Salut moi depuis la dernière maj, voici l’écran que j’ai quand j’essaye d’accéder au plugin:
alors que l’état du plugin est bon
Salut moi depuis la dernière maj, voici l’écran que j’ai quand j’essaye d’accéder au plugin:
alors que l’état du plugin est bon
Bonjour,
Bonjour,
Avec des log je pense que ce serait mieux pour découvrir ton souci
Bonjour,
Le log http.error
ici serait utile également.
Tu peux aussi forcer le mise à jour du plug-in et voir si ça aide.
Désolé d’avoir été aussi long!!
J’ai reinstallé le plugin mais toujours le meme message d’erreur, voici le log en debug de rfxcom:
[2020-12-02 19:48:12][DEBUG] : Shutdown
[2020-12-02 19:48:12][DEBUG] : Removing PID file /tmp/jeedom/rfxcom/deamon.pid
[2020-12-02 19:48:12][DEBUG] : LoopNetServer Thread stopped
[2020-12-02 19:48:12][DEBUG] : Close serial port
[2020-12-02 19:48:12][DEBUG] : Serial port closed
[2020-12-02 19:48:12][DEBUG] : Exit 0
[2020-12-02 20:48:13][INFO] : Démon RFXcom lancé
[2020-12-02 20:50:08][INFO] : Lancement démon rfxcomd : /usr/bin/python3 /var/www/html/plugins/rfxcom/resources/rfxcomd/rfxcomd.py --device /dev/ttyUSB0 --loglevel debug --socketport 55000 --serialrate 38400 --protocol 12,13,18,20,21,22,23 --callback http://127.0.0.1:80/plugins/rfxcom/core/php/jeeRfxcom.php --apikey pOFNHK3v2OWNT1frYR4lQKTTxfD1Kqsc --cycle 0.3 --pid /tmp/jeedom/rfxcom/deamon.pid
[2020-12-02 19:50:10][INFO] : Start rfxcomd
[2020-12-02 19:50:10][INFO] : Log level : debug
[2020-12-02 19:50:10][INFO] : Socket port : 55000
[2020-12-02 19:50:10][INFO] : Socket host : 127.0.0.1
[2020-12-02 19:50:10][INFO] : PID file : /tmp/jeedom/rfxcom/deamon.pid
[2020-12-02 19:50:10][INFO] : Device : /dev/ttyUSB0
[2020-12-02 19:50:10][INFO] : Apikey : pOFNHK3v2OWNT1frYR4lQKTTxfD1Kqsc
[2020-12-02 19:50:10][INFO] : Callback : http://127.0.0.1:80/plugins/rfxcom/core/php/jeeRfxcom.php
[2020-12-02 19:50:10][INFO] : Cycle : 0.3
[2020-12-02 19:50:10][INFO] : Serial rate : 38400
[2020-12-02 19:50:10][INFO] : Serial timeout : 9
[2020-12-02 19:50:10][INFO] : Protocol : 12,13,18,20,21,22,23
[2020-12-02 19:50:10][INFO] : Find device : /dev/ttyUSB0
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x01 : Interface Response Message
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x10 : Lighting1 (X10, ARC, ELRO, Waveman, EMW200, IMPULS,RisingSun, Philips, Energenie, GDR2, HQ, Oase)
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x11 : Lighting2 (AC, HomeEasy EU, ANSLUT, Kambrook)
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x13 : Lighting4 (PT2262)
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x14 : Lighting5 ( LightwaveRF, Siemens, EMW100, BBSB, MDREMOTE,RSL2, OTIO, Livolo, RGB, Aoke relay, Eurodomest, RGB432W, Legrand,Avantek, IT, Kangtai)
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x15 : Lighting6 (Blyss (AE), Cuveo)
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x16 : Chime (Byron SX, Byron MP001, SelectPlus, Envivo, Alfawise)
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x17 : Fan (Siemens SF01, Itho, LucciAir, SEAV,Westinghouse,Casafan,FT1211R,Novy)
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x19 : Blinds1 (RollerTrol,Hasta,A-OK,Raex, Media Mount, DC)
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x1C : Edisio
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x1D : Honeywell ActivLink
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x1E : FunkBus
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x1F : Hunter Fan
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x20 : Security1 (X10, KD101, Visonic, Meiantech, SA30, SA33, RM174RF)
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x21 : Security2 (KeeLoq)
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x28 : Camera1 (Ninja/Robocam)
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x30 : Remote control and IR (ATI, Medion, PC Remote)
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x40 : Thermostat1 (Digimax)
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x42 : Thermostat3 (Mertik-Maxitrol G6R-H4 type)
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x4E : BBQ Temperature sensors (BBQ1)
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x4F : Temperature and rain sensors
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x50 : Temperature sensors
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x51 : Humidity sensors
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x52 : Temperature and humidity sensors
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x53 : Barometric sensors
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x54 : Temperature, humidity and barometric sensors
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x55 : Rain sensors
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x56 : Wind sensors
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x57 : UV sensors
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x58 : Date/time sensors
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x59 : Current sensors
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x5A : Current sensors
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x5B : Current + ENERGY sensors
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x5C : Power sensors
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x5D : Weighting scale
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x60 : CARTELECTRONIC
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x70 : RFXsensor
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x71 : RFXMeter
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x72 : FS20 (FS20, FHT 8V, FHT80)
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x76 : Weather stations (WEATHER1-WEATHER2)
[2020-12-02 19:50:10][DEBUG] : Load decoder packet type 0x77 : SOLAR1
[2020-12-02 19:50:10][DEBUG] : Writing PID 12919 to /tmp/jeedom/rfxcom/deamon.pid
[2020-12-02 19:50:10][DEBUG] : Init request module v2.22.0
[2020-12-02 19:50:10][DEBUG] : Starting new HTTP connection (1): 127.0.0.1:80
[2020-12-02 20:50:10][DEBUG] : null
[2020-12-02 19:50:10][DEBUG] : http://127.0.0.1:80 "GET /plugins/rfxcom/core/php/jeeRfxcom.php?apikey=pOFNHK3v2OWNT1frYR4lQKTTxfD1Kqsc HTTP/1.1" 200 0
[2020-12-02 19:50:10][DEBUG] : Init serial module v3.5
[2020-12-02 19:50:10][DEBUG] : Start listening...
