Impossibilité d'inclure des détecteurs de présence

Bien joué !
L’inclusion marche parfaitement. Je viens d’inclure 3 détecteurs de présence et un d’ouverture de porte.

Voilà les logs (seuls les premiers, pas assez de caractères dispo pour le post):

[2021-02-04 16:06:01][ERROR] : Erreur sur la fonction deamon_start du plugin : Vous devez attendre au moins 45 secondes entre deux lancements du démon. Dernier lancement : 2021-02-04 16:05:34
[2021-02-04 16:06:52][INFO] : Lancement démon rfxcomd : /usr/bin/python3 /var/www/html/plugins/rfxcom/resources/rfxcomd/rfxcomd.py --device auto --loglevel debug --socketport 55000 --serialrate 38400 --protocol 1,2,3,4,5,6,7,10,11,12,13,14,16,17,18,19,20,21,22,23 --callback http://127.0.0.1:80/plugins/rfxcom/core/php/jeeRfxcom.php --apikey T9uSVRrqpSv6QkAQgxhgxjgIAjVcJYMg --cycle 0.3 --pid /tmp/jeedom/rfxcom/deamon.pid
[2021-02-04 16:06:52][INFO] : Start rfxcomd
[2021-02-04 16:06:52][INFO] : Log level : debug
[2021-02-04 16:06:52][INFO] : Socket port : 55000
[2021-02-04 16:06:52][INFO] : Socket host : 127.0.0.1
[2021-02-04 16:06:52][INFO] : PID file : /tmp/jeedom/rfxcom/deamon.pid
[2021-02-04 16:06:52][INFO] : Device : auto
[2021-02-04 16:06:52][INFO] : Apikey : T9uSVRrqpSv6QkAQgxhgxjgIAjVcJYMg
[2021-02-04 16:06:52][INFO] : Callback : http://127.0.0.1:80/plugins/rfxcom/core/php/jeeRfxcom.php
[2021-02-04 16:06:52][INFO] : Cycle : 0.3
[2021-02-04 16:06:52][INFO] : Serial rate : 38400
[2021-02-04 16:06:52][INFO] : Serial timeout : 9
[2021-02-04 16:06:52][INFO] : Protocol : 1,2,3,4,5,6,7,10,11,12,13,14,16,17,18,19,20,21,22,23
[2021-02-04 16:06:52][INFO] : Find device : /dev/ttyUSB0
[2021-02-04 16:06:52][DEBUG] : Load decoder packet type 0x01 : Interface Response Message
[2021-02-04 16:06:52][DEBUG] : Load decoder packet type 0x02 : Receiver/Transmitter Message
[2021-02-04 16:06:52][DEBUG] : Load decoder packet type 0x10 : Lighting1 (X10, ARC, ELRO, Waveman, EMW200, IMPULS,RisingSun, Philips, Energenie, GDR2, HQ, Oase)
[2021-02-04 16:06:52][DEBUG] : Load decoder packet type 0x11 : Lighting2 (AC, HomeEasy EU, ANSLUT, Kambrook)
[2021-02-04 16:06:52][DEBUG] : Load decoder packet type 0x13 : Lighting4 (PT2262)
[2021-02-04 16:06:52][DEBUG] : Load decoder packet type 0x14 : Lighting5 ( LightwaveRF, Siemens, EMW100, BBSB, MDREMOTE,RSL2, OTIO, Livolo, RGB, Aoke relay, Eurodomest, RGB432W, Legrand,Avantek, IT, Kangtai)
[2021-02-04 16:06:52][DEBUG] : Load decoder packet type 0x15 : Lighting6 (Blyss (AE), Cuveo)
[2021-02-04 16:06:52][DEBUG] : Load decoder packet type 0x16 : Chime (Byron SX, Byron MP001, SelectPlus, Envivo, Alfawise)
[2021-02-04 16:06:52][DEBUG] : Load decoder packet type 0x17 : Fan (Siemens SF01, Itho, LucciAir, SEAV,Westinghouse,Casafan,FT1211R,Novy)
[2021-02-04 16:06:52][DEBUG] : Load decoder packet type 0x19 : Blinds1 (RollerTrol,Hasta,A-OK,Raex, Media Mount, DC)
[2021-02-04 16:06:52][DEBUG] : Load decoder packet type 0x1C : Edisio
[2021-02-04 16:06:52][DEBUG] : Load decoder packet type 0x1D : Honeywell ActivLink
[2021-02-04 16:06:52][DEBUG] : Load decoder packet type 0x1E : FunkBus
[2021-02-04 16:06:52][DEBUG] : Load decoder packet type 0x1F : Hunter Fan
[2021-02-04 16:06:52][DEBUG] : Load decoder packet type 0x20 : Security1 (X10, KD101, Visonic, Meiantech, SA30, SA33, RM174RF)
[2021-02-04 16:06:52][DEBUG] : Load decoder packet type 0x21 : Security2 (KeeLoq)
[2021-02-04 16:06:52][DEBUG] : Load decoder packet type 0x28 : Camera1 (Ninja/Robocam)
[2021-02-04 16:06:52][DEBUG] : Load decoder packet type 0x30 : Remote control and IR (ATI, Medion, PC Remote)
[2021-02-04 16:06:52][DEBUG] : Load decoder packet type 0x40 : Thermostat1 (Digimax)
[2021-02-04 16:06:52][DEBUG] : Load decoder packet type 0x42 : Thermostat3 (Mertik-Maxitrol G6R-H4 type)
[2021-02-04 16:06:52][DEBUG] : Load decoder packet type 0x4E : BBQ Temperature sensors (BBQ1)
