Call to undefined method rfxcom

Salut moi depuis la dernière maj, voici l’écran que j’ai quand j’essaye d’accéder au plugin:

alors que l’état du plugin est bon

Bonjour,

Bonjour,

Avec des log je pense que ce serait mieux pour découvrir ton souci

Merci @iPapy d’avoir scindé le sujet :wink: toujours à l’affut l’ami :slight_smile:

2 « J'aime »

Bonjour,
Le log http.error ici serait utile également.
Tu peux aussi forcer le mise à jour du plug-in et voir si ça aide.

Désolé d’avoir été aussi long!!

J’ai reinstallé le plugin mais toujours le meme message d’erreur, voici le log en debug de rfxcom:

[2020-12-02 19:48:12][DEBUG] : Shutdown
[2020-12-02 19:48:12][DEBUG] : Removing PID file /tmp/jeedom/rfxcom/deamon.pid
[2020-12-02 19:48:12][DEBUG] : LoopNetServer Thread stopped
[2020-12-02 19:48:12][DEBUG] : Close serial port
[2020-12-02 19:48:12][DEBUG] : Serial port closed
[2020-12-02 19:48:12][DEBUG] : Exit 0
[2020-12-02 20:48:13][INFO] : Démon RFXcom lancé
[2020-12-02 20:50:08][INFO] : Lancement démon rfxcomd : /usr/bin/python3 /var/www/html/plugins/rfxcom/resources/rfxcomd/rfxcomd.py --device /dev/ttyUSB0 --loglevel debug --socketport 55000 --serialrate 38400 --protocol 12,13,18,20,21,22,23 --callback http://127.0.0.1:80/plugins/rfxcom/core/php/jeeRfxcom.php --apikey pOFNHK3v2OWNT1frYR4lQKTTxfD1Kqsc --cycle 0.3 --pid /tmp/jeedom/rfxcom/deamon.pid
[2020-12-02 19:50:10][INFO] : Start rfxcomd
[2020-12-02 19:50:10][INFO] : Log level : debug
[2020-12-02 19:50:10][INFO] : Socket port : 55000
[2020-12-02 19:50:10][INFO] : Socket host : 127.0.0.1
[2020-12-02 19:50:10][INFO] : PID file : /tmp/jeedom/rfxcom/deamon.pid
[2020-12-02 19:50:10][INFO] : Device : /dev/ttyUSB0
[2020-12-02 19:50:10][INFO] : Apikey : pOFNHK3v2OWNT1frYR4lQKTTxfD1Kqsc
[2020-12-02 19:50:10][INFO] : Callback : http://127.0.0.1:80/plugins/rfxcom/core/php/jeeRfxcom.php
[2020-12-02 19:50:10][INFO] : Cycle : 0.3
[2020-12-02 19:50:10][INFO] : Serial rate : 38400
[2020-12-02 19:50:10][INFO] : Serial timeout : 9
[2020-12-02 19:50:10][INFO] : Protocol : 12,13,18,20,21,22,23
[2020-12-02 19:50:10][INFO] : Find device : /dev/ttyUSB0
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x01 : Interface Response Message
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x10 : Lighting1 (X10, ARC, ELRO, Waveman, EMW200, IMPULS,RisingSun, Philips, Energenie, GDR2, HQ, Oase)
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x11 : Lighting2 (AC, HomeEasy EU, ANSLUT, Kambrook)
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x13 : Lighting4 (PT2262)
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x14 : Lighting5 ( LightwaveRF, Siemens, EMW100, BBSB, MDREMOTE,RSL2, OTIO, Livolo, RGB, Aoke relay, Eurodomest, RGB432W, Legrand,Avantek, IT, Kangtai)
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x15 : Lighting6 (Blyss (AE), Cuveo)
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x16 : Chime (Byron SX, Byron MP001, SelectPlus, Envivo, Alfawise)
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x17 : Fan (Siemens SF01, Itho, LucciAir, SEAV,Westinghouse,Casafan,FT1211R,Novy)
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x19 : Blinds1 (RollerTrol,Hasta,A-OK,Raex, Media Mount, DC)
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x1C : Edisio
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x1D : Honeywell ActivLink
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x1E : FunkBus
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x1F : Hunter Fan
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x20 : Security1 (X10, KD101, Visonic, Meiantech, SA30, SA33, RM174RF)
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x21 : Security2 (KeeLoq)
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x28 : Camera1 (Ninja/Robocam)
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x30 : Remote control and IR (ATI, Medion, PC Remote)
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x40 : Thermostat1 (Digimax)
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x42 : Thermostat3 (Mertik-Maxitrol G6R-H4 type)
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x4E : BBQ Temperature sensors (BBQ1)
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x4F : Temperature and rain sensors
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x50 : Temperature sensors
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x51 : Humidity sensors
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x52 : Temperature and humidity sensors
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x53 : Barometric sensors 
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x54 : Temperature, humidity and barometric sensors
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x55 : Rain sensors
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x56 : Wind sensors
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x57 : UV sensors
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x58 : Date/time sensors
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x59 : Current sensors
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x5A : Current sensors
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x5B : Current + ENERGY sensors
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x5C : Power sensors
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x5D : Weighting scale
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x60 : CARTELECTRONIC
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x70 : RFXsensor
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x71 : RFXMeter
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x72 : FS20 (FS20, FHT 8V, FHT80)
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x76 : Weather stations (WEATHER1-WEATHER2)
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x77 : SOLAR1
[2020-12-02 19:50:10][DEBUG] : Writing PID 12919 to /tmp/jeedom/rfxcom/deamon.pid
[2020-12-02 19:50:10][DEBUG] : Init request module v2.22.0
[2020-12-02 19:50:10][DEBUG] : Starting new HTTP connection (1): 127.0.0.1:80
[2020-12-02 20:50:10][DEBUG] : null
[2020-12-02 19:50:10][DEBUG] : http://127.0.0.1:80 "GET /plugins/rfxcom/core/php/jeeRfxcom.php?apikey=pOFNHK3v2OWNT1frYR4lQKTTxfD1Kqsc HTTP/1.1" 200 0
[2020-12-02 19:50:10][DEBUG] : Init serial module v3.5
[2020-12-02 19:50:10][DEBUG] : Start listening...