[2020-12-02 19:50:10][DEBUG] : Socket interface started
[2020-12-02 19:50:10][DEBUG] : LoopNetServer Thread started
[2020-12-02 19:50:10][DEBUG] : Open serial port on device: /dev/ttyUSB0, rate 38400, timeout : 9
[2020-12-02 19:50:10][DEBUG] : Listening on: [127.0.0.1:55000]
[2020-12-02 19:50:10][DEBUG] : Open Serialport
[2020-12-02 19:50:10][DEBUG] : flushOutput serial port
[2020-12-02 19:50:10][DEBUG] : flushInput serial port
[2020-12-02 19:50:10][DEBUG] : flushOutput serial port
[2020-12-02 19:50:10][DEBUG] : flushInput serial port
[2020-12-02 19:50:10][DEBUG] : Read Socket Thread Launched
[2020-12-02 19:50:10][DEBUG] : Read Device Thread Launched
[2020-12-02 19:50:11][DEBUG] : Send rfxcomd_reset
[2020-12-02 19:50:11][DEBUG] : Write data to serial port : 0d00000000000000000000000000
[2020-12-02 19:50:11][DEBUG] : Sleep 1 sec
[2020-12-02 19:50:12][DEBUG] : flushInput serial port
[2020-12-02 19:50:12][DEBUG] : Send get status test
[2020-12-02 19:50:12][DEBUG] : Write data to serial port : 0d00000102000000000000000000
[2020-12-02 19:50:12][DEBUG] : Message: 14010001025313000c2f0001031c043bde80434f4d
[2020-12-02 19:50:12][DEBUG] : Decode : 14010001025313000c2f0001031c043bde80434f4d
[2020-12-02 19:50:12][DEBUG] : Test message: 14010001025313000c2f0001031c043bde80434f4d
[2020-12-02 19:50:12][DEBUG] : PacketType: 0x01
[2020-12-02 19:50:12][DEBUG] : Length: 21
[2020-12-02 19:50:12][DEBUG] : Start decoding packet type 0x01
[2020-12-02 19:50:12][DEBUG] : Data : {'msg10': '0x04', 'msg12': '0xDE', 'msg11': '0x3B', 'msg13': '0x80', 'packetlen': '0x14', 'msg4': '0x0C', 'msg9': '0x1C', 'subtype': '0x00', 'cmnd': '0x02', 'msg16': '0x4D', 'msg14': '0x43', 'seqnbr': '0x01', 'msg6': '0x00', 'msg15': '0x4F', 'msg2': '0x13', 'msg5': '0x2F', 'packettype': '0x01', 'msg3': '0x00', 'msg7': '0x01', 'msg8': '0x03', 'msg1': '0x53'}
[2020-12-02 19:50:12][DEBUG] : Subtype = response on a mode command
[2020-12-02 19:50:12][DEBUG] : Firmware version = 0x13
[2020-12-02 19:50:12][DEBUG] : RFXtrx433 operating at 433.92MHz
[2020-12-02 19:50:12][DEBUG] : Hardware major version = 0x01
[2020-12-02 19:50:12][DEBUG] : Hardware minor version = 0x03
[2020-12-02 19:50:12][DEBUG] : Output power = 0x1C
[2020-12-02 19:50:12][DEBUG] : Firmware Ext2
[2020-12-02 19:50:12][DEBUG] : Noise level (only used in special firmware) = 0x3B
[2020-12-02 19:50:12][DEBUG] : AE Blyss : 0
[2020-12-02 19:50:12][DEBUG] : Rubicson,Alecto,Banggood/Davis AU : 0
[2020-12-02 19:50:12][DEBUG] : FineOffset,Viking/Davis US : 0
[2020-12-02 19:50:12][DEBUG] : Lighting4/Davis EU : 0
[2020-12-02 19:50:12][DEBUG] : RSL,Revolt/La Crosse : 0
[2020-12-02 19:50:12][DEBUG] : Byron SX,SelectPlus/Alecto5500 : 0
[2020-12-02 19:50:12][DEBUG] : Imagintronix,Opus/Alecto2010/Alecto : 0
[2020-12-02 19:50:12][DEBUG] : undec on : 0
[2020-12-02 19:50:12][DEBUG] : Mertik/Edisio : 0
[2020-12-02 19:50:12][DEBUG] : AD LightwaveRF : 0
[2020-12-02 19:50:12][DEBUG] : Hideki,TFA,Cresta,UPM/FS20 : 0
[2020-12-02 19:50:12][DEBUG] : La Crosse : 0
[2020-12-02 19:50:12][DEBUG] : Legrand CAD : 1
[2020-12-02 19:50:12][DEBUG] : BlindsT0 : 0
[2020-12-02 19:50:12][DEBUG] : BlindsTx : 0
[2020-12-02 19:50:12][DEBUG] : X10 : 0
[2020-12-02 19:50:12][DEBUG] : ARC : 0
[2020-12-02 19:50:12][DEBUG] : AC : 1
