Compare commits
2 Commits
c72ca2daf9
...
0860e6d023
Author | SHA1 | Date | |
---|---|---|---|
0860e6d023 | |||
1bc736cd01 |
25
README.md
25
README.md
@@ -2,11 +2,36 @@
|
||||
|
||||
Controls the welcome room Vestaboard directly, bypassing their cloud.
|
||||
|
||||

|
||||
|
||||
## Theory
|
||||
|
||||
Polls URL (https://api.my.protospace.ca/stats/) continuously and looks for
|
||||
changes to the `vestaboard` key. When updated, it replaces any special
|
||||
characters and then displays the message on the sign via serial.
|
||||
|
||||
If you want to use this, just call `send_sign(text)` in protoflap.py directly.
|
||||
|
||||
The split flap controller is connected to serial at `/dev/ttyAMA0`, 38400 baud.
|
||||
|
||||
### See Also
|
||||
|
||||
@Benno1308's reverse engineering:
|
||||
|
||||
https://github.com/EngineOwningSoftware/Vestaboard-Reverse-Engineering
|
||||
|
||||
https://www.reddit.com/r/Vestaboard/comments/tjm93n/local_device_api/
|
||||
|
||||
## Setup
|
||||
|
||||
Download the Vestaboard root private key. It should be the same for all
|
||||
Vestaboards:
|
||||
|
||||
```
|
||||
$ curl https://files.catbox.moe/kvibj6 > ~/.ssh/vestaboard
|
||||
$ chmod 600 ~/.ssh/vestaboard
|
||||
```
|
||||
|
||||
SSH into the Vestaboard using the root key, ie:
|
||||
|
||||
```
|
||||
|
BIN
media/signpic.jpg
Normal file
BIN
media/signpic.jpg
Normal file
Binary file not shown.
After Width: | Height: | Size: 109 KiB |
Reference in New Issue
Block a user