Compare commits
3 Commits
c72ca2daf9
...
master
| Author | SHA1 | Date | |
|---|---|---|---|
| 71d7b4ba19 | |||
| 0860e6d023 | |||
| 1bc736cd01 |
27
README.md
27
README.md
@@ -2,11 +2,36 @@
|
||||
|
||||
Controls the welcome room Vestaboard directly, bypassing their cloud.
|
||||
|
||||

|
||||
|
||||
## Theory
|
||||
|
||||
Polls URL (https://api.my.protospace.ca/stats/) continuously and looks for
|
||||
changes to the `vestaboard` key. When updated, it replaces any special
|
||||
characters and then displays the message on the sign via serial.
|
||||
|
||||
If you want to use this, just call `send_sign(text)` in protoflap.py directly.
|
||||
|
||||
The split flap controller is connected to serial at `/dev/ttyAMA0`, 38400 baud.
|
||||
|
||||
### See Also
|
||||
|
||||
@Benno1308's reverse engineering:
|
||||
|
||||
https://github.com/EngineOwningSoftware/Vestaboard-Reverse-Engineering
|
||||
|
||||
https://www.reddit.com/r/Vestaboard/comments/tjm93n/local_device_api/
|
||||
|
||||
## Setup
|
||||
|
||||
Download the Vestaboard root private key. It should be the same for all
|
||||
Vestaboards:
|
||||
|
||||
```
|
||||
$ curl https://files.catbox.moe/kvibj6 > ~/.ssh/vestaboard
|
||||
$ chmod 600 ~/.ssh/vestaboard
|
||||
```
|
||||
|
||||
SSH into the Vestaboard using the root key, ie:
|
||||
|
||||
```
|
||||
@@ -44,7 +69,7 @@ Set config to:
|
||||
[program:protoflap]
|
||||
user=root
|
||||
directory=/root/protoflap
|
||||
command=/usr/bin/python /root/protoflap/protoflap.py
|
||||
command=/usr/bin/python -u /root/protoflap/protoflap.py
|
||||
stopsignal=INT
|
||||
stopasgroup=true
|
||||
killasgroup=true
|
||||
|
||||
BIN
media/signpic.jpg
Normal file
BIN
media/signpic.jpg
Normal file
Binary file not shown.
|
After Width: | Height: | Size: 109 KiB |
Reference in New Issue
Block a user