[2020-12-02 19:50:10][DEBUG] : Socket interface started
[2020-12-02 19:50:10][DEBUG] : LoopNetServer Thread started
[2020-12-02 19:50:10][DEBUG] : Open serial port on device: /dev/ttyUSB0, rate 38400, timeout : 9
[2020-12-02 19:50:10][DEBUG] : Listening on: [127.0.0.1:55000]
[2020-12-02 19:50:10][DEBUG] : Open Serialport
[2020-12-02 19:50:10][DEBUG] : flushOutput serial port 
[2020-12-02 19:50:10][DEBUG] : flushInput serial port 
[2020-12-02 19:50:10][DEBUG] : flushOutput serial port 
[2020-12-02 19:50:10][DEBUG] : flushInput serial port 
[2020-12-02 19:50:10][DEBUG] : Read Socket Thread Launched
[2020-12-02 19:50:10][DEBUG] : Read Device Thread Launched
[2020-12-02 19:50:11][DEBUG] : Send rfxcomd_reset
[2020-12-02 19:50:11][DEBUG] : Write data to serial port : 0d00000000000000000000000000
[2020-12-02 19:50:11][DEBUG] : Sleep 1 sec
[2020-12-02 19:50:12][DEBUG] : flushInput serial port 
[2020-12-02 19:50:12][DEBUG] : Send get status test
[2020-12-02 19:50:12][DEBUG] : Write data to serial port : 0d00000102000000000000000000
[2020-12-02 19:50:12][DEBUG] : Message: 14010001025313000c2f0001031c043bde80434f4d
[2020-12-02 19:50:12][DEBUG] : Decode : 14010001025313000c2f0001031c043bde80434f4d
[2020-12-02 19:50:12][DEBUG] : Test message: 14010001025313000c2f0001031c043bde80434f4d
[2020-12-02 19:50:12][DEBUG] : PacketType: 0x01
[2020-12-02 19:50:12][DEBUG] : Length: 21
[2020-12-02 19:50:12][DEBUG] : Start decoding packet type 0x01
[2020-12-02 19:50:12][DEBUG] : Data : {'msg10': '0x04', 'msg12': '0xDE', 'msg11': '0x3B', 'msg13': '0x80', 'packetlen': '0x14', 'msg4': '0x0C', 'msg9': '0x1C', 'subtype': '0x00', 'cmnd': '0x02', 'msg16': '0x4D', 'msg14': '0x43', 'seqnbr': '0x01', 'msg6': '0x00', 'msg15': '0x4F', 'msg2': '0x13', 'msg5': '0x2F', 'packettype': '0x01', 'msg3': '0x00', 'msg7': '0x01', 'msg8': '0x03', 'msg1': '0x53'}
[2020-12-02 19:50:12][DEBUG] : Subtype = response on a mode command
[2020-12-02 19:50:12][DEBUG] : Firmware version = 0x13
[2020-12-02 19:50:12][DEBUG] : RFXtrx433 operating at 433.92MHz
[2020-12-02 19:50:12][DEBUG] : Hardware major version = 0x01
[2020-12-02 19:50:12][DEBUG] : Hardware minor version = 0x03
[2020-12-02 19:50:12][DEBUG] : Output power = 0x1C
[2020-12-02 19:50:12][DEBUG] : Firmware Ext2
[2020-12-02 19:50:12][DEBUG] : Noise level (only used in special firmware) = 0x3B
[2020-12-02 19:50:12][DEBUG] : AE Blyss : 0
[2020-12-02 19:50:12][DEBUG] : Rubicson,Alecto,Banggood/Davis AU : 0
[2020-12-02 19:50:12][DEBUG] : FineOffset,Viking/Davis US : 0
[2020-12-02 19:50:12][DEBUG] : Lighting4/Davis EU : 0
[2020-12-02 19:50:12][DEBUG] : RSL,Revolt/La Crosse : 0
[2020-12-02 19:50:12][DEBUG] : Byron SX,SelectPlus/Alecto5500 : 0
[2020-12-02 19:50:12][DEBUG] : Imagintronix,Opus/Alecto2010/Alecto : 0
[2020-12-02 19:50:12][DEBUG] : undec on : 0
[2020-12-02 19:50:12][DEBUG] : Mertik/Edisio : 0
[2020-12-02 19:50:12][DEBUG] : AD LightwaveRF : 0
[2020-12-02 19:50:12][DEBUG] : Hideki,TFA,Cresta,UPM/FS20 : 0
[2020-12-02 19:50:12][DEBUG] : La Crosse : 0
[2020-12-02 19:50:12][DEBUG] : Legrand CAD : 1
[2020-12-02 19:50:12][DEBUG] : BlindsT0 : 0
[2020-12-02 19:50:12][DEBUG] : BlindsTx : 0
[2020-12-02 19:50:12][DEBUG] : X10 : 0
[2020-12-02 19:50:12][DEBUG] : ARC : 0
[2020-12-02 19:50:12][DEBUG] : AC : 1