[2021-02-04 16:06:52][DEBUG] : Load decoder packet type 0x4F : Temperature and rain sensors
[2021-02-04 16:06:52][DEBUG] : Load decoder packet type 0x50 : Temperature sensors
[2021-02-04 16:06:52][DEBUG] : Load decoder packet type 0x51 : Humidity sensors
[2021-02-04 16:06:52][DEBUG] : Load decoder packet type 0x52 : Temperature and humidity sensors
[2021-02-04 16:06:52][DEBUG] : Load decoder packet type 0x53 : Barometric sensors
[2021-02-04 16:06:52][DEBUG] : Load decoder packet type 0x54 : Temperature, humidity and barometric sensors
[2021-02-04 16:06:52][DEBUG] : Load decoder packet type 0x55 : Rain sensors
[2021-02-04 16:06:52][DEBUG] : Load decoder packet type 0x56 : Wind sensors
[2021-02-04 16:06:52][DEBUG] : Load decoder packet type 0x57 : UV sensors
[2021-02-04 16:06:52][DEBUG] : Load decoder packet type 0x58 : Date/time sensors
[2021-02-04 16:06:52][DEBUG] : Load decoder packet type 0x59 : Current sensors
[2021-02-04 16:06:52][DEBUG] : Load decoder packet type 0x5A : Current sensors
[2021-02-04 16:06:52][DEBUG] : Load decoder packet type 0x5B : Current + ENERGY sensors
[2021-02-04 16:06:52][DEBUG] : Load decoder packet type 0x5C : Power sensors
[2021-02-04 16:06:52][DEBUG] : Load decoder packet type 0x5D : Weighting scale
[2021-02-04 16:06:52][DEBUG] : Load decoder packet type 0x60 : CARTELECTRONIC
[2021-02-04 16:06:52][DEBUG] : Load decoder packet type 0x70 : RFXsensor
[2021-02-04 16:06:52][DEBUG] : Load decoder packet type 0x71 : RFXMeter
[2021-02-04 16:06:52][DEBUG] : Load decoder packet type 0x72 : FS20 (FS20, FHT 8V, FHT80)
[2021-02-04 16:06:52][DEBUG] : Load decoder packet type 0x76 : Weather stations (WEATHER1-WEATHER2)
[2021-02-04 16:06:52][DEBUG] : Load decoder packet type 0x77 : SOLAR1
[2021-02-04 16:06:52][DEBUG] : Writing PID 9919 to /tmp/jeedom/rfxcom/deamon.pid
[2021-02-04 16:06:52][DEBUG] : Init request module v2.21.0
[2021-02-04 16:06:52][DEBUG] : Starting new HTTP connection (1): 127.0.0.1:80
[2021-02-04 16:06:52][DEBUG] : null
[2021-02-04 16:06:52][DEBUG] : http://127.0.0.1:80 "GET /plugins/rfxcom/core/php/jeeRfxcom.php?apikey=T9uSVRrqpSv6QkAQgxhgxjgIAjVcJYMg HTTP/1.1" 200 0
[2021-02-04 16:06:52][DEBUG] : Init serial module v3.5
[2021-02-04 16:06:52][DEBUG] : Start listening...
[2021-02-04 16:06:52][DEBUG] : Socket interface started
[2021-02-04 16:06:52][DEBUG] : LoopNetServer Thread started
[2021-02-04 16:06:52][DEBUG] : Open serial port on device: /dev/ttyUSB0, rate 38400, timeout : 9
[2021-02-04 16:06:52][DEBUG] : Listening on: [127.0.0.1:55000]
[2021-02-04 16:06:52][DEBUG] : Open Serialport
[2021-02-04 16:06:52][DEBUG] : flushOutput serial port
[2021-02-04 16:06:52][DEBUG] : flushInput serial port
[2021-02-04 16:06:52][DEBUG] : flushOutput serial port
[2021-02-04 16:06:52][DEBUG] : flushInput serial port
[2021-02-04 16:06:52][DEBUG] : Read Socket Thread Launched
[2021-02-04 16:06:52][DEBUG] : Read Device Thread Launched
[2021-02-04 16:06:53][DEBUG] : Send rfxcomd_reset
[2021-02-04 16:06:53][DEBUG] : Write data to serial port : 0d00000000000000000000000000
[2021-02-04 16:06:53][DEBUG] : Sleep 1 sec
[2021-02-04 16:06:54][DEBUG] : flushInput serial port
[2021-02-04 16:06:54][DEBUG] : Send get status test
[2021-02-04 16:06:54][DEBUG] : Write data to serial port : 0d00000102000000000000000000
[2021-02-04 16:06:54][DEBUG] : Message: 1401000102532b7f3eff0003001c106e4658434f4d
[2021-02-04 16:06:54][DEBUG] : Decode : 1401000102532b7f3eff0003001c106e4658434f4d
[2021-02-04 16:06:54][DEBUG] : Test message: 1401000102532b7f3eff0003001c106e4658434f4d
[2021-02-04 16:06:54][DEBUG] : PacketType: 0x01
[2021-02-04 16:06:54][DEBUG] : Length: 21
[2021-02-04 16:06:54][DEBUG] : Start decoding packet type 0x01
