthome

Wednesday, November 28. 2018

Pressence detection is vital in a smarthome setup, lights should go out when I leave and on when I come home.  But presence detection is not trivial, you can not rely on PIR motion sensors since they often do false positives. You can not rely on pinging the smartphone when it connects to the WLAN because phones have sleep modes to save energy and you'll find your phone regarded as absent when it sits next to you on your desk. Even owntracks and tasker provide solutions which work sometimes and fail later. .

And, more often then I like, I have to search for my keys before leaving the house. Now this is how I try to catch two flies with one stone:

I bought a RC522 rfid reader to integrate it into my smarthome IoT.
Most of the stuff you can find for those, both software and things, follows the idea of access control.
That is:

  • the thing with the reader waits in front of a door and controls a lock. User comes, holds a keycard at the reader, is denied or allowed, puts the keycard back in their pocket and enters...

My use case is different, more like what you may find in a hotel:

  • the thing with the reader waits behind the door and the user is supposed to insert the key card into the reader and leave it there. The reader identifies the key card and informs the smarthome controler that the owner of that key card is at home so it's time to turn on the lights and enable all the features that will be turned off again when the key card is taken out of the reader, later.

For this to work the key card (those blue drop shaped ones with a key chain ring you get with the reader) has to be in close range of the reader in a stable position, in other words, some sort of pocket is needed.

 

rfid-boxThe box is a remix of something I found searching thingiverse and sits at https://www.thingiverse.com/thing:3242266

It's printed in fast mode and with elements into all directions the slicer added lots of support which was hard to get off, you can see ht the box suffered from it.

Anyways, this cheap RC522 rfid reader which set me back by about 6€ sits in this box I printed, with a pocket to insert the chip and thus hold my keys at a defined place. The reader, connected to an Nodemcu V2 microcontroller identifies the chip, thus knows it's me who is at home and reports this to the smarthome controller. When I leave the house and take my keys the reader creates a new event and the system knows I'm out.

On the software side again there are plenty of example sketches for access control where the reader idles until you put a key card in its range, then the card is analysed, the result is given and the thing idles on. There is no event when the card is taken away.

So I had to write my own sketch for that, too. Again it is a remix.
It runs on an arduino clone and it creates an event when a known key card is entered, and another event when that card is taken out.

Since my smarthome is controlled by openHab2 which has a very usable rest api there is some code to report those events to it.
The sketch is part of the thingiverse file bundle linked above.

openHab2 startup chaos

Thursday, October 25. 2018

starting and stopping openhab2 is a messy affair, filling the logs with loads of Java's verbose exception messages and since the order of loaded models is basically random things may or may not work as intended when items have not been loaded or rules not executed that are assumed to be there.

As it was, manual corrections and reloads were needed after each restart.

There is an elegant workaround discussed at community.openhab.org/t/cleaning-up-the-startup-process-renaming-rules-windows-possible/38438/9 which uses systemd's ExecStartPre and ExecStartPost commands to deactivate all rules before starting openhab, and then reactivate them one by one when the system is up and has it's feet on the ground.

It did not work exactly like described there for me, but I still found a solution that has cleaned up the messy startup here.

A small bash script does the renaming. I put it in /etc/openhab2 next to openhab's configuration into a new folder /exec-scripts:

#!/bin/bash
#######################
#
# clean up the start process 
#  starting rules in a sorted manner after openhab2 got it's feet on the ground
#  called from systemd pre start 
#  to rename *.rules away initially 
#
#  synopsis: move_rules_at_start.sh org-extension new-extension (POST)
#  
#  first call is from
#  /etc/systemd/system/openhab2.service.d/override.conf
#
#  called from the running openhab again to rename them back one by one
#
# $3 allows to distinguish between pre and post action 
#
# REF: https://community.openhab.org/t/cleaning-up-the-startup-process-renaming-rules-windows-possible/38438/9


ORG=$1
NEW=$2
THX=$3
DUR=1
IGNORE=005_start.rules

for f in /etc/openhab2/rules/*.${ORG};
do
    CURRENT=$(basename $f)
    if [ "$CURRENT" == "$IGNORE" ]    
    then
        echo "ignoring $IGNORE"
    else
        OLDFILE=$f
        NEWFILE=${f%$ORG}$NEW
        mv "$OLDFILE" "$NEWFILE"
    fi
    # let some time between each load
    if [ "$THX" == "POST" ]
    then
        /bin/sleep $DUR
    fi
done

# some things left on startup
if [ "$THX" == "POST" ]
then
    /usr/bin/touch /etc/openhab2/things/tradfri.things
fi


Since the openhab2.service file is part of the package and thus is replaced with each update modifying the .service file would need to be repeated whenever a new version gets installed, but, systemd provides a way to override a service definition. systemctl edit openhab2.service creates an override dir and opens the editor to allow creating a service file that is not replaced by the next update.

Now don't try to copy the entire .service file, systemd will complain duplicated statements. My override.conf looks like this:

[Service]
ExecStartPre=/etc/openhab2/exec-scripts/move_rules_at_start.sh rules rules_

The third element is a .rules file in openhab2 that triggers the renaming of all the other .rules once the system is running. It is excepted from the renaming and I named it 005_start.rules. This works for me:


var rulesDelayed
var nada

rule "triggered by system start"
when 
    System started
then
    var duration = 1
    rulesDelayed = createTimer(now.plusMinutes(duration), [|
					logInfo("rulesDelayed", "Timer expired and start")
					nada=executeCommandLine("/bin/bash /etc/openhab2/exec-scripts/move_rules_at_start.sh rules_ rules POST ",90000)
                    logInfo("rulesDelayed", "result: "+nada)
					rulesDelayed = null

				])
    logInfo("rulesDelayed", "Timer set on "+duration+" min")
end


The bash script works the list of rules -files in an alphanumerical order so a naming scheme like praefixing all .rules with a three digit number finally allows to control the order of rules loading.