[2020-12-02 19:50:12][DEBUG] : HomeEasy EU : 0
[2020-12-02 19:50:12][DEBUG] : Meiantech,Atlantic/Proguard : 1
[2020-12-02 19:50:12][DEBUG] : Oregon Scientific/Keeloq : 1
[2020-12-02 19:50:12][DEBUG] : ATI/cartelectronic/Meiantech,Atlantic : 1
[2020-12-02 19:50:12][DEBUG] : Visonic : 1
[2020-12-02 19:50:12][DEBUG] : Keeloq : 0
[2020-12-02 19:50:12][DEBUG] : HomeConfort,Fan : 0
[2020-12-02 19:50:12][DEBUG] : Honeywell Chime : 0
[2020-12-02 19:50:12][DEBUG] : MCZ 434.50/Itho CVE ECO RFT : 0
[2020-12-02 19:50:12][DEBUG] : FunkBus 433.42/Itho CVE RFT : 0
[2020-12-02 19:50:13][DEBUG] : Client connected to [127.0.0.1:55029]
[2020-12-02 19:50:13][DEBUG] : Message read from socket: b'{"apikey":"pOFNHK3v2OWNT1frYR4lQKTTxfD1Kqsc","cmd":"add","device":{"id":"0177FA46"}}'
[2020-12-02 19:50:13][DEBUG] : Client disconnected from [127.0.0.1:55029]
[2020-12-02 19:50:13][DEBUG] : Client connected to [127.0.0.1:55030]
[2020-12-02 19:50:13][DEBUG] : Message read from socket: b'{"apikey":"pOFNHK3v2OWNT1frYR4lQKTTxfD1Kqsc","cmd":"add","device":{"id":"2301"}}'
[2020-12-02 19:50:13][DEBUG] : Client disconnected from [127.0.0.1:55030]
[2020-12-02 19:50:13][DEBUG] : Message received in socket JEEDOM_SOCKET_MESSAGE
[2020-12-02 19:50:13][DEBUG] : Add device : {'id': '0177FA46'}
[2020-12-02 19:50:13][DEBUG] : Client connected to [127.0.0.1:55031]
[2020-12-02 19:50:13][DEBUG] : Message read from socket: b'{"apikey":"pOFNHK3v2OWNT1frYR4lQKTTxfD1Kqsc","cmd":"add","device":{"id":"5402"}}'
[2020-12-02 19:50:13][DEBUG] : Client disconnected from [127.0.0.1:55031]
[2020-12-02 19:50:13][DEBUG] : Client connected to [127.0.0.1:55032]
[2020-12-02 19:50:13][DEBUG] : Message read from socket: b'{"apikey":"pOFNHK3v2OWNT1frYR4lQKTTxfD1Kqsc","cmd":"add","device":{"id":"6604"}}'
[2020-12-02 19:50:13][DEBUG] : Client disconnected from [127.0.0.1:55032]
[2020-12-02 19:50:13][DEBUG] : Client connected to [127.0.0.1:55033]
[2020-12-02 19:50:13][DEBUG] : Message read from socket: b'{"apikey":"pOFNHK3v2OWNT1frYR4lQKTTxfD1Kqsc","cmd":"add","device":{"id":"81D2"}}'
[2020-12-02 19:50:13][DEBUG] : Client disconnected from [127.0.0.1:55033]
[2020-12-02 19:50:13][DEBUG] : Client connected to [127.0.0.1:55035]
[2020-12-02 19:50:13][DEBUG] : Message received in socket JEEDOM_SOCKET_MESSAGE
[2020-12-02 19:50:13][DEBUG] : Add device : {'id': '2301'}
[2020-12-02 19:50:13][DEBUG] : Message read from socket: b'{"apikey":"pOFNHK3v2OWNT1frYR4lQKTTxfD1Kqsc","cmd":"add","device":{"id":"9201"}}'
[2020-12-02 19:50:13][DEBUG] : Client disconnected from [127.0.0.1:55035]
[2020-12-02 19:50:13][DEBUG] : Client connected to [127.0.0.1:55036]
[2020-12-02 19:50:13][DEBUG] : Message read from socket: b'{"apikey":"pOFNHK3v2OWNT1frYR4lQKTTxfD1Kqsc","cmd":"add","device":{"id":"F402"}}'
[2020-12-02 19:50:13][DEBUG] : Client disconnected from [127.0.0.1:55036]
[2020-12-02 19:50:13][DEBUG] : Client connected to [127.0.0.1:55037]
[2020-12-02 19:50:13][DEBUG] : Message read from socket: b'{"apikey":"pOFNHK3v2OWNT1frYR4lQKTTxfD1Kqsc","cmd":"add","device":{"id":"00E906CE"}}'
[2020-12-02 19:50:13][DEBUG] : Client disconnected from [127.0.0.1:55037]
[2020-12-02 19:50:13][DEBUG] : Client connected to [127.0.0.1:55038]
[2020-12-02 19:50:13][DEBUG] : Message read from socket: b'{"apikey":"pOFNHK3v2OWNT1frYR4lQKTTxfD1Kqsc","cmd":"add","device":{"id":"01003836"}}'
