Compare commits

...

3 Commits

Author SHA1 Message Date
71d7b4ba19 Add -u to README supervisor command 2025-10-30 17:32:38 -06:00
0860e6d023 Add theory to README 2025-10-14 15:55:48 -06:00
1bc736cd01 Add picture of sign 2025-10-14 15:37:41 -06:00
2 changed files with 26 additions and 1 deletions

View File

@@ -2,11 +2,36 @@
Controls the welcome room Vestaboard directly, bypassing their cloud. Controls the welcome room Vestaboard directly, bypassing their cloud.
![a split flap display with the words "PROTOFLAP BY PROTOSPACE"](media/signpic.jpg)
## Theory
Polls URL (https://api.my.protospace.ca/stats/) continuously and looks for
changes to the `vestaboard` key. When updated, it replaces any special
characters and then displays the message on the sign via serial.
If you want to use this, just call `send_sign(text)` in protoflap.py directly.
The split flap controller is connected to serial at `/dev/ttyAMA0`, 38400 baud.
### See Also
@Benno1308's reverse engineering:
https://github.com/EngineOwningSoftware/Vestaboard-Reverse-Engineering
https://www.reddit.com/r/Vestaboard/comments/tjm93n/local_device_api/
## Setup ## Setup
Download the Vestaboard root private key. It should be the same for all
Vestaboards:
```
$ curl https://files.catbox.moe/kvibj6 > ~/.ssh/vestaboard
$ chmod 600 ~/.ssh/vestaboard
```
SSH into the Vestaboard using the root key, ie: SSH into the Vestaboard using the root key, ie:
``` ```
@@ -44,7 +69,7 @@ Set config to:
[program:protoflap] [program:protoflap]
user=root user=root
directory=/root/protoflap directory=/root/protoflap
command=/usr/bin/python /root/protoflap/protoflap.py command=/usr/bin/python -u /root/protoflap/protoflap.py
stopsignal=INT stopsignal=INT
stopasgroup=true stopasgroup=true
killasgroup=true killasgroup=true

BIN
media/signpic.jpg Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 109 KiB