Startup is much faster now, less or no exceptions and a much cleaner log :-) Openhab is a Java application and those exceptions are super-ugly and come with a performance penalty.

You'll notice that the bash script supports an optional 3. parmeter to distinguish between pre- and post-action and that a certain config file is touched after the renaming. touch-ing triggers a reload of that config file and this was a workaround for a bug in the tradfri-addon, the bug may have been addressed by now.

TimeStamp in mosquitto.log

Monday, September 24. 2018

 mosquitto gibt jedem Log-Eintrag einen TimeStamp im für Maschinen recht praktischen Aekunden-seit-Epoche - Format. Für menschliche augen ist diese Angabe eher sperrig.

Mit perl und ccze (macht's bunt) kann man die Ausgabe etwas aufhübschen:

tail -n2000 -f  mosquitto/mosquitto.log |  perl -pe 's/(\d+)/localtime($1)/e'| ccze -m ansi

 

Presence Detection in WLAN

Sunday, September 9. 2018

 I was not content with the network/pingdevice based presence detection openhab2 offers. While it finds and detects smarphones connect to the wlan, it soon gets beaten by some energy-savong sleep modes, so the device does not ping. It may still respond to arping, though.

The following script is used on a linux router with several interfaces where a device miight be reachable. It can be configured from a settings.ini, reads it's sc an targets from a different ini file and reports it's findings via openHab's REST api.

settings.ini:

[settings]
baseUrl=http://koel.intern:8080/rest/items/
interval=30
interfaces=eth0,eth2


baseUrl points to the REST api of the openHab2 server, interfaces is a comma separated list of the interface/s that should get scanned and interval gives the number of seconds the scanner will sleep between to scans

scan.ini:

[feng]
item=presence_feng
MAC=C0:EE:FB:43:A8:ED

[goldAmmer]
item=presence_goldammer
MAC=192.168.123.11


[ente]
item=presence_ente
MAC=192.168.123.99


Each device has its own section with the section name acting as the unique id of the device, item is the openHab item (expected to be a Switch) that should get the result (ON or OFF) and MAC has the MAC or IP of the device 

The scanner is done in python (2.7)
arpscan.py:

#!/usr/bin/env python
#############################

import ConfigParser
import string
import os
import subprocess
import time
import sys

conf={}
devices={}
interfaces=""
scantext=""
grace=3

def get_script_path():
   return os.path.dirname(os.path.realpath(sys.argv[0]))
        
def LoadConfig(file, config={}):
   """
   returns a dictionary with keys of the form
   <section>.<option> and the corresponding values
   """
   config = config.copy(  )
   cp = ConfigParser.ConfigParser(  )
   cp.read(file)
   for sec in cp.sections(  ):
       name = string.lower(sec)
       obj  = { }
       for opt in cp.options(sec):
           obj[string.lower(opt)] = string.strip(
               cp.get(sec, opt))
       config[name]=obj
   return config

def ScanThings():
       scantext=""
       for interface in interfaces:
           p = subprocess.Popen(["arp-scan","-l","-q","-r","3", "-I", interface], stdout=subprocess.PIPE)
           output, err = p.communicate()
           scantext += output
                
       for key in devices:
           device=devices[key]
           url=conf['settings']['baseurl']+device['item']
           if device["mac"].lower() in scantext.lower():
               print key+" ja"
               val = "ON"
               device["tap"]=0
           else:
               print key+" nein"
               device["tap"] = device.get("tap", 0) + 1
               if device["tap"] <= grace:
                   print key+" tap: "+str(device["tap"])
                   val="na"
               else:
                   val="OFF"
                    
           if val != "na":         
               os.system('/usr/bin/curl --silent --header "Content-Type: text/plain" --request POST --data '+val+' '+url)


conf=LoadConfig(get_script_path()+"/"+"settings.ini", conf)
devices=LoadConfig(get_script_path()+"/"+"scan.ini",devices)

interfaces=conf['settings']['interfaces'].split(",")


while 1:
   ScanThings()
   time.sleep(float(conf['settings']['interval']))

 

           

 

           

The script is most useful when run as a daemon. You can easily do this with systemd which uses .service files found in /lib/systemd/system/

arpscan.service:

[Unit]
Description=Run arpscan device detection
After=multi-user.target
 
[Service]
Type=simple
ExecStart=/usr/bin/python /usr/local/bin/presence/arpscan.py
Restart=on-abort
 
[Install]
WantedBy=multi-user.target

The scanner reads settings and scan data, runs an arpscan on each configured interface and finally searches the specified MAC (or IP, just one of the two is needed) in the result.
it needs the linux arp-scan package to be installed, which you can test and confirm by running

arp-scan -l -I eth0

from the commandline. It needs to be run as root.

Some devices may show up oscillating between on and off, to get more stable results the script waits for a number of fails before the "OFF" result is sent. This can be finetuned by the value for grace. 

 

(Page 1 of 2, totaling 7 entries) » next page