[2020-12-02 19:50:12][DEBUG] : HomeEasy EU : 0
[2020-12-02 19:50:12][DEBUG] : Meiantech,Atlantic/Proguard : 1
[2020-12-02 19:50:12][DEBUG] : Oregon Scientific/Keeloq : 1
[2020-12-02 19:50:12][DEBUG] : ATI/cartelectronic/Meiantech,Atlantic : 1
[2020-12-02 19:50:12][DEBUG] : Visonic : 1
[2020-12-02 19:50:12][DEBUG] : Keeloq : 0
[2020-12-02 19:50:12][DEBUG] : HomeConfort,Fan : 0
[2020-12-02 19:50:12][DEBUG] : Honeywell Chime : 0
[2020-12-02 19:50:12][DEBUG] : MCZ 434.50/Itho CVE ECO RFT : 0
[2020-12-02 19:50:12][DEBUG] : FunkBus 433.42/Itho CVE RFT : 0
[2020-12-02 19:50:13][DEBUG] : Client connected to [127.0.0.1:55029]
[2020-12-02 19:50:13][DEBUG] : Message read from socket: b'{"apikey":"pOFNHK3v2OWNT1frYR4lQKTTxfD1Kqsc","cmd":"add","device":{"id":"0177FA46"}}'
[2020-12-02 19:50:13][DEBUG] : Client disconnected from [127.0.0.1:55029]
[2020-12-02 19:50:13][DEBUG] : Client connected to [127.0.0.1:55030]
[2020-12-02 19:50:13][DEBUG] : Message read from socket: b'{"apikey":"pOFNHK3v2OWNT1frYR4lQKTTxfD1Kqsc","cmd":"add","device":{"id":"2301"}}'
[2020-12-02 19:50:13][DEBUG] : Client disconnected from [127.0.0.1:55030]
[2020-12-02 19:50:13][DEBUG] : Message received in socket JEEDOM_SOCKET_MESSAGE
[2020-12-02 19:50:13][DEBUG] : Add device : {'id': '0177FA46'}
[2020-12-02 19:50:13][DEBUG] : Client connected to [127.0.0.1:55031]
[2020-12-02 19:50:13][DEBUG] : Message read from socket: b'{"apikey":"pOFNHK3v2OWNT1frYR4lQKTTxfD1Kqsc","cmd":"add","device":{"id":"5402"}}'
[2020-12-02 19:50:13][DEBUG] : Client disconnected from [127.0.0.1:55031]
[2020-12-02 19:50:13][DEBUG] : Client connected to [127.0.0.1:55032]
[2020-12-02 19:50:13][DEBUG] : Message read from socket: b'{"apikey":"pOFNHK3v2OWNT1frYR4lQKTTxfD1Kqsc","cmd":"add","device":{"id":"6604"}}'
[2020-12-02 19:50:13][DEBUG] : Client disconnected from [127.0.0.1:55032]
[2020-12-02 19:50:13][DEBUG] : Client connected to [127.0.0.1:55033]
[2020-12-02 19:50:13][DEBUG] : Message read from socket: b'{"apikey":"pOFNHK3v2OWNT1frYR4lQKTTxfD1Kqsc","cmd":"add","device":{"id":"81D2"}}'
[2020-12-02 19:50:13][DEBUG] : Client disconnected from [127.0.0.1:55033]
[2020-12-02 19:50:13][DEBUG] : Client connected to [127.0.0.1:55035]
[2020-12-02 19:50:13][DEBUG] : Message received in socket JEEDOM_SOCKET_MESSAGE
[2020-12-02 19:50:13][DEBUG] : Add device : {'id': '2301'}
[2020-12-02 19:50:13][DEBUG] : Message read from socket: b'{"apikey":"pOFNHK3v2OWNT1frYR4lQKTTxfD1Kqsc","cmd":"add","device":{"id":"9201"}}'
[2020-12-02 19:50:13][DEBUG] : Client disconnected from [127.0.0.1:55035]
[2020-12-02 19:50:13][DEBUG] : Client connected to [127.0.0.1:55036]
[2020-12-02 19:50:13][DEBUG] : Message read from socket: b'{"apikey":"pOFNHK3v2OWNT1frYR4lQKTTxfD1Kqsc","cmd":"add","device":{"id":"F402"}}'
[2020-12-02 19:50:13][DEBUG] : Client disconnected from [127.0.0.1:55036]
[2020-12-02 19:50:13][DEBUG] : Client connected to [127.0.0.1:55037]
[2020-12-02 19:50:13][DEBUG] : Message read from socket: b'{"apikey":"pOFNHK3v2OWNT1frYR4lQKTTxfD1Kqsc","cmd":"add","device":{"id":"00E906CE"}}'
[2020-12-02 19:50:13][DEBUG] : Client disconnected from [127.0.0.1:55037]
[2020-12-02 19:50:13][DEBUG] : Client connected to [127.0.0.1:55038]
[2020-12-02 19:50:13][DEBUG] : Message read from socket: b'{"apikey":"pOFNHK3v2OWNT1frYR4lQKTTxfD1Kqsc","cmd":"add","device":{"id":"01003836"}}'
