Unable to discover lights
See original GitHub issueI have a handful of LIFX bulbs: 2x LIFX Original, 1x LIFX Color 1000 and 4x LIFX DL.
I ran verbose_lan.py
, and got the following output, however Found Bulbs comes back empty.
Any ideas why itβs not being parsed correctly? I tried parsing the bytes but couldnβt quite get the format down.
I did get 10 packets, but Iβve included the 7 unique packets.
Dump
Discovery will go much faster if you provide the number of lights on your LAN: python verbose_lan.py <number of lights on LAN>
Discovering lightsβ¦ SEND: GetService Size: 36 Origin: 0 Tagged: 1 Protocol: 1024 Source ID: 19946 Target MAC Address: 00:00:00:00:00:00 Ack Requested: 0 Response Requested: 1 Seq Num: 0 Message Type: 2 Payload: <empty> Bytes: [β0x24β, β0x0β, β0x0β, β0x34β, β0xeaβ, β0x4dβ, β0x0β, β0x0β, β0x0β, β0x0β, β0x0β, β0x0β, β0x0β, β0x0β, β0x0β, β0x0β, β0x0β, β0x0β, β0x0β, β0x0β, β0x0β, β0x0β, β0x1β, β0x0β, β0x0β, β0x0β, β0x0β, β0x0β, β0x0β, β0x0β, β0x0β, β0x0β, β0x2β, β0x0β, β0x0β, β0x0β]
RECV: Message Size: 10496 Origin: 0 Tagged: 0 Protocol: 20 Source ID: 3930914816 Target MAC Address: d0:73:d5:27:b2:ae Ack Requested: 0 Response Requested: 1 Seq Num: 0 Message Type: 768 Payload: <empty> Bytes: [β0x29β, β0x0β, β0x0β, β0x14β, β0xeaβ, β0x4dβ, β0x0β, β0x0β, β0xd0β, β0x73β, β0xd5β, β0x27β, β0xb2β, β0xaeβ, β0x0β, β0x0β, β0x4cβ, β0x49β, β0x46β, β0x58β, β0x56β, β0x32β, β0x1β, β0x0β, β0x0β, β0x2aβ, β0x7bβ, β0x39β, β0x2cβ, β0x80β, β0x1β, β0x0β, β0x3β, β0x0β, β0x0β, β0x0β, β0x1β, β0x7cβ, β0xddβ, β0x0β, β0x0β]
RECV: Message Size: 10496 Origin: 0 Tagged: 0 Protocol: 20 Source ID: 3930914816 Target MAC Address: d0:73:d5:12:56:28 Ack Requested: 0 Response Requested: 1 Seq Num: 0 Message Type: 768 Payload: <empty> Bytes: [β0x29β, β0x0β, β0x0β, β0x14β, β0xeaβ, β0x4dβ, β0x0β, β0x0β, β0xd0β, β0x73β, β0xd5β, β0x12β, β0x56β, β0x28β, β0x0β, β0x0β, β0x4cβ, β0x49β, β0x46β, β0x58β, β0x56β, β0x32β, β0x1β, β0x0β, β0xc8β, β0xa9β, β0x9cβ, β0xfcβ, β0x8bβ, β0xabβ, β0x20β, β0x15β, β0x3β, β0x0β, β0x0β, β0x0β, β0x1β, β0x7cβ, β0xddβ, β0x0β, β0x0β]
RECV: Message Size: 10496 Origin: 0 Tagged: 0 Protocol: 20 Source ID: 3930914816 Target MAC Address: d0:73:d5:27:80:a4 Ack Requested: 0 Response Requested: 1 Seq Num: 0 Message Type: 768 Payload: <empty> Bytes: [β0x29β, β0x0β, β0x0β, β0x14β, β0xeaβ, β0x4dβ, β0x0β, β0x0β, β0xd0β, β0x73β, β0xd5β, β0x27β, β0x80β, β0xa4β, β0x0β, β0x0β, β0x4cβ, β0x49β, β0x46β, β0x58β, β0x56β, β0x32β, β0x1β, β0x0β, β0x40β, β0xd2β, β0xeeβ, β0x64β, β0x2cβ, β0x80β, β0x1β, β0x0β, β0x3β, β0x0β, β0x0β, β0x0β, β0x1β, β0x7cβ, β0xddβ, β0x0β, β0x0β]