[2020-12-02 19:50:13][DEBUG] : Client disconnected from [127.0.0.1:55038]
[2020-12-02 19:50:13][DEBUG] : Client connected to [127.0.0.1:55041]
[2020-12-02 19:50:13][DEBUG] : Message read from socket: b'{"apikey":"pOFNHK3v2OWNT1frYR4lQKTTxfD1Kqsc","cmd":"add","device":{"id":"0100449E"}}'
[2020-12-02 19:50:13][DEBUG] : Client disconnected from [127.0.0.1:55041]
[2020-12-02 19:50:13][DEBUG] : Message received in socket JEEDOM_SOCKET_MESSAGE
[2020-12-02 19:50:13][DEBUG] : Add device : {'id': '5402'}
[2020-12-02 19:50:13][DEBUG] : Message received in socket JEEDOM_SOCKET_MESSAGE
[2020-12-02 19:50:13][DEBUG] : Add device : {'id': '6604'}
[2020-12-02 19:50:13][DEBUG] : Message received in socket JEEDOM_SOCKET_MESSAGE
[2020-12-02 19:50:13][DEBUG] : Add device : {'id': '81D2'}
[2020-12-02 19:50:13][DEBUG] : Message received in socket JEEDOM_SOCKET_MESSAGE
[2020-12-02 19:50:13][DEBUG] : Add device : {'id': '9201'}
[2020-12-02 19:50:13][DEBUG] : Message received in socket JEEDOM_SOCKET_MESSAGE
[2020-12-02 19:50:13][DEBUG] : Add device : {'id': 'F402'}
[2020-12-02 19:50:13][DEBUG] : Message received in socket JEEDOM_SOCKET_MESSAGE
[2020-12-02 19:50:13][DEBUG] : Add device : {'id': '00E906CE'}
[2020-12-02 19:50:13][DEBUG] : Message received in socket JEEDOM_SOCKET_MESSAGE
[2020-12-02 19:50:13][DEBUG] : Add device : {'id': '01003836'}
[2020-12-02 19:50:13][DEBUG] : Message received in socket JEEDOM_SOCKET_MESSAGE
[2020-12-02 19:50:13][DEBUG] : Add device : {'id': '0100449E'}
[2020-12-02 19:50:13][DEBUG] : Client connected to [127.0.0.1:55039]
[2020-12-02 19:50:13][DEBUG] : Message read from socket: b'{"apikey":"pOFNHK3v2OWNT1frYR4lQKTTxfD1Kqsc","cmd":"add","device":{"id":"01002F72"}}'
[2020-12-02 19:50:13][DEBUG] : Client disconnected from [127.0.0.1:55039]
[2020-12-02 19:50:13][DEBUG] : Client connected to [127.0.0.1:55040]
[2020-12-02 19:50:13][DEBUG] : Message read from socket: b'{"apikey":"pOFNHK3v2OWNT1frYR4lQKTTxfD1Kqsc","cmd":"add","device":{"id":"01003786"}}'
[2020-12-02 19:50:13][DEBUG] : Client disconnected from [127.0.0.1:55040]
[2020-12-02 19:50:13][DEBUG] : Message received in socket JEEDOM_SOCKET_MESSAGE
[2020-12-02 19:50:13][DEBUG] : Add device : {'id': '01002F72'}
[2020-12-02 19:50:13][DEBUG] : Message received in socket JEEDOM_SOCKET_MESSAGE
[2020-12-02 19:50:13][DEBUG] : Add device : {'id': '01003786'}
[2020-12-02 19:50:13][DEBUG] : msg3: [0, 0, 0, 0, 0, 0, 0, 0] / 00
[2020-12-02 19:50:13][DEBUG] : msg4: [0, 0, 0, 0, 1, 1, 0, 0] / 0c
[2020-12-02 19:50:13][DEBUG] : msg5: [0, 0, 1, 0, 1, 1, 1, 1] / 2f
[2020-12-02 19:50:13][DEBUG] : msg6: [0, 0, 0, 0, 0, 0, 0, 0] / 00
[2020-12-02 19:50:13][DEBUG] : Command: 0d000002035300000c2f00000000
[2020-12-02 19:50:13][DEBUG] : Protocol actually activated 000c2f00
[2020-12-02 19:50:13][DEBUG] : Actual Frequency 53
[2020-12-02 19:50:13][DEBUG] : Wanted protocol 000c2f00
[2020-12-02 19:50:14][DEBUG] : Client connected to [127.0.0.1:55042]
[2020-12-02 19:50:14][DEBUG] : Message read from socket: b'{"apikey":"pOFNHK3v2OWNT1frYR4lQKTTxfD1Kqsc","cmd":"add","device":{"id":"0149F78E"}}'
[2020-12-02 19:50:14][DEBUG] : Client disconnected from [127.0.0.1:55042]
[2020-12-02 19:50:14][DEBUG] : Client connected to [127.0.0.1:55063]