[2020-12-02 19:50:13][DEBUG] : Client disconnected from [127.0.0.1:55038]
[2020-12-02 19:50:13][DEBUG] : Client connected to [127.0.0.1:55041]
[2020-12-02 19:50:13][DEBUG] : Message read from socket: b'{"apikey":"pOFNHK3v2OWNT1frYR4lQKTTxfD1Kqsc","cmd":"add","device":{"id":"0100449E"}}'
[2020-12-02 19:50:13][DEBUG] : Client disconnected from [127.0.0.1:55041]
[2020-12-02 19:50:13][DEBUG] : Message received in socket JEEDOM_SOCKET_MESSAGE
[2020-12-02 19:50:13][DEBUG] : Add device : {'id': '5402'}
[2020-12-02 19:50:13][DEBUG] : Message received in socket JEEDOM_SOCKET_MESSAGE
[2020-12-02 19:50:13][DEBUG] : Add device : {'id': '6604'}
[2020-12-02 19:50:13][DEBUG] : Message received in socket JEEDOM_SOCKET_MESSAGE
[2020-12-02 19:50:13][DEBUG] : Add device : {'id': '81D2'}
[2020-12-02 19:50:13][DEBUG] : Message received in socket JEEDOM_SOCKET_MESSAGE
[2020-12-02 19:50:13][DEBUG] : Add device : {'id': '9201'}
[2020-12-02 19:50:13][DEBUG] : Message received in socket JEEDOM_SOCKET_MESSAGE
[2020-12-02 19:50:13][DEBUG] : Add device : {'id': 'F402'}
[2020-12-02 19:50:13][DEBUG] : Message received in socket JEEDOM_SOCKET_MESSAGE
[2020-12-02 19:50:13][DEBUG] : Add device : {'id': '00E906CE'}
[2020-12-02 19:50:13][DEBUG] : Message received in socket JEEDOM_SOCKET_MESSAGE
[2020-12-02 19:50:13][DEBUG] : Add device : {'id': '01003836'}
[2020-12-02 19:50:13][DEBUG] : Message received in socket JEEDOM_SOCKET_MESSAGE
[2020-12-02 19:50:13][DEBUG] : Add device : {'id': '0100449E'}
[2020-12-02 19:50:13][DEBUG] : Client connected to [127.0.0.1:55039]
[2020-12-02 19:50:13][DEBUG] : Message read from socket: b'{"apikey":"pOFNHK3v2OWNT1frYR4lQKTTxfD1Kqsc","cmd":"add","device":{"id":"01002F72"}}'
[2020-12-02 19:50:13][DEBUG] : Client disconnected from [127.0.0.1:55039]
[2020-12-02 19:50:13][DEBUG] : Client connected to [127.0.0.1:55040]
[2020-12-02 19:50:13][DEBUG] : Message read from socket: b'{"apikey":"pOFNHK3v2OWNT1frYR4lQKTTxfD1Kqsc","cmd":"add","device":{"id":"01003786"}}'
[2020-12-02 19:50:13][DEBUG] : Client disconnected from [127.0.0.1:55040]
[2020-12-02 19:50:13][DEBUG] : Message received in socket JEEDOM_SOCKET_MESSAGE
[2020-12-02 19:50:13][DEBUG] : Add device : {'id': '01002F72'}
[2020-12-02 19:50:13][DEBUG] : Message received in socket JEEDOM_SOCKET_MESSAGE
[2020-12-02 19:50:13][DEBUG] : Add device : {'id': '01003786'}
[2020-12-02 19:50:13][DEBUG] : msg3: [0, 0, 0, 0, 0, 0, 0, 0] / 00
[2020-12-02 19:50:13][DEBUG] : msg4: [0, 0, 0, 0, 1, 1, 0, 0] / 0c
[2020-12-02 19:50:13][DEBUG] : msg5: [0, 0, 1, 0, 1, 1, 1, 1] / 2f
[2020-12-02 19:50:13][DEBUG] : msg6: [0, 0, 0, 0, 0, 0, 0, 0] / 00
[2020-12-02 19:50:13][DEBUG] : Command: 0d000002035300000c2f00000000
[2020-12-02 19:50:13][DEBUG] : Protocol actually activated 000c2f00
[2020-12-02 19:50:13][DEBUG] : Actual Frequency 53
[2020-12-02 19:50:13][DEBUG] : Wanted protocol 000c2f00
[2020-12-02 19:50:14][DEBUG] : Client connected to [127.0.0.1:55042]
[2020-12-02 19:50:14][DEBUG] : Message read from socket: b'{"apikey":"pOFNHK3v2OWNT1frYR4lQKTTxfD1Kqsc","cmd":"add","device":{"id":"0149F78E"}}'
[2020-12-02 19:50:14][DEBUG] : Client disconnected from [127.0.0.1:55042]
[2020-12-02 19:50:14][DEBUG] : Client connected to [127.0.0.1:55063]