[2021-02-04 16:06:54][DEBUG] : Data : {'packetlen': '0x14', 'packettype': '0x01', 'subtype': '0x00', 'seqnbr': '0x01', 'cmnd': '0x02', 'msg1': '0x53', 'msg2': '0x2B', 'msg3': '0x7F', 'msg4': '0x3E', 'msg5': '0xFF', 'msg6': '0x00', 'msg7': '0x03', 'msg8': '0x00', 'msg9': 28, 'msg10': '0x10', 'msg11': '0x6E', 'msg12': '0x46', 'msg13': '0x58', 'msg14': '0x43', 'msg15': '0x4F', 'msg16': '0x4D'}
[2021-02-04 16:06:54][DEBUG] : Subtype = response on a mode command
[2021-02-04 16:06:54][DEBUG] : Firmware version = 0x2B
[2021-02-04 16:06:54][DEBUG] : RFXtrx433 operating at 433.92MHz
[2021-02-04 16:06:54][DEBUG] : Hardware major version = 0x03
[2021-02-04 16:06:54][DEBUG] : Hardware minor version = 0x00
[2021-02-04 16:06:54][DEBUG] : Output power = 10 dBm
[2021-02-04 16:06:54][DEBUG] : Firmware ProXL1
[2021-02-04 16:06:54][DEBUG] : Noise level (only used in special firmware) = 0x6E
[2021-02-04 16:06:54][DEBUG] : undec on : 0
[2021-02-04 16:06:54][DEBUG] : Imagintronix,Opus/Alecto2010/Alecto : 1
[2021-02-04 16:06:54][DEBUG] : Byron SX,SelectPlus/Alecto5500 : 1
[2021-02-04 16:06:54][DEBUG] : RSL,Revolt/La Crosse : 1
[2021-02-04 16:06:54][DEBUG] : Lighting4/Davis EU : 1
[2021-02-04 16:06:54][DEBUG] : FineOffset,Viking/Davis US : 1
[2021-02-04 16:06:54][DEBUG] : Rubicson,Alecto,Banggood/Davis AU : 1
[2021-02-04 16:06:54][DEBUG] : AE Blyss : 1
[2021-02-04 16:06:54][DEBUG] : BlindsTx : 0
[2021-02-04 16:06:54][DEBUG] : BlindsT0 : 0
[2021-02-04 16:06:54][DEBUG] : Proguard : 1
[2021-02-04 16:06:54][DEBUG] : Legrand CAD : 1
[2021-02-04 16:06:54][DEBUG] : La Crosse : 1
[2021-02-04 16:06:54][DEBUG] : Hideki,TFA,Cresta,UPM/FS20 : 1
[2021-02-04 16:06:54][DEBUG] : AD LightwaveRF : 1
[2021-02-04 16:06:54][DEBUG] : Mertik/Edisio : 0
[2021-02-04 16:06:54][DEBUG] : Visonic : 1
[2021-02-04 16:06:54][DEBUG] : ATI/cartelectronic/Meiantech,Atlantic : 1
[2021-02-04 16:06:54][DEBUG] : Oregon Scientific/Keeloq : 1
[2021-02-04 16:06:54][DEBUG] : Meiantech,Atlantic/Proguard : 1
[2021-02-04 16:06:54][DEBUG] : HomeEasy EU : 1
[2021-02-04 16:06:54][DEBUG] : AC : 1
[2021-02-04 16:06:54][DEBUG] : ARC : 1
[2021-02-04 16:06:54][DEBUG] : X10 : 1
[2021-02-04 16:06:54][DEBUG] : FunkBus 433.42/Itho CVE RFT : 0
[2021-02-04 16:06:54][DEBUG] : MCZ 434.50/Itho CVE ECO RFT : 0
[2021-02-04 16:06:54][DEBUG] : Honeywell Chime : 0
[2021-02-04 16:06:54][DEBUG] : HomeConfort,Fan : 0
[2021-02-04 16:06:54][DEBUG] : Keeloq : 0
[2021-02-04 16:06:55][INFO] : Démon RFXcom lancé
[2021-02-04 16:06:55][DEBUG] : msg3: [0, 1, 1, 1, 1, 1, 1, 1] / 7f
[2021-02-04 16:06:55][DEBUG] : msg4: [0, 0, 1, 1, 1, 1, 1, 0] / 3e
[2021-02-04 16:06:55][DEBUG] : msg5: [1, 1, 1, 1, 1, 1, 1, 1] / ff
[2021-02-04 16:06:55][DEBUG] : msg6: [0, 0, 0, 0, 0, 0, 0, 0] / 00
[2021-02-04 16:06:55][DEBUG] : Command: 0d00000203531C7f3eff00000000
[2021-02-04 16:06:55][DEBUG] : Protocol actually activated 7f3eff00
[2021-02-04 16:06:55][DEBUG] : Actual Frequency 53
[2021-02-04 16:06:55][DEBUG] : Wanted protocol 7f3eff00
[2021-02-04 16:07:45][DEBUG] : Client connected to [127.0.0.1:49990]
[2021-02-04 16:07:45][DEBUG] : Message read from socket: b'{"apikey":"T9uSVRrqpSv6QkAQgxhgxjgIAjVcJYMg","cmd":"include_mode","state":"1"}'
[2021-02-04 16:07:45][DEBUG] : Client disconnected from [127.0.0.1:49990]
[2021-02-04 16:07:45][DEBUG] : Message received in socket JEEDOM_SOCKET_MESSAGE
[2021-02-04 16:07:45][DEBUG] : Enter in include mode
[2021-02-04 16:07:45][DEBUG] : Send to jeedom :  {'include_mode': '1'}
[2021-02-04 16:07:45][DEBUG] : Starting new HTTP connection (1): 127.0.0.1:80
[2021-02-04 16:07:45][DEBUG] : {"include_mode":"1"}
[2021-02-04 16:07:45][DEBUG] : http://127.0.0.1:80 "POST /plugins/rfxcom/core/php/jeeRfxcom.php?apikey=T9uSVRrqpSv6QkAQgxhgxjgIAjVcJYMg HTTP/1.1" 200 0
[2021-02-04 16:07:49][DEBUG] : Message: 08200000ebff700479
[2021-02-04 16:07:49][DEBUG] : Decode : 08200000ebff700479
[2021-02-04 16:07:49][DEBUG] : Test message: 08200000ebff700479
[2021-02-04 16:07:49][DEBUG] : PacketType: 0x20
[2021-02-04 16:07:49][DEBUG] : Length: 9