[2020-12-02 19:50:14][DEBUG] : Message read from socket: b'{"apikey":"pOFNHK3v2OWNT1frYR4lQKTTxfD1Kqsc","cmd":"add","device":{"id":"3404"}}'
[2020-12-02 19:50:14][DEBUG] : Client disconnected from [127.0.0.1:55063]
[2020-12-02 19:50:14][DEBUG] : Client connected to [127.0.0.1:55064]
[2020-12-02 19:50:14][DEBUG] : Message read from socket: b'{"apikey":"pOFNHK3v2OWNT1frYR4lQKTTxfD1Kqsc","cmd":"add","device":{"id":"01458226"}}'
[2020-12-02 19:50:14][DEBUG] : Client disconnected from [127.0.0.1:55064]
[2020-12-02 19:50:14][DEBUG] : Client connected to [127.0.0.1:55065]
[2020-12-02 20:50:14][INFO] : Démon RFXcom lancé
[2020-12-02 19:50:14][DEBUG] : Message received in socket JEEDOM_SOCKET_MESSAGE
[2020-12-02 19:50:14][DEBUG] : Add device : {'id': '0149F78E'}
[2020-12-02 19:50:14][DEBUG] : Message read from socket: b'{"apikey":"pOFNHK3v2OWNT1frYR4lQKTTxfD1Kqsc","cmd":"add","device":{"id":"01003E6A"}}'
[2020-12-02 19:50:14][DEBUG] : Client disconnected from [127.0.0.1:55065]
[2020-12-02 19:50:14][DEBUG] : Client connected to [127.0.0.1:55066]
[2020-12-02 19:50:14][DEBUG] : Message read from socket: b'{"apikey":"pOFNHK3v2OWNT1frYR4lQKTTxfD1Kqsc","cmd":"add","device":{"id":"010039C6"}}'
[2020-12-02 19:50:14][DEBUG] : Client disconnected from [127.0.0.1:55066]
[2020-12-02 19:50:14][DEBUG] : Client connected to [127.0.0.1:55067]
[2020-12-02 19:50:14][DEBUG] : Message read from socket: b'{"apikey":"pOFNHK3v2OWNT1frYR4lQKTTxfD1Kqsc","cmd":"add","device":{"id":"01003CC6"}}'
[2020-12-02 19:50:14][DEBUG] : Client disconnected from [127.0.0.1:55067]
[2020-12-02 19:50:14][DEBUG] : Client connected to [127.0.0.1:55068]
[2020-12-02 19:50:14][DEBUG] : Message received in socket JEEDOM_SOCKET_MESSAGE
[2020-12-02 19:50:14][DEBUG] : Add device : {'id': '3404'}
[2020-12-02 19:50:14][DEBUG] : Message read from socket: b'{"apikey":"pOFNHK3v2OWNT1frYR4lQKTTxfD1Kqsc","cmd":"add","device":{"id":"009ED482"}}'
[2020-12-02 19:50:14][DEBUG] : Client disconnected from [127.0.0.1:55068]
[2020-12-02 19:50:14][DEBUG] : Message received in socket JEEDOM_SOCKET_MESSAGE
[2020-12-02 19:50:14][DEBUG] : Add device : {'id': '01458226'}
[2020-12-02 19:50:14][DEBUG] : Message received in socket JEEDOM_SOCKET_MESSAGE
[2020-12-02 19:50:14][DEBUG] : Add device : {'id': '01003E6A'}
[2020-12-02 19:50:14][DEBUG] : Message received in socket JEEDOM_SOCKET_MESSAGE
[2020-12-02 19:50:14][DEBUG] : Add device : {'id': '010039C6'}
[2020-12-02 19:50:14][DEBUG] : Message received in socket JEEDOM_SOCKET_MESSAGE
[2020-12-02 19:50:14][DEBUG] : Add device : {'id': '01003CC6'}
[2020-12-02 19:50:14][DEBUG] : Message received in socket JEEDOM_SOCKET_MESSAGE
[2020-12-02 19:50:14][DEBUG] : Add device : {'id': '009ED482'}
[2020-12-02 19:50:39][DEBUG] : Message: 085002003404002760
[2020-12-02 19:50:39][DEBUG] : Decode : 085002003404002760
[2020-12-02 19:50:39][DEBUG] : Test message: 085002003404002760
[2020-12-02 19:50:39][DEBUG] : PacketType: 0x50
[2020-12-02 19:50:39][DEBUG] : Length: 9
[2020-12-02 19:50:39][DEBUG] : Start decoding packet type 0x50
[2020-12-02 19:50:39][DEBUG] : Subtype = TEMP2 is THC238/268,THN132,THWR288,THRN122,THN122,AW129/131,THN129
[2020-12-02 19:50:39][DEBUG] : Data : {'seqnbr': '0x00', 'id2': '0x04', 'temperature': 39, 'battery': 10, 'packetlen': '0x08', 'packettype': '0x50', 'id1': '0x34', 'subtype': '0x02', 'temperaturesign': '', 'rssi': 6}