[2020-12-02 19:50:14][DEBUG] : Message read from socket: b'{"apikey":"pOFNHK3v2OWNT1frYR4lQKTTxfD1Kqsc","cmd":"add","device":{"id":"3404"}}'
[2020-12-02 19:50:14][DEBUG] : Client disconnected from [127.0.0.1:55063]
[2020-12-02 19:50:14][DEBUG] : Client connected to [127.0.0.1:55064]
[2020-12-02 19:50:14][DEBUG] : Message read from socket: b'{"apikey":"pOFNHK3v2OWNT1frYR4lQKTTxfD1Kqsc","cmd":"add","device":{"id":"01458226"}}'
[2020-12-02 19:50:14][DEBUG] : Client disconnected from [127.0.0.1:55064]
[2020-12-02 19:50:14][DEBUG] : Client connected to [127.0.0.1:55065]
[2020-12-02 20:50:14][INFO] : Démon RFXcom lancé
[2020-12-02 19:50:14][DEBUG] : Message received in socket JEEDOM_SOCKET_MESSAGE
[2020-12-02 19:50:14][DEBUG] : Add device : {'id': '0149F78E'}
[2020-12-02 19:50:14][DEBUG] : Message read from socket: b'{"apikey":"pOFNHK3v2OWNT1frYR4lQKTTxfD1Kqsc","cmd":"add","device":{"id":"01003E6A"}}'
[2020-12-02 19:50:14][DEBUG] : Client disconnected from [127.0.0.1:55065]
[2020-12-02 19:50:14][DEBUG] : Client connected to [127.0.0.1:55066]
[2020-12-02 19:50:14][DEBUG] : Message read from socket: b'{"apikey":"pOFNHK3v2OWNT1frYR4lQKTTxfD1Kqsc","cmd":"add","device":{"id":"010039C6"}}'
[2020-12-02 19:50:14][DEBUG] : Client disconnected from [127.0.0.1:55066]
[2020-12-02 19:50:14][DEBUG] : Client connected to [127.0.0.1:55067]
[2020-12-02 19:50:14][DEBUG] : Message read from socket: b'{"apikey":"pOFNHK3v2OWNT1frYR4lQKTTxfD1Kqsc","cmd":"add","device":{"id":"01003CC6"}}'
[2020-12-02 19:50:14][DEBUG] : Client disconnected from [127.0.0.1:55067]
[2020-12-02 19:50:14][DEBUG] : Client connected to [127.0.0.1:55068]
[2020-12-02 19:50:14][DEBUG] : Message received in socket JEEDOM_SOCKET_MESSAGE
[2020-12-02 19:50:14][DEBUG] : Add device : {'id': '3404'}
[2020-12-02 19:50:14][DEBUG] : Message read from socket: b'{"apikey":"pOFNHK3v2OWNT1frYR4lQKTTxfD1Kqsc","cmd":"add","device":{"id":"009ED482"}}'
[2020-12-02 19:50:14][DEBUG] : Client disconnected from [127.0.0.1:55068]
[2020-12-02 19:50:14][DEBUG] : Message received in socket JEEDOM_SOCKET_MESSAGE
[2020-12-02 19:50:14][DEBUG] : Add device : {'id': '01458226'}
[2020-12-02 19:50:14][DEBUG] : Message received in socket JEEDOM_SOCKET_MESSAGE
[2020-12-02 19:50:14][DEBUG] : Add device : {'id': '01003E6A'}
[2020-12-02 19:50:14][DEBUG] : Message received in socket JEEDOM_SOCKET_MESSAGE
[2020-12-02 19:50:14][DEBUG] : Add device : {'id': '010039C6'}
[2020-12-02 19:50:14][DEBUG] : Message received in socket JEEDOM_SOCKET_MESSAGE
[2020-12-02 19:50:14][DEBUG] : Add device : {'id': '01003CC6'}
[2020-12-02 19:50:14][DEBUG] : Message received in socket JEEDOM_SOCKET_MESSAGE
[2020-12-02 19:50:14][DEBUG] : Add device : {'id': '009ED482'}
[2020-12-02 19:50:39][DEBUG] : Message: 085002003404002760
[2020-12-02 19:50:39][DEBUG] : Decode : 085002003404002760
[2020-12-02 19:50:39][DEBUG] : Test message: 085002003404002760
[2020-12-02 19:50:39][DEBUG] : PacketType: 0x50
[2020-12-02 19:50:39][DEBUG] : Length: 9
[2020-12-02 19:50:39][DEBUG] : Start decoding packet type 0x50
[2020-12-02 19:50:39][DEBUG] : Subtype = TEMP2 is THC238/268,THN132,THWR288,THRN122,THN122,AW129/131,THN129
[2020-12-02 19:50:39][DEBUG] : Data : {'seqnbr': '0x00', 'id2': '0x04', 'temperature': 39, 'battery': 10, 'packetlen': '0x08', 'packettype': '0x50', 'id1': '0x34', 'subtype': '0x02', 'temperaturesign': '', 'rssi': 6}