[2021-02-04 16:07:49][DEBUG] : Start decoding packet type 0x20
[2021-02-04 16:07:49][DEBUG] : Subtype = X10 security door/window sensor
[2021-02-04 16:07:49][DEBUG] : Data : {'packetlen': '0x08', 'packettype': '0x20', 'subtype': '0x00', 'seqnbr': '0x00', 'id1': '0xEB', 'id2': '0xFF', 'id3': '0x70', 'status': 4, 'battery': 9, 'rssi': 7}
[2021-02-04 16:07:49][DEBUG] : Decoded info : {'packettype': '0x20', 'subtype': '0x00', 'id': 'EBFF70', 'status': 4, 'battery': 9, 'rssi': 7}
[2021-02-04 16:07:49][DEBUG] : unknown device id : EBFF70
[2021-02-04 16:07:49][DEBUG] : Send to jeedom :  {'include_mode': 0}
[2021-02-04 16:07:49][DEBUG] : Device is known id : EBFF70
[2021-02-04 16:07:49][DEBUG] : Starting new HTTP connection (1): 127.0.0.1:80
[2021-02-04 16:07:49][DEBUG] : Send to jeedom : {'devices': {'EBFF7020': {'packettype': '0x20', 'subtype': '0x00', 'id': 'EBFF70', 'status': 4, 'battery': 9, 'rssi': 7}}}
[2021-02-04 16:07:49][DEBUG] : Starting new HTTP connection (1): 127.0.0.1:80
[2021-02-04 16:07:49][DEBUG] : {"include_mode":0}
[2021-02-04 16:07:49][DEBUG] : {"devices":{"EBFF7020":{"packettype":"0x20","subtype":"0x00","id":"EBFF70","status":4,"battery":9,"rssi":7}}}
[2021-02-04 16:07:49][DEBUG] : http://127.0.0.1:80 "POST /plugins/rfxcom/core/php/jeeRfxcom.php?apikey=T9uSVRrqpSv6QkAQgxhgxjgIAjVcJYMg HTTP/1.1" 200 0
[2021-02-04 16:07:51][DEBUG] : Client connected to [127.0.0.1:49998]
[2021-02-04 16:07:51][DEBUG] : Message read from socket: b'{"apikey":"T9uSVRrqpSv6QkAQgxhgxjgIAjVcJYMg","cmd":"add","device":{"id":"EBFF70"}}'
[2021-02-04 16:07:51][DEBUG] : Client disconnected from [127.0.0.1:49998]
[2021-02-04 16:07:51][DEBUG] : Message received in socket JEEDOM_SOCKET_MESSAGE
[2021-02-04 16:07:51][DEBUG] : Add device : {'id': 'EBFF70'}
[2021-02-04 16:07:51][DEBUG] : Client connected to [127.0.0.1:50000]
[2021-02-04 16:07:51][DEBUG] : Message read from socket: b'{"apikey":"T9uSVRrqpSv6QkAQgxhgxjgIAjVcJYMg","cmd":"add","device":{"id":"EBFF70"}}'
[2021-02-04 16:07:51][DEBUG] : Client disconnected from [127.0.0.1:50000]
[2021-02-04 16:07:51][DEBUG] : Message received in socket JEEDOM_SOCKET_MESSAGE
[2021-02-04 16:07:51][DEBUG] : Add device : {'id': 'EBFF70'}
[2021-02-04 16:07:53][DEBUG] : http://127.0.0.1:80 "POST /plugins/rfxcom/core/php/jeeRfxcom.php?apikey=T9uSVRrqpSv6QkAQgxhgxjgIAjVcJYMg HTTP/1.1" 200 0
[2021-02-04 16:07:55][DEBUG] : Message: 08200001ebff700469
[2021-02-04 16:07:55][DEBUG] : Decode : 08200001ebff700469
[2021-02-04 16:07:55][DEBUG] : Test message: 08200001ebff700469
[2021-02-04 16:07:55][DEBUG] : PacketType: 0x20
[2021-02-04 16:07:55][DEBUG] : Length: 9
[2021-02-04 16:07:55][DEBUG] : Start decoding packet type 0x20
[2021-02-04 16:07:55][DEBUG] : Subtype = X10 security door/window sensor
[2021-02-04 16:07:55][DEBUG] : Data : {'packetlen': '0x08', 'packettype': '0x20', 'subtype': '0x00', 'seqnbr': '0x01', 'id1': '0xEB', 'id2': '0xFF', 'id3': '0x70', 'status': 4, 'battery': 9, 'rssi': 6}
[2021-02-04 16:07:55][DEBUG] : Decoded info : {'packettype': '0x20', 'subtype': '0x00', 'id': 'EBFF70', 'status': 4, 'battery': 9, 'rssi': 6}
[2021-02-04 16:07:55][DEBUG] : Device is known id : EBFF70
[2021-02-04 16:07:55][DEBUG] : Send to jeedom : {'devices': {'EBFF7020': {'packettype': '0x20', 'subtype': '0x00', 'id': 'EBFF70', 'status': 4, 'battery': 9, 'rssi': 6}}}
[2021-02-04 16:07:55][DEBUG] : Starting new HTTP connection (1): 127.0.0.1:80
[2021-02-04 16:07:55][DEBUG] : {"devices":{"EBFF7020":{"packettype":"0x20","subtype":"0x00","id":"EBFF70","status":4,"battery":9,"rssi":6}}}
[2021-02-04 16:07:55][DEBUG] : http://127.0.0.1:80 "POST /plugins/rfxcom/core/php/jeeRfxcom.php?apikey=T9uSVRrqpSv6QkAQgxhgxjgIAjVcJYMg HTTP/1.1" 200 0
[2021-02-04 16:08:03][DEBUG] : Message: 08200002ebff700469
[2021-02-04 16:08:03][DEBUG] : Decode : 08200002ebff700469
[2021-02-04 16:08:03][DEBUG] : Test message: 08200002ebff700469