[2020-12-02 19:50:39][DEBUG] : Decoded info : {'temperature': '3.9', 'battery': 10, 'id': '3404', 'packettype': '0x50', 'subtype': '0x02', 'rssi': 6}
[2020-12-02 19:50:39][DEBUG] : Device is known id : 3404
[2020-12-02 19:50:39][DEBUG] : Send to jeedom : {'devices': {'340450': {'temperature': '3.9', 'battery': 10, 'id': '3404', 'packettype': '0x50', 'subtype': '0x02', 'rssi': 6}}}
[2020-12-02 19:50:39][DEBUG] : Starting new HTTP connection (1): 127.0.0.1:80
[2020-12-02 20:50:39][DEBUG] : {"devices":{"340450":{"temperature":"3.9","battery":10,"id":"3404","packettype":"0x50","subtype":"0x02","rssi":6}}}
[2020-12-02 19:50:39][DEBUG] : http://127.0.0.1:80 "POST /plugins/rfxcom/core/php/jeeRfxcom.php?apikey=pOFNHK3v2OWNT1frYR4lQKTTxfD1Kqsc HTTP/1.1" 200 0
[2020-12-02 19:50:46][DEBUG] : Message: 115a020181d20000000000000079783bde80
[2020-12-02 19:50:46][DEBUG] : Decode : 115a020181d20000000000000079783bde80
[2020-12-02 19:50:46][DEBUG] : Test message: 115a020181d20000000000000079783bde80
[2020-12-02 19:50:46][DEBUG] : PacketType: 0x5A
[2020-12-02 19:50:46][DEBUG] : Length: 18
[2020-12-02 19:50:46][DEBUG] : Start decoding packet type 0x5A
[2020-12-02 19:50:46][DEBUG] : Subtype = ELEC3 is CM180
[2020-12-02 19:50:46][DEBUG] : Data : {'seqnbr': '0x01', 'id2': '0xD2', 'battery': 10, 'packetlen': '0x11', 'packettype': '0x5A', 'id1': '0x81', 'subtype': '0x02', 'count': 0, 'rssi': 8, 'instant': 0, 'total': 2037922782}
[2020-12-02 19:50:46][DEBUG] : Decoded info : {'battery': 10, 'id': '81D2', 'packettype': '0x5A', 'subtype': '0x02', 'count': 0, 'rssi': 8, 'instant': 0, 'total': 9111455.39}
[2020-12-02 19:50:46][DEBUG] : Device is known id : 81D2
[2020-12-02 19:50:46][DEBUG] : Send to jeedom : {'devices': {'81D25A': {'battery': 10, 'id': '81D2', 'packettype': '0x5A', 'subtype': '0x02', 'count': 0, 'rssi': 8, 'instant': 0, 'total': 9111455.39}}}
[2020-12-02 19:50:46][DEBUG] : Starting new HTTP connection (1): 127.0.0.1:80
[2020-12-02 20:50:46][DEBUG] : {"devices":{"81D25A":{"battery":10,"id":"81D2","packettype":"0x5A","subtype":"0x02","count":0,"rssi":8,"instant":0,"total":9111455.39}}}
[2020-12-02 19:50:46][DEBUG] : http://127.0.0.1:80 "POST /plugins/rfxcom/core/php/jeeRfxcom.php?apikey=pOFNHK3v2OWNT1frYR4lQKTTxfD1Kqsc HTTP/1.1" 200 0
[2020-12-02 19:51:22][DEBUG] : Message: 085002023404002760
[2020-12-02 19:51:22][DEBUG] : Decode : 085002023404002760
[2020-12-02 19:51:22][DEBUG] : Test message: 085002023404002760
[2020-12-02 19:51:22][DEBUG] : PacketType: 0x50
[2020-12-02 19:51:22][DEBUG] : Length: 9
[2020-12-02 19:51:22][DEBUG] : Start decoding packet type 0x50
[2020-12-02 19:51:22][DEBUG] : Subtype = TEMP2 is THC238/268,THN132,THWR288,THRN122,THN122,AW129/131,THN129
[2020-12-02 19:51:22][DEBUG] : Data : {'seqnbr': '0x02', 'id2': '0x04', 'temperature': 39, 'battery': 10, 'packetlen': '0x08', 'packettype': '0x50', 'id1': '0x34', 'subtype': '0x02', 'temperaturesign': '', 'rssi': 6}
[2020-12-02 19:51:22][DEBUG] : Decoded info : {'temperature': '3.9', 'battery': 10, 'id': '3404', 'packettype': '0x50', 'subtype': '0x02', 'rssi': 6}
[2020-12-02 19:51:22][DEBUG] : Device is known id : 3404