[2020-12-02 19:50:39][DEBUG] : Decoded info : {'temperature': '3.9', 'battery': 10, 'id': '3404', 'packettype': '0x50', 'subtype': '0x02', 'rssi': 6}
[2020-12-02 19:50:39][DEBUG] : Device is known id : 3404
[2020-12-02 19:50:39][DEBUG] : Send to jeedom : {'devices': {'340450': {'temperature': '3.9', 'battery': 10, 'id': '3404', 'packettype': '0x50', 'subtype': '0x02', 'rssi': 6}}}
[2020-12-02 19:50:39][DEBUG] : Starting new HTTP connection (1): 127.0.0.1:80
[2020-12-02 20:50:39][DEBUG] : {"devices":{"340450":{"temperature":"3.9","battery":10,"id":"3404","packettype":"0x50","subtype":"0x02","rssi":6}}}
[2020-12-02 19:50:39][DEBUG] : http://127.0.0.1:80 "POST /plugins/rfxcom/core/php/jeeRfxcom.php?apikey=pOFNHK3v2OWNT1frYR4lQKTTxfD1Kqsc HTTP/1.1" 200 0
[2020-12-02 19:50:46][DEBUG] : Message: 115a020181d20000000000000079783bde80
[2020-12-02 19:50:46][DEBUG] : Decode : 115a020181d20000000000000079783bde80
[2020-12-02 19:50:46][DEBUG] : Test message: 115a020181d20000000000000079783bde80
[2020-12-02 19:50:46][DEBUG] : PacketType: 0x5A
[2020-12-02 19:50:46][DEBUG] : Length: 18
[2020-12-02 19:50:46][DEBUG] : Start decoding packet type 0x5A
[2020-12-02 19:50:46][DEBUG] : Subtype = ELEC3 is CM180
[2020-12-02 19:50:46][DEBUG] : Data : {'seqnbr': '0x01', 'id2': '0xD2', 'battery': 10, 'packetlen': '0x11', 'packettype': '0x5A', 'id1': '0x81', 'subtype': '0x02', 'count': 0, 'rssi': 8, 'instant': 0, 'total': 2037922782}
[2020-12-02 19:50:46][DEBUG] : Decoded info : {'battery': 10, 'id': '81D2', 'packettype': '0x5A', 'subtype': '0x02', 'count': 0, 'rssi': 8, 'instant': 0, 'total': 9111455.39}
[2020-12-02 19:50:46][DEBUG] : Device is known id : 81D2
[2020-12-02 19:50:46][DEBUG] : Send to jeedom : {'devices': {'81D25A': {'battery': 10, 'id': '81D2', 'packettype': '0x5A', 'subtype': '0x02', 'count': 0, 'rssi': 8, 'instant': 0, 'total': 9111455.39}}}
[2020-12-02 19:50:46][DEBUG] : Starting new HTTP connection (1): 127.0.0.1:80
[2020-12-02 20:50:46][DEBUG] : {"devices":{"81D25A":{"battery":10,"id":"81D2","packettype":"0x5A","subtype":"0x02","count":0,"rssi":8,"instant":0,"total":9111455.39}}}
[2020-12-02 19:50:46][DEBUG] : http://127.0.0.1:80 "POST /plugins/rfxcom/core/php/jeeRfxcom.php?apikey=pOFNHK3v2OWNT1frYR4lQKTTxfD1Kqsc HTTP/1.1" 200 0
[2020-12-02 19:51:22][DEBUG] : Message: 085002023404002760
[2020-12-02 19:51:22][DEBUG] : Decode : 085002023404002760
[2020-12-02 19:51:22][DEBUG] : Test message: 085002023404002760
[2020-12-02 19:51:22][DEBUG] : PacketType: 0x50
[2020-12-02 19:51:22][DEBUG] : Length: 9
[2020-12-02 19:51:22][DEBUG] : Start decoding packet type 0x50
[2020-12-02 19:51:22][DEBUG] : Subtype = TEMP2 is THC238/268,THN132,THWR288,THRN122,THN122,AW129/131,THN129
[2020-12-02 19:51:22][DEBUG] : Data : {'seqnbr': '0x02', 'id2': '0x04', 'temperature': 39, 'battery': 10, 'packetlen': '0x08', 'packettype': '0x50', 'id1': '0x34', 'subtype': '0x02', 'temperaturesign': '', 'rssi': 6}
[2020-12-02 19:51:22][DEBUG] : Decoded info : {'temperature': '3.9', 'battery': 10, 'id': '3404', 'packettype': '0x50', 'subtype': '0x02', 'rssi': 6}
[2020-12-02 19:51:22][DEBUG] : Device is known id : 3404