[2021-02-04 16:08:03][DEBUG] : PacketType: 0x20
[2021-02-04 16:08:03][DEBUG] : Length: 9
[2021-02-04 16:08:03][DEBUG] : Start decoding packet type 0x20
[2021-02-04 16:08:03][DEBUG] : Subtype = X10 security door/window sensor
[2021-02-04 16:08:03][DEBUG] : Data : {'packetlen': '0x08', 'packettype': '0x20', 'subtype': '0x00', 'seqnbr': '0x02', 'id1': '0xEB', 'id2': '0xFF', 'id3': '0x70', 'status': 4, 'battery': 9, 'rssi': 6}
[2021-02-04 16:08:03][DEBUG] : Decoded info : {'packettype': '0x20', 'subtype': '0x00', 'id': 'EBFF70', 'status': 4, 'battery': 9, 'rssi': 6}
[2021-02-04 16:08:03][DEBUG] : Device is known id : EBFF70
[2021-02-04 16:08:03][DEBUG] : Send to jeedom : {'devices': {'EBFF7020': {'packettype': '0x20', 'subtype': '0x00', 'id': 'EBFF70', 'status': 4, 'battery': 9, 'rssi': 6}}}
[2021-02-04 16:08:03][DEBUG] : Starting new HTTP connection (1): 127.0.0.1:80
[2021-02-04 16:08:03][DEBUG] : {"devices":{"EBFF7020":{"packettype":"0x20","subtype":"0x00","id":"EBFF70","status":4,"battery":9,"rssi":6}}}
[2021-02-04 16:08:03][DEBUG] : http://127.0.0.1:80 "POST /plugins/rfxcom/core/php/jeeRfxcom.php?apikey=T9uSVRrqpSv6QkAQgxhgxjgIAjVcJYMg HTTP/1.1" 200 0
[2021-02-04 16:08:11][DEBUG] : Message: 08200003ebff700469
[2021-02-04 16:08:11][DEBUG] : Decode : 08200003ebff700469
[2021-02-04 16:08:11][DEBUG] : Test message: 08200003ebff700469
[2021-02-04 16:08:11][DEBUG] : PacketType: 0x20
[2021-02-04 16:08:11][DEBUG] : Length: 9
[2021-02-04 16:08:11][DEBUG] : Start decoding packet type 0x20
[2021-02-04 16:08:11][DEBUG] : Subtype = X10 security door/window sensor
[2021-02-04 16:08:11][DEBUG] : Data : {'packetlen': '0x08', 'packettype': '0x20', 'subtype': '0x00', 'seqnbr': '0x03', 'id1': '0xEB', 'id2': '0xFF', 'id3': '0x70', 'status': 4, 'battery': 9, 'rssi': 6}
[2021-02-04 16:08:11][DEBUG] : Decoded info : {'packettype': '0x20', 'subtype': '0x00', 'id': 'EBFF70', 'status': 4, 'battery': 9, 'rssi': 6}
[2021-02-04 16:08:11][DEBUG] : Device is known id : EBFF70
[2021-02-04 16:08:11][DEBUG] : Send to jeedom : {'devices': {'EBFF7020': {'packettype': '0x20', 'subtype': '0x00', 'id': 'EBFF70', 'status': 4, 'battery': 9, 'rssi': 6}}}
[2021-02-04 16:08:11][DEBUG] : Starting new HTTP connection (1): 127.0.0.1:80
[2021-02-04 16:08:12][DEBUG] : {"devices":{"EBFF7020":{"packettype":"0x20","subtype":"0x00","id":"EBFF70","status":4,"battery":9,"rssi":6}}}
[2021-02-04 16:08:12][DEBUG] : http://127.0.0.1:80 "POST /plugins/rfxcom/core/php/jeeRfxcom.php?apikey=T9uSVRrqpSv6QkAQgxhgxjgIAjVcJYMg HTTP/1.1" 200 0
[2021-02-04 16:08:37][DEBUG] : Client connected to [127.0.0.1:50008]
[2021-02-04 16:08:37][DEBUG] : Message read from socket: b'{"apikey":"T9uSVRrqpSv6QkAQgxhgxjgIAjVcJYMg","cmd":"add","device":{"id":"EBFF70"}}'
[2021-02-04 16:08:37][DEBUG] : Client disconnected from [127.0.0.1:50008]
[2021-02-04 16:08:37][DEBUG] : Message received in socket JEEDOM_SOCKET_MESSAGE
[2021-02-04 16:08:37][DEBUG] : Add device : {'id': 'EBFF70'}
[2021-02-04 16:08:47][DEBUG] : Client connected to [127.0.0.1:50010]
[2021-02-04 16:08:47][DEBUG] : Message read from socket: b'{"apikey":"T9uSVRrqpSv6QkAQgxhgxjgIAjVcJYMg","cmd":"include_mode","state":"1"}'
[2021-02-04 16:08:47][DEBUG] : Client disconnected from [127.0.0.1:50010]
[2021-02-04 16:08:47][DEBUG] : Message received in socket JEEDOM_SOCKET_MESSAGE
[2021-02-04 16:08:47][DEBUG] : Enter in include mode
[2021-02-04 16:08:47][DEBUG] : Send to jeedom :  {'include_mode': '1'}
[2021-02-04 16:08:47][DEBUG] : Starting new HTTP connection (1): 127.0.0.1:80
[2021-02-04 16:08:47][DEBUG] : {"include_mode":"1"}
[2021-02-04 16:08:47][DEBUG] : http://127.0.0.1:80 "POST /plugins/rfxcom/core/php/jeeRfxcom.php?apikey=T9uSVRrqpSv6QkAQgxhgxjgIAjVcJYMg HTTP/1.1" 200 0
[2021-02-04 16:09:00][DEBUG] : Client connected to [127.0.0.1:50014]
