Security News
Maven Central Adds Sigstore Signature Validation
Maven Central now validates Sigstore signatures, making it easier for developers to verify the provenance of Java packages.
This is a Python3 library to allow communication with Bluetooth Low Energy devices on Linux.
Please be aware that this is not a beginners tool. Some experience with Linux CLI, Python3 and BT/BLE is expected.
Development of this package is done in Python 3.12. The package is considered forwards compatible at least upto Python 3.12 and probably also beyond. Backwards compatibility is not guaranteed; if it works on Python 3.9 or before consider yourself lucky. Python versions that are end-of-life are not supported.
The package has been extensively tested on a Raspberry Pi 3 Model B+ (aarch64) with Debian GNU Linux 11 w/ Python 3.9.* AND with Debian GNU Linux 12 /w Python 3.11.* and 3.12.*.
The code needs an executable bluepy3-helper
which is compiled from C source automatically
when first used (see below).
The bluepy3
package comes installed with lists of compatible UUIDs in uuids.json
.
If, for whatever reason, you want to rebuild those lists, then the Python3 modules
bs4
, requests
and lxml
need to be installed.
python3 -m pip install bs4 lxml requests
Then find where the bluepy3 package is installed and rebuild uuids.json
thus:
cd some_path_name/site-packages/bluepy3/
make uuids.json
To install the currently released version, on most Debian-based systems:
sudo apt-get install libglib2.0-dev libbluetooth-dev
python3 -m pip install --upgrade bluepy3
Then test the installation using:
sudo setcap cap_net_raw,cap_net_admin+ep $(find . -name bluepy3-helper)
blescan -n
sudo hcitool lescan
This should list the (compatible) Bluetooth devices in range.
Upon the first import
of bluepy3.btle
the required binary is compiled. This requires the download of the BlueZ source (20MB) to /tmp
(don't worry this is done automatically). The default behaviour is to compile against the version of the BlueZ source that matches the version of the installed bluetoothctl
. The user may override this by forcing compilation against any of the supported source trees by running helpermaker --build <version>
. You are advised NOT to use make
directly, but rather use the python script helpermaker
.
It may be considered to have command-line tools from BlueZ available for debugging.
Make sure the user is part of the bluetooth
group.
Use hciconfig
to confirm that the device actually exists. This should output something like:
hci0: Type: Primary Bus: UART
BD Address: B8:27:EB:90:4F:F5 ACL MTU: 1021:8 SCO MTU: 64:1
UP RUNNING
RX bytes:15332515 acl:452626 sco:0 events:333729 errors:0
TX bytes:7376962 acl:438075 sco:0 commands:72113 errors:0
Use hciconfig [hci0] up
to activate the BT device if the above returns an error.
For documentation you are referred to the documentation that comes with bluepy
. Be warned though that as development of bluepy3
advances some of the documentation may be off a bit.
Your assistance to improve this package is greatly appreciated. See CONTRIBUTING for details.
As of September 2024 bluepy3
is distributed under AGPL-3.0-or-later.
This work builds on previous work by Ian Harvey and uses code by the BlueZ project and the GitHub repository BlueZ on GitHub
FAQs
A Python3 module for interfacing with Bluetooth LE devices on Linux.
We found that bluepy3 demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Maven Central now validates Sigstore signatures, making it easier for developers to verify the provenance of Java packages.
Security News
CISOs are racing to adopt AI for cybersecurity, but hurdles in budgets and governance may leave some falling behind in the fight against cyber threats.
Research
Security News
Socket researchers uncovered a backdoored typosquat of BoltDB in the Go ecosystem, exploiting Go Module Proxy caching to persist undetected for years.