[2020-12-02 19:51:22][DEBUG] : Send to jeedom : {'devices': {'340450': {'temperature': '3.9', 'battery': 10, 'id': '3404', 'packettype': '0x50', 'subtype': '0x02', 'rssi': 6}}}
[2020-12-02 19:51:22][DEBUG] : Starting new HTTP connection (1): 127.0.0.1:80
[2020-12-02 20:51:22][DEBUG] : {"devices":{"340450":{"temperature":"3.9","battery":10,"id":"3404","packettype":"0x50","subtype":"0x02","rssi":6}}}
[2020-12-02 19:51:22][DEBUG] : http://127.0.0.1:80 "POST /plugins/rfxcom/core/php/jeeRfxcom.php?apikey=pOFNHK3v2OWNT1frYR4lQKTTxfD1Kqsc HTTP/1.1" 200 0
[2020-12-02 19:51:46][DEBUG] : Message: 115a020381d20000000000000079783bde80
[2020-12-02 19:51:46][DEBUG] : Decode : 115a020381d20000000000000079783bde80
[2020-12-02 19:51:46][DEBUG] : Test message: 115a020381d20000000000000079783bde80
[2020-12-02 19:51:46][DEBUG] : PacketType: 0x5A
[2020-12-02 19:51:46][DEBUG] : Length: 18
[2020-12-02 19:51:46][DEBUG] : Start decoding packet type 0x5A
[2020-12-02 19:51:46][DEBUG] : Subtype = ELEC3 is CM180
[2020-12-02 19:51:46][DEBUG] : Data : {'seqnbr': '0x03', 'id2': '0xD2', 'battery': 10, 'packetlen': '0x11', 'packettype': '0x5A', 'id1': '0x81', 'subtype': '0x02', 'count': 0, 'rssi': 8, 'instant': 0, 'total': 2037922782}
[2020-12-02 19:51:46][DEBUG] : Decoded info : {'battery': 10, 'id': '81D2', 'packettype': '0x5A', 'subtype': '0x02', 'count': 0, 'rssi': 8, 'instant': 0, 'total': 9111455.39}
[2020-12-02 19:51:46][DEBUG] : Device is known id : 81D2
[2020-12-02 19:51:46][DEBUG] : Send to jeedom : {'devices': {'81D25A': {'battery': 10, 'id': '81D2', 'packettype': '0x5A', 'subtype': '0x02', 'count': 0, 'rssi': 8, 'instant': 0, 'total': 9111455.39}}}
[2020-12-02 19:51:46][DEBUG] : Starting new HTTP connection (1): 127.0.0.1:80
[2020-12-02 20:51:46][DEBUG] : {"devices":{"81D25A":{"battery":10,"id":"81D2","packettype":"0x5A","subtype":"0x02","count":0,"rssi":8,"instant":0,"total":9111455.39}}}
[2020-12-02 19:51:46][DEBUG] : http://127.0.0.1:80 "POST /plugins/rfxcom/core/php/jeeRfxcom.php?apikey=pOFNHK3v2OWNT1frYR4lQKTTxfD1Kqsc HTTP/1.1" 200 0
[2020-12-02 19:52:05][DEBUG] : Message: 085002043404002760
[2020-12-02 19:52:05][DEBUG] : Decode : 085002043404002760
[2020-12-02 19:52:05][DEBUG] : Test message: 085002043404002760
[2020-12-02 19:52:05][DEBUG] : PacketType: 0x50
[2020-12-02 19:52:05][DEBUG] : Length: 9
[2020-12-02 19:52:05][DEBUG] : Start decoding packet type 0x50
[2020-12-02 19:52:05][DEBUG] : Subtype = TEMP2 is THC238/268,THN132,THWR288,THRN122,THN122,AW129/131,THN129
[2020-12-02 19:52:05][DEBUG] : Data : {'seqnbr': '0x04', 'id2': '0x04', 'temperature': 39, 'battery': 10, 'packetlen': '0x08', 'packettype': '0x50', 'id1': '0x34', 'subtype': '0x02', 'temperaturesign': '', 'rssi': 6}
[2020-12-02 19:52:05][DEBUG] : Decoded info : {'temperature': '3.9', 'battery': 10, 'id': '3404', 'packettype': '0x50', 'subtype': '0x02', 'rssi': 6}
[2020-12-02 19:52:05][DEBUG] : Device is known id : 3404
[2020-12-02 19:52:05][DEBUG] : Send to jeedom : {'devices': {'340450': {'temperature': '3.9', 'battery': 10, 'id': '3404', 'packettype': '0x50', 'subtype': '0x02', 'rssi': 6}}}
[2020-12-02 19:52:05][DEBUG] : Starting new HTTP connection (1): 127.0.0.1:80
[2020-12-02 20:52:05][DEBUG] : {"devices":{"340450":{"temperature":"3.9","battery":10,"id":"3404","packettype":"0x50","subtype":"0x02","rssi":6}}}