[2020-12-02 19:51:22][DEBUG] : Send to jeedom : {'devices': {'340450': {'temperature': '3.9', 'battery': 10, 'id': '3404', 'packettype': '0x50', 'subtype': '0x02', 'rssi': 6}}}
[2020-12-02 19:51:22][DEBUG] : Starting new HTTP connection (1): 127.0.0.1:80
[2020-12-02 20:51:22][DEBUG] : {"devices":{"340450":{"temperature":"3.9","battery":10,"id":"3404","packettype":"0x50","subtype":"0x02","rssi":6}}}
[2020-12-02 19:51:22][DEBUG] : http://127.0.0.1:80 "POST /plugins/rfxcom/core/php/jeeRfxcom.php?apikey=pOFNHK3v2OWNT1frYR4lQKTTxfD1Kqsc HTTP/1.1" 200 0
[2020-12-02 19:51:46][DEBUG] : Message: 115a020381d20000000000000079783bde80
[2020-12-02 19:51:46][DEBUG] : Decode : 115a020381d20000000000000079783bde80
[2020-12-02 19:51:46][DEBUG] : Test message: 115a020381d20000000000000079783bde80
[2020-12-02 19:51:46][DEBUG] : PacketType: 0x5A
[2020-12-02 19:51:46][DEBUG] : Length: 18
[2020-12-02 19:51:46][DEBUG] : Start decoding packet type 0x5A
[2020-12-02 19:51:46][DEBUG] : Subtype = ELEC3 is CM180
[2020-12-02 19:51:46][DEBUG] : Data : {'seqnbr': '0x03', 'id2': '0xD2', 'battery': 10, 'packetlen': '0x11', 'packettype': '0x5A', 'id1': '0x81', 'subtype': '0x02', 'count': 0, 'rssi': 8, 'instant': 0, 'total': 2037922782}
[2020-12-02 19:51:46][DEBUG] : Decoded info : {'battery': 10, 'id': '81D2', 'packettype': '0x5A', 'subtype': '0x02', 'count': 0, 'rssi': 8, 'instant': 0, 'total': 9111455.39}
[2020-12-02 19:51:46][DEBUG] : Device is known id : 81D2
[2020-12-02 19:51:46][DEBUG] : Send to jeedom : {'devices': {'81D25A': {'battery': 10, 'id': '81D2', 'packettype': '0x5A', 'subtype': '0x02', 'count': 0, 'rssi': 8, 'instant': 0, 'total': 9111455.39}}}
[2020-12-02 19:51:46][DEBUG] : Starting new HTTP connection (1): 127.0.0.1:80
[2020-12-02 20:51:46][DEBUG] : {"devices":{"81D25A":{"battery":10,"id":"81D2","packettype":"0x5A","subtype":"0x02","count":0,"rssi":8,"instant":0,"total":9111455.39}}}
[2020-12-02 19:51:46][DEBUG] : http://127.0.0.1:80 "POST /plugins/rfxcom/core/php/jeeRfxcom.php?apikey=pOFNHK3v2OWNT1frYR4lQKTTxfD1Kqsc HTTP/1.1" 200 0
[2020-12-02 19:52:05][DEBUG] : Message: 085002043404002760
[2020-12-02 19:52:05][DEBUG] : Decode : 085002043404002760
[2020-12-02 19:52:05][DEBUG] : Test message: 085002043404002760
[2020-12-02 19:52:05][DEBUG] : PacketType: 0x50
[2020-12-02 19:52:05][DEBUG] : Length: 9
[2020-12-02 19:52:05][DEBUG] : Start decoding packet type 0x50
[2020-12-02 19:52:05][DEBUG] : Subtype = TEMP2 is THC238/268,THN132,THWR288,THRN122,THN122,AW129/131,THN129
[2020-12-02 19:52:05][DEBUG] : Data : {'seqnbr': '0x04', 'id2': '0x04', 'temperature': 39, 'battery': 10, 'packetlen': '0x08', 'packettype': '0x50', 'id1': '0x34', 'subtype': '0x02', 'temperaturesign': '', 'rssi': 6}
[2020-12-02 19:52:05][DEBUG] : Decoded info : {'temperature': '3.9', 'battery': 10, 'id': '3404', 'packettype': '0x50', 'subtype': '0x02', 'rssi': 6}
[2020-12-02 19:52:05][DEBUG] : Device is known id : 3404
[2020-12-02 19:52:05][DEBUG] : Send to jeedom : {'devices': {'340450': {'temperature': '3.9', 'battery': 10, 'id': '3404', 'packettype': '0x50', 'subtype': '0x02', 'rssi': 6}}}
[2020-12-02 19:52:05][DEBUG] : Starting new HTTP connection (1): 127.0.0.1:80
[2020-12-02 20:52:05][DEBUG] : {"devices":{"340450":{"temperature":"3.9","battery":10,"id":"3404","packettype":"0x50","subtype":"0x02","rssi":6}}}