[2021-02-04 16:09:00][DEBUG] : Message read from socket: b'{"apikey":"T9uSVRrqpSv6QkAQgxhgxjgIAjVcJYMg","cmd":"include_mode","state":"0"}'
[2021-02-04 16:09:00][DEBUG] : Client disconnected from [127.0.0.1:50014]
[2021-02-04 16:09:00][DEBUG] : Message received in socket JEEDOM_SOCKET_MESSAGE
[2021-02-04 16:09:00][DEBUG] : Leave in include mode
[2021-02-04 16:09:00][DEBUG] : Send to jeedom :  {'include_mode': '0'}
[2021-02-04 16:09:00][DEBUG] : Starting new HTTP connection (1): 127.0.0.1:80
[2021-02-04 16:09:00][DEBUG] : {"include_mode":"0"}
[2021-02-04 16:09:00][DEBUG] : http://127.0.0.1:80 "POST /plugins/rfxcom/core/php/jeeRfxcom.php?apikey=T9uSVRrqpSv6QkAQgxhgxjgIAjVcJYMg HTTP/1.1" 200 0
[2021-02-04 16:09:09][DEBUG] : Message: 08200004ebff700469
[2021-02-04 16:09:09][DEBUG] : Decode : 08200004ebff700469
[2021-02-04 16:09:09][DEBUG] : Test message: 08200004ebff700469
[2021-02-04 16:09:09][DEBUG] : PacketType: 0x20
[2021-02-04 16:09:09][DEBUG] : Length: 9
[2021-02-04 16:09:09][DEBUG] : Start decoding packet type 0x20
[2021-02-04 16:09:09][DEBUG] : Subtype = X10 security door/window sensor
[2021-02-04 16:09:09][DEBUG] : Data : {'packetlen': '0x08', 'packettype': '0x20', 'subtype': '0x00', 'seqnbr': '0x04', 'id1': '0xEB', 'id2': '0xFF', 'id3': '0x70', 'status': 4, 'battery': 9, 'rssi': 6}
[2021-02-04 16:09:09][DEBUG] : Decoded info : {'packettype': '0x20', 'subtype': '0x00', 'id': 'EBFF70', 'status': 4, 'battery': 9, 'rssi': 6}
[2021-02-04 16:09:09][DEBUG] : Device is known id : EBFF70
[2021-02-04 16:09:09][DEBUG] : Send to jeedom : {'devices': {'EBFF7020': {'packettype': '0x20', 'subtype': '0x00', 'id': 'EBFF70', 'status': 4, 'battery': 9, 'rssi': 6}}}
[2021-02-04 16:09:09][DEBUG] : Starting new HTTP connection (1): 127.0.0.1:80
[2021-02-04 16:09:09][DEBUG] : {"devices":{"EBFF7020":{"packettype":"0x20","subtype":"0x00","id":"EBFF70","status":4,"battery":9,"rssi":6}}}
[2021-02-04 16:09:09][DEBUG] : http://127.0.0.1:80 "POST /plugins/rfxcom/core/php/jeeRfxcom.php?apikey=T9uSVRrqpSv6QkAQgxhgxjgIAjVcJYMg HTTP/1.1" 200 0
[2021-02-04 16:10:25][DEBUG] : Message: 08200005ebff700469
[2021-02-04 16:10:25][DEBUG] : Decode : 08200005ebff700469
[2021-02-04 16:10:25][DEBUG] : Test message: 08200005ebff700469
[2021-02-04 16:10:25][DEBUG] : PacketType: 0x20
[2021-02-04 16:10:25][DEBUG] : Length: 9
[2021-02-04 16:10:25][DEBUG] : Start decoding packet type 0x20
[2021-02-04 16:10:25][DEBUG] : Subtype = X10 security door/window sensor
[2021-02-04 16:10:25][DEBUG] : Data : {'packetlen': '0x08', 'packettype': '0x20', 'subtype': '0x00', 'seqnbr': '0x05', 'id1': '0xEB', 'id2': '0xFF', 'id3': '0x70', 'status': 4, 'battery': 9, 'rssi': 6}
[2021-02-04 16:10:25][DEBUG] : Decoded info : {'packettype': '0x20', 'subtype': '0x00', 'id': 'EBFF70', 'status': 4, 'battery': 9, 'rssi': 6}
[2021-02-04 16:10:25][DEBUG] : Device is known id : EBFF70
[2021-02-04 16:10:26][DEBUG] : Send to jeedom : {'devices': {'EBFF7020': {'packettype': '0x20', 'subtype': '0x00', 'id': 'EBFF70', 'status': 4, 'battery': 9, 'rssi': 6}}}
[2021-02-04 16:10:26][DEBUG] : Starting new HTTP connection (1): 127.0.0.1:80
[2021-02-04 16:10:26][DEBUG] : {"devices":{"EBFF7020":{"packettype":"0x20","subtype":"0x00","id":"EBFF70","status":4,"battery":9,"rssi":6}}}
[2021-02-04 16:10:26][DEBUG] : http://127.0.0.1:80 "POST /plugins/rfxcom/core/php/jeeRfxcom.php?apikey=T9uSVRrqpSv6QkAQgxhgxjgIAjVcJYMg HTTP/1.1" 200 0
[2021-02-04 16:10:26][DEBUG] : Message: 08200a06ebff760669
[2021-02-04 16:10:26][DEBUG] : Decode : 08200a06ebff760669
[2021-02-04 16:10:26][DEBUG] : Test message: 08200a06ebff760669
[2021-02-04 16:10:26][DEBUG] : PacketType: 0x20
[2021-02-04 16:10:26][DEBUG] : Length: 9
[2021-02-04 16:10:26][DEBUG] : Start decoding packet type 0x20
[2021-02-04 16:10:26][DEBUG] : Subtype = RM174RF,RM175RF no alive packets