[2020-12-02 19:52:05][DEBUG] : http://127.0.0.1:80 "POST /plugins/rfxcom/core/php/jeeRfxcom.php?apikey=pOFNHK3v2OWNT1frYR4lQKTTxfD1Kqsc HTTP/1.1" 200 0
[2020-12-02 19:52:46][DEBUG] : Message: 115a020581d20000000000000079783bde80
[2020-12-02 19:52:46][DEBUG] : Decode : 115a020581d20000000000000079783bde80
[2020-12-02 19:52:46][DEBUG] : Test message: 115a020581d20000000000000079783bde80
[2020-12-02 19:52:46][DEBUG] : PacketType: 0x5A
[2020-12-02 19:52:46][DEBUG] : Length: 18
[2020-12-02 19:52:46][DEBUG] : Start decoding packet type 0x5A
[2020-12-02 19:52:46][DEBUG] : Subtype = ELEC3 is CM180
[2020-12-02 19:52:46][DEBUG] : Data : {'seqnbr': '0x05', 'id2': '0xD2', 'battery': 10, 'packetlen': '0x11', 'packettype': '0x5A', 'id1': '0x81', 'subtype': '0x02', 'count': 0, 'rssi': 8, 'instant': 0, 'total': 2037922782}
[2020-12-02 19:52:46][DEBUG] : Decoded info : {'battery': 10, 'id': '81D2', 'packettype': '0x5A', 'subtype': '0x02', 'count': 0, 'rssi': 8, 'instant': 0, 'total': 9111455.39}
[2020-12-02 19:52:46][DEBUG] : Device is known id : 81D2
[2020-12-02 19:52:46][DEBUG] : Send to jeedom : {'devices': {'81D25A': {'battery': 10, 'id': '81D2', 'packettype': '0x5A', 'subtype': '0x02', 'count': 0, 'rssi': 8, 'instant': 0, 'total': 9111455.39}}}
[2020-12-02 19:52:46][DEBUG] : Starting new HTTP connection (1): 127.0.0.1:80
[2020-12-02 20:52:46][DEBUG] : {"devices":{"81D25A":{"battery":10,"id":"81D2","packettype":"0x5A","subtype":"0x02","count":0,"rssi":8,"instant":0,"total":9111455.39}}}
[2020-12-02 19:52:46][DEBUG] : http://127.0.0.1:80 "POST /plugins/rfxcom/core/php/jeeRfxcom.php?apikey=pOFNHK3v2OWNT1frYR4lQKTTxfD1Kqsc HTTP/1.1" 200 0
[2020-12-02 19:52:48][DEBUG] : Message: 085002063404002760
[2020-12-02 19:52:48][DEBUG] : Decode : 085002063404002760
[2020-12-02 19:52:48][DEBUG] : Test message: 085002063404002760
[2020-12-02 19:52:48][DEBUG] : PacketType: 0x50
[2020-12-02 19:52:48][DEBUG] : Length: 9
[2020-12-02 19:52:48][DEBUG] : Start decoding packet type 0x50
[2020-12-02 19:52:48][DEBUG] : Subtype = TEMP2 is THC238/268,THN132,THWR288,THRN122,THN122,AW129/131,THN129
[2020-12-02 19:52:48][DEBUG] : Data : {'seqnbr': '0x06', 'id2': '0x04', 'temperature': 39, 'battery': 10, 'packetlen': '0x08', 'packettype': '0x50', 'id1': '0x34', 'subtype': '0x02', 'temperaturesign': '', 'rssi': 6}
[2020-12-02 19:52:48][DEBUG] : Decoded info : {'temperature': '3.9', 'battery': 10, 'id': '3404', 'packettype': '0x50', 'subtype': '0x02', 'rssi': 6}
[2020-12-02 19:52:48][DEBUG] : Device is known id : 3404
[2020-12-02 19:52:48][DEBUG] : Send to jeedom : {'devices': {'340450': {'temperature': '3.9', 'battery': 10, 'id': '3404', 'packettype': '0x50', 'subtype': '0x02', 'rssi': 6}}}
[2020-12-02 19:52:48][DEBUG] : Starting new HTTP connection (1): 127.0.0.1:80
[2020-12-02 20:52:48][DEBUG] : {"devices":{"340450":{"temperature":"3.9","battery":10,"id":"3404","packettype":"0x50","subtype":"0x02","rssi":6}}}
[2020-12-02 19:52:48][DEBUG] : http://127.0.0.1:80 "POST /plugins/rfxcom/core/php/jeeRfxcom.php?apikey=pOFNHK3v2OWNT1frYR4lQKTTxfD1Kqsc HTTP/1.1" 200 0


Pour le log http error, il est vide!!

Problème résolu, il suffit de redémarrer Jeedom!!!

Ce sujet a été automatiquement fermé après 24 heures suivant le dernier commentaire. Aucune réponse n’est permise dorénavant.