also should mention that python-libpcap is dependent on the libpcap C 
libraries.

On Sunday, November 6, 2016 at 10:11:15 AM UTC-6, Jerome Helbert wrote:
>
> I looked over the commit, looks good. I will try to get a chance to pull 
> it down and try it out later today.
>
> When I was first writing this stuff into the hackulink driver (and every 
> time I would do a system reinstall) I found there a range of python pcap 
> modules, and they had APIs that all varied. I would recommend adding the 
> specific python module that I called out in my other thread to make 
> installs easier.
>
> On Sunday, November 6, 2016 at 8:54:14 AM UTC-6, mwall wrote:
>>
>> On Saturday, November 5, 2016 at 10:24:08 PM UTC-4, Jerome Helbert wrote:
>>>
>>> I posted a modified version of the interceptor a few weeks ago, I used 
>>> the libpcap libraries to sniff the data stream directly (no need to run 
>>> tcpdump or ngrep or any of that external to the driver. 
>>>
>>>>
>>>>>>>>>
>> jerome,
>>
>> i merged your pcap changes into the interceptor driver at commit 59f09a6 
>> (driver version 0.15).  do you mind giving it a try?
>>
>> you will need a configuration something like this:
>>
>> [Interceptor]
>>     driver = user.interceptor
>>     device_type = acurite-bridge
>>     mode = sniff
>>     iface = eth0
>>     filter = src host X && dst port Y and greater 61
>>
>> plus a sensor map if you have anything beyond just a single 5n1 sensor 
>> cluster.
>>
>> the implementation should be general enough to work with the os lw30x and 
>> fine offset hardware too, but those will probably need some adjustments to 
>> the pcap data parsing.
>>
>> m 
>>
>

-- 
You received this message because you are subscribed to the Google Groups 
"weewx-user" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to weewx-user+unsubscr...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to