[2021-02-04 16:10:26][DEBUG] : Data : {'packetlen': '0x08', 'packettype': '0x20', 'subtype': '0x0A', 'seqnbr': '0x06', 'id1': '0xEB', 'id2': '0xFF', 'id3': '0x76', 'status': 6, 'battery': 9, 'rssi': 6}
[2021-02-04 16:10:26][DEBUG] : Decoded info : {'packettype': '0x20', 'subtype': '0x0A', 'id': 'EBFF76', 'status': 6, 'battery': 9, 'rssi': 6}
[2021-02-04 16:10:26][DEBUG] : unknown device id : EBFF76
[2021-02-04 16:10:27][DEBUG] : Message: 08200007ebff700469
[2021-02-04 16:10:27][DEBUG] : Decode : 08200007ebff700469
[2021-02-04 16:10:27][DEBUG] : Test message: 08200007ebff700469
[2021-02-04 16:10:27][DEBUG] : PacketType: 0x20
[2021-02-04 16:10:27][DEBUG] : Length: 9
[2021-02-04 16:10:27][DEBUG] : Start decoding packet type 0x20
[2021-02-04 16:10:27][DEBUG] : Subtype = X10 security door/window sensor
[2021-02-04 16:10:27][DEBUG] : Data : {'packetlen': '0x08', 'packettype': '0x20', 'subtype': '0x00', 'seqnbr': '0x07', 'id1': '0xEB', 'id2': '0xFF', 'id3': '0x70', 'status': 4, 'battery': 9, 'rssi': 6}
[2021-02-04 16:10:27][DEBUG] : Decoded info : {'packettype': '0x20', 'subtype': '0x00', 'id': 'EBFF70', 'status': 4, 'battery': 9, 'rssi': 6}
[2021-02-04 16:10:27][DEBUG] : Device is known id : EBFF70
[2021-02-04 16:10:27][DEBUG] : Send to jeedom : {'devices': {'EBFF7020': {'packettype': '0x20', 'subtype': '0x00', 'id': 'EBFF70', 'status': 4, 'battery': 9, 'rssi': 6}}}
[2021-02-04 16:10:27][DEBUG] : Starting new HTTP connection (1): 127.0.0.1:80
[2021-02-04 16:10:27][DEBUG] : {"devices":{"EBFF7020":{"packettype":"0x20","subtype":"0x00","id":"EBFF70","status":4,"battery":9,"rssi":6}}}
[2021-02-04 16:10:27][DEBUG] : http://127.0.0.1:80 "POST /plugins/rfxcom/core/php/jeeRfxcom.php?apikey=T9uSVRrqpSv6QkAQgxhgxjgIAjVcJYMg HTTP/1.1" 200 0
[2021-02-04 16:10:34][DEBUG] : Client connected to [127.0.0.1:50026]
[2021-02-04 16:10:34][DEBUG] : Message read from socket: b'{"apikey":"T9uSVRrqpSv6QkAQgxhgxjgIAjVcJYMg","cmd":"include_mode","state":"1"}'
[2021-02-04 16:10:34][DEBUG] : Client disconnected from [127.0.0.1:50026]
[2021-02-04 16:10:34][DEBUG] : Message received in socket JEEDOM_SOCKET_MESSAGE
[2021-02-04 16:10:34][DEBUG] : Enter in include mode
[2021-02-04 16:10:34][DEBUG] : Send to jeedom :  {'include_mode': '1'}
[2021-02-04 16:10:34][DEBUG] : Starting new HTTP connection (1): 127.0.0.1:80
[2021-02-04 16:10:34][DEBUG] : {"include_mode":"1"}
[2021-02-04 16:10:34][DEBUG] : http://127.0.0.1:80 "POST /plugins/rfxcom/core/php/jeeRfxcom.php?apikey=T9uSVRrqpSv6QkAQgxhgxjgIAjVcJYMg HTTP/1.1" 200 0
[2021-02-04 16:10:35][DEBUG] : Message: 08200008ebff700469
[2021-02-04 16:10:35][DEBUG] : Decode : 08200008ebff700469
[2021-02-04 16:10:35][DEBUG] : Test message: 08200008ebff700469
[2021-02-04 16:10:35][DEBUG] : PacketType: 0x20
[2021-02-04 16:10:35][DEBUG] : Length: 9
[2021-02-04 16:10:35][DEBUG] : Start decoding packet type 0x20
[2021-02-04 16:10:35][DEBUG] : Subtype = X10 security door/window sensor
[2021-02-04 16:10:35][DEBUG] : Data : {'packetlen': '0x08', 'packettype': '0x20', 'subtype': '0x00', 'seqnbr': '0x08', 'id1': '0xEB', 'id2': '0xFF', 'id3': '0x70', 'status': 4, 'battery': 9, 'rssi': 6}
[2021-02-04 16:10:35][DEBUG] : Decoded info : {'packettype': '0x20', 'subtype': '0x00', 'id': 'EBFF70', 'status': 4, 'battery': 9, 'rssi': 6}
[2021-02-04 16:10:35][DEBUG] : Device is known id : EBFF70
[2021-02-04 16:10:35][DEBUG] : Send to jeedom : {'devices': {'EBFF7020': {'packettype': '0x20', 'subtype': '0x00', 'id': 'EBFF70', 'status': 4, 'battery': 9, 'rssi': 6}}}
[2021-02-04 16:10:35][DEBUG] : Starting new HTTP connection (1): 127.0.0.1:80
[2021-02-04 16:10:35][DEBUG] : {"devices":{"EBFF7020":{"packettype":"0x20","subtype":"0x00","id":"EBFF70","status":4,"battery":9,"rssi":6}}}
[2021-02-04 16:10:35][DEBUG] : http://127.0.0.1:80 "POST /plugins/rfxcom/core/php/jeeRfxcom.php?apikey=T9uSVRrqpSv6QkAQgxhgxjgIAjVcJYMg HTTP/1.1" 200 0
[2021-02-04 16:10:43][DEBUG] : Message: 0820000913a3d00269