[2020-12-02 19:52:05][DEBUG] : http://127.0.0.1:80 "POST /plugins/rfxcom/core/php/jeeRfxcom.php?apikey=pOFNHK3v2OWNT1frYR4lQKTTxfD1Kqsc HTTP/1.1" 200 0
[2020-12-02 19:52:46][DEBUG] : Message: 115a020581d20000000000000079783bde80
[2020-12-02 19:52:46][DEBUG] : Decode : 115a020581d20000000000000079783bde80
[2020-12-02 19:52:46][DEBUG] : Test message: 115a020581d20000000000000079783bde80
[2020-12-02 19:52:46][DEBUG] : PacketType: 0x5A
[2020-12-02 19:52:46][DEBUG] : Length: 18
[2020-12-02 19:52:46][DEBUG] : Start decoding packet type 0x5A
[2020-12-02 19:52:46][DEBUG] : Subtype = ELEC3 is CM180
[2020-12-02 19:52:46][DEBUG] : Data : {'seqnbr': '0x05', 'id2': '0xD2', 'battery': 10, 'packetlen': '0x11', 'packettype': '0x5A', 'id1': '0x81', 'subtype': '0x02', 'count': 0, 'rssi': 8, 'instant': 0, 'total': 2037922782}
[2020-12-02 19:52:46][DEBUG] : Decoded info : {'battery': 10, 'id': '81D2', 'packettype': '0x5A', 'subtype': '0x02', 'count': 0, 'rssi': 8, 'instant': 0, 'total': 9111455.39}
[2020-12-02 19:52:46][DEBUG] : Device is known id : 81D2
[2020-12-02 19:52:46][DEBUG] : Send to jeedom : {'devices': {'81D25A': {'battery': 10, 'id': '81D2', 'packettype': '0x5A', 'subtype': '0x02', 'count': 0, 'rssi': 8, 'instant': 0, 'total': 9111455.39}}}
[2020-12-02 19:52:46][DEBUG] : Starting new HTTP connection (1): 127.0.0.1:80
[2020-12-02 20:52:46][DEBUG] : {"devices":{"81D25A":{"battery":10,"id":"81D2","packettype":"0x5A","subtype":"0x02","count":0,"rssi":8,"instant":0,"total":9111455.39}}}
[2020-12-02 19:52:46][DEBUG] : http://127.0.0.1:80 "POST /plugins/rfxcom/core/php/jeeRfxcom.php?apikey=pOFNHK3v2OWNT1frYR4lQKTTxfD1Kqsc HTTP/1.1" 200 0
[2020-12-02 19:52:48][DEBUG] : Message: 085002063404002760
[2020-12-02 19:52:48][DEBUG] : Decode : 085002063404002760
[2020-12-02 19:52:48][DEBUG] : Test message: 085002063404002760
[2020-12-02 19:52:48][DEBUG] : PacketType: 0x50
[2020-12-02 19:52:48][DEBUG] : Length: 9
[2020-12-02 19:52:48][DEBUG] : Start decoding packet type 0x50
[2020-12-02 19:52:48][DEBUG] : Subtype = TEMP2 is THC238/268,THN132,THWR288,THRN122,THN122,AW129/131,THN129
[2020-12-02 19:52:48][DEBUG] : Data : {'seqnbr': '0x06', 'id2': '0x04', 'temperature': 39, 'battery': 10, 'packetlen': '0x08', 'packettype': '0x50', 'id1': '0x34', 'subtype': '0x02', 'temperaturesign': '', 'rssi': 6}
[2020-12-02 19:52:48][DEBUG] : Decoded info : {'temperature': '3.9', 'battery': 10, 'id': '3404', 'packettype': '0x50', 'subtype': '0x02', 'rssi': 6}
[2020-12-02 19:52:48][DEBUG] : Device is known id : 3404
[2020-12-02 19:52:48][DEBUG] : Send to jeedom : {'devices': {'340450': {'temperature': '3.9', 'battery': 10, 'id': '3404', 'packettype': '0x50', 'subtype': '0x02', 'rssi': 6}}}
[2020-12-02 19:52:48][DEBUG] : Starting new HTTP connection (1): 127.0.0.1:80
[2020-12-02 20:52:48][DEBUG] : {"devices":{"340450":{"temperature":"3.9","battery":10,"id":"3404","packettype":"0x50","subtype":"0x02","rssi":6}}}
[2020-12-02 19:52:48][DEBUG] : http://127.0.0.1:80 "POST /plugins/rfxcom/core/php/jeeRfxcom.php?apikey=pOFNHK3v2OWNT1frYR4lQKTTxfD1Kqsc HTTP/1.1" 200 0
Pour le log http error, il est vide!!
Problème résolu, il suffit de redémarrer Jeedom!!!
Ce sujet a été automatiquement fermé après 24 heures suivant le dernier commentaire. Aucune réponse n’est permise dorénavant.