also should mention that python-libpcap is dependent on the libpcap C libraries.
On Sunday, November 6, 2016 at 10:11:15 AM UTC-6, Jerome Helbert wrote: > > I looked over the commit, looks good. I will try to get a chance to pull > it down and try it out later today. > > When I was first writing this stuff into the hackulink driver (and every > time I would do a system reinstall) I found there a range of python pcap > modules, and they had APIs that all varied. I would recommend adding the > specific python module that I called out in my other thread to make > installs easier. > > On Sunday, November 6, 2016 at 8:54:14 AM UTC-6, mwall wrote: >> >> On Saturday, November 5, 2016 at 10:24:08 PM UTC-4, Jerome Helbert wrote: >>> >>> I posted a modified version of the interceptor a few weeks ago, I used >>> the libpcap libraries to sniff the data stream directly (no need to run >>> tcpdump or ngrep or any of that external to the driver. >>> >>>> >>>>>>>>> >> jerome, >> >> i merged your pcap changes into the interceptor driver at commit 59f09a6 >> (driver version 0.15). do you mind giving it a try? >> >> you will need a configuration something like this: >> >> [Interceptor] >> driver = user.interceptor >> device_type = acurite-bridge >> mode = sniff >> iface = eth0 >> filter = src host X && dst port Y and greater 61 >> >> plus a sensor map if you have anything beyond just a single 5n1 sensor >> cluster. >> >> the implementation should be general enough to work with the os lw30x and >> fine offset hardware too, but those will probably need some adjustments to >> the pcap data parsing. >> >> m >> > -- You received this message because you are subscribed to the Google Groups "weewx-user" group. To unsubscribe from this group and stop receiving emails from it, send an email to weewx-user+unsubscr...@googlegroups.com. For more options, visit https://groups.google.com/d/optout.