RECV: Message Size: 10496 Origin: 0 Tagged: 0 Protocol: 20 Source ID: 3930914816 Target MAC Address: d0:73:d5:25:d1:77 Ack Requested: 0 Response Requested: 1 Seq Num: 0 Message Type: 768 Payload: <empty> Bytes: [β0x29β, β0x0β, β0x0β, β0x14β, β0xeaβ, β0x4dβ, β0x0β, β0x0β, β0xd0β, β0x73β, β0xd5β, β0x25β, β0xd1β, β0x77β, β0x0β, β0x0β, β0x4cβ, β0x49β, β0x46β, β0x58β, β0x56β, β0x32β, β0x1β, β0x0β, β0xc0β, β0x53β, β0x3fβ, β0xffβ, β0x2bβ, β0x80β, β0x1β, β0x0β, β0x3β, β0x0β, β0x0β, β0x0β, β0x1β, β0x7cβ, β0xddβ, β0x0β, β0x0β]
RECV: Message Size: 10496 Origin: 0 Tagged: 0 Protocol: 20 Source ID: 3930914816 Target MAC Address: d0:73:d5:27:bd:b1 Ack Requested: 0 Response Requested: 1 Seq Num: 0 Message Type: 768 Payload: <empty> Bytes: [β0x29β, β0x0β, β0x0β, β0x14β, β0xeaβ, β0x4dβ, β0x0β, β0x0β, β0xd0β, β0x73β, β0xd5β, β0x27β, β0xbdβ, β0xb1β, β0x0β, β0x0β, β0x4cβ, β0x49β, β0x46β, β0x58β, β0x56β, β0x32β, β0x1β, β0x0β, β0x80β, β0xabβ, β0xddβ, β0x4dβ, β0x2cβ, β0x80β, β0x1β, β0x0β, β0x3β, β0x0β, β0x0β, β0x0β, β0x1β, β0x7cβ, β0xddβ, β0x0β, β0x0β]
RECV: Message Size: 10496 Origin: 0 Tagged: 0 Protocol: 84 Source ID: 3930914816 Target MAC Address: d0:73:d5:00:bd:16 Ack Requested: 0 Response Requested: 0 Seq Num: 0 Message Type: 768 Payload: <empty> Bytes: [β0x29β, β0x0β, β0x0β, β0x54β, β0xeaβ, β0x4dβ, β0x0β, β0x0β, β0xd0β, β0x73β, β0xd5β, β0x0β, β0xbdβ, β0x16β, β0x0β, β0x0β, β0x4cβ, β0x49β, β0x46β, β0x58β, β0x56β, β0x32β, β0x0β, β0x0β, β0xc4β, β0xa3β, β0x85β, β0xdbβ, β0x8bβ, β0xabβ, β0x20β, β0x15β, β0x3β, β0x0β, β0x0β, β0x0β, β0x1β, β0x7cβ, β0xddβ, β0x0β, β0x0β]
RECV: Message Size: 10496 Origin: 0 Tagged: 0 Protocol: 84 Source ID: 3930914816 Target MAC Address: d0:73:d5:03:47:c4 Ack Requested: 0 Response Requested: 0 Seq Num: 0 Message Type: 768 Payload: <empty> Bytes: [β0x29β, β0x0β, β0x0β, β0x54β, β0xeaβ, β0x4dβ, β0x0β, β0x0β, β0xd0β, β0x73β, β0xd5β, β0x3β, β0x47β, β0xc4β, β0x0β, β0x0β, β0x4cβ, β0x49β, β0x46β, β0x58β, β0x56β, β0x32β, β0x0β, β0x0β, β0xc4β, β0xc1β, β0x1β, β0x5β, β0x8cβ, β0xabβ, β0x20β, β0x15β, β0x3β, β0x0β, β0x0β, β0x0β, β0x1β, β0x7cβ, β0xddβ, β0x0β, β0x0β]
Found Bulbs:
Issue Analytics
- State:
- Created 5 years ago
- Comments:12 (7 by maintainers)
Ahhh gawdddd, itβs because the endianness of the machine is different. The part of the library that uses C structs is reading the bytes in reverse. Iβm working on a fix!
So I just ran into this problem and it was fixed by uninstalling the pip version and installing from source. before I was getting a very similar output to OP.