[2021-02-04 16:10:43][DEBUG] : Decode : 0820000913a3d00269
[2021-02-04 16:10:43][DEBUG] : Test message: 0820000913a3d00269
[2021-02-04 16:10:43][DEBUG] : PacketType: 0x20
[2021-02-04 16:10:43][DEBUG] : Length: 9
[2021-02-04 16:10:43][DEBUG] : Start decoding packet type 0x20
[2021-02-04 16:10:43][DEBUG] : Subtype = X10 security door/window sensor
[2021-02-04 16:10:43][DEBUG] : Data : {'packetlen': '0x08', 'packettype': '0x20', 'subtype': '0x00', 'seqnbr': '0x09', 'id1': '0x13', 'id2': '0xA3', 'id3': '0xD0', 'status': 2, 'battery': 9, 'rssi': 6}
[2021-02-04 16:10:43][DEBUG] : Decoded info : {'packettype': '0x20', 'subtype': '0x00', 'id': '13A3D0', 'status': 2, 'battery': 9, 'rssi': 6}
[2021-02-04 16:10:43][DEBUG] : unknown device id : 13A3D0
[2021-02-04 16:10:43][DEBUG] : Send to jeedom :  {'include_mode': 0}
[2021-02-04 16:10:43][DEBUG] : Device is known id : 13A3D0
[2021-02-04 16:10:43][DEBUG] : Starting new HTTP connection (1): 127.0.0.1:80
[2021-02-04 16:10:43][DEBUG] : {"include_mode":0}
[2021-02-04 16:10:43][DEBUG] : http://127.0.0.1:80 "POST /plugins/rfxcom/core/php/jeeRfxcom.php?apikey=T9uSVRrqpSv6QkAQgxhgxjgIAjVcJYMg HTTP/1.1" 200 0
[2021-02-04 16:10:43][DEBUG] : Send to jeedom : {'devices': {'13A3D020': {'packettype': '0x20', 'subtype': '0x00', 'id': '13A3D0', 'status': 2, 'battery': 9, 'rssi': 6}}}
[2021-02-04 16:10:43][DEBUG] : Starting new HTTP connection (1): 127.0.0.1:80
[2021-02-04 16:10:43][DEBUG] : {"devices":{"13A3D020":{"packettype":"0x20","subtype":"0x00","id":"13A3D0","status":2,"battery":9,"rssi":6}}}
[2021-02-04 16:10:46][DEBUG] : Client connected to [127.0.0.1:50036]
[2021-02-04 16:10:46][DEBUG] : Message read from socket: b'{"apikey":"T9uSVRrqpSv6QkAQgxhgxjgIAjVcJYMg","cmd":"add","device":{"id":"13A3D0"}}'
[2021-02-04 16:10:46][DEBUG] : Client disconnected from [127.0.0.1:50036]
[2021-02-04 16:10:46][DEBUG] : Message received in socket JEEDOM_SOCKET_MESSAGE
[2021-02-04 16:10:46][DEBUG] : Add device : {'id': '13A3D0'}
[2021-02-04 16:10:46][DEBUG] : Client connected to [127.0.0.1:50038]
[2021-02-04 16:10:46][DEBUG] : Message read from socket: b'{"apikey":"T9uSVRrqpSv6QkAQgxhgxjgIAjVcJYMg","cmd":"add","device":{"id":"13A3D0"}}'
[2021-02-04 16:10:46][DEBUG] : Client disconnected from [127.0.0.1:50038]
[2021-02-04 16:10:46][DEBUG] : Message received in socket JEEDOM_SOCKET_MESSAGE
[2021-02-04 16:10:46][DEBUG] : Add device : {'id': '13A3D0'}
[2021-02-04 16:10:46][DEBUG] : Message: 0820000a13a3d00269
[2021-02-04 16:10:46][DEBUG] : Decode : 0820000a13a3d00269
[2021-02-04 16:10:46][DEBUG] : Test message: 0820000a13a3d00269
[2021-02-04 16:10:46][DEBUG] : PacketType: 0x20
[2021-02-04 16:10:46][DEBUG] : Length: 9
[2021-02-04 16:10:46][DEBUG] : Start decoding packet type 0x20
[2021-02-04 16:10:46][DEBUG] : Subtype = X10 security door/window sensor
[2021-02-04 16:10:46][DEBUG] : Data : {'packetlen': '0x08', 'packettype': '0x20', 'subtype': '0x00', 'seqnbr': '0x0A', 'id1': '0x13', 'id2': '0xA3', 'id3': '0xD0', 'status': 2, 'battery': 9, 'rssi': 6}
[2021-02-04 16:10:46][DEBUG] : Decoded info : {'packettype': '0x20', 'subtype': '0x00', 'id': '13A3D0', 'status': 2, 'battery': 9, 'rssi': 6}


Dois-je désactiver des protocoles ?

Merci en tout cas, c’est super !

David

Ok,
Non pour l’instant tu peux laisser, sauf si tu vois que tu récupères des infos qui ne viennent pas de chez toi ( voisins) …

Pour ne pas surcharger les logs , tu peux repasser le plugin sur Defaut , puis Sauvegarder

Merci beaucoup pour ton aide en tout cas.
Je viens de basculer les logs sur défaut !
A tout hasard, aurais-tu une sirène à me conseiller ?
J’ai donc un RFXCOM mais aussi une clé Z-WAVE et bientôt du ZIGBEE.

Je suis ouvert à tout :slight_smile:
Un grand merci !

David

Ce sujet a été automatiquement fermé après 24 heures suivant le dernier commentaire. Aucune réponse n’est permise dorénavant.