
Security News
MCP Community Begins Work on Official MCP Metaregistry
The MCP community is launching an official registry to standardize AI tool discovery and let agents dynamically find and install MCP servers.
idasen
|PyPi Version| |Build Status| |Documentation Status| |Black|
The IDÅSEN is an electric sitting standing desk with a Linak controller sold by ikea.
The position of the desk can controlled by a physical switch on the desk or via bluetooth using an phone app.
This is a command line interface written in python to control the Idasen via bluetooth from a desktop computer.
Set Up
The desk should be connected to the computer.
.. code-block:: bash
python3 -m pip install --upgrade idasen
Configuration
Configuration that is not expected to change frequently can be provided via a
YAML configuration file located at ~/.config/idasen/idasen.yaml
.
You can use this command to initialize a new configuartion file:
.. code-block:: bash
idasen init
.. code-block:: yaml
mac_address: AA:AA:AA:AA:AA:AA
positions:
sit: 0.75
stand: 1.1
Configuartion options:
mac_address
- The MAC address of the desk. This is required.positions
- A dictionary of positions with values of desk height from the
floor in meters, sit
and stand
are provided as examples.The program will try to discover the device address. The device needs to be in 'discover' mode for this to work.
If discovery fails the device MAC addresses can be found using blueoothctl
and bluetooth adapter names can be found with hcitool dev
on linux.
If the device has not yet been paired, this can be accomplished with:
.. code-block:: bash
idasen pair
Again, the device will need to be in 'discover' mode for this to work.
Usage
To print the current desk height:
.. code-block:: bash
idasen height
To monitor for changes to height:
.. code-block:: bash
idasen monitor
To save the current height as the sitting position:
.. code-block:: bash
idasen save sit
To delete the saved sitting position:
.. code-block:: bash
idasen delete sit
Assuming the config file is populated to move the desk to sitting position:
.. code-block:: bash
idasen sit
Community
Related projects and packaging:
Arch Linux package
_NixOS package
_huserben/idasen-rest-bridge
_rhyst/idasen-controller
_.. _poetry: https://python-poetry.org/ .. _install poetry: https://python-poetry.org/docs/#installation .. _rhyst/idasen-controller: https://github.com/rhyst/idasen-controller .. _NixOS package: https://search.nixos.org/packages?channel=unstable&show=idasen&query=idasen .. _Arch Linux package: https://aur.archlinux.org/packages/idasen .. _huserben/idasen-rest-bridge: https://github.com/huserben/idasen-rest-bridge
.. |PyPi Version| image:: https://badge.fury.io/py/idasen.svg :target: https://badge.fury.io/py/idasen .. |Build Status| image:: https://github.com/newAM/idasen/workflows/Tests/badge.svg :target: https://github.com/newAM/idasen/actions .. |Documentation Status| image:: https://img.shields.io/badge/docs-latest-blue :target: https://newam.github.io/idasen .. |Black| image:: https://img.shields.io/badge/code%20style-black-000000.svg :target: https://github.com/psf/black
FAQs
ikea IDÅSEN desk API and CLI.
We found that idasen demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
The MCP community is launching an official registry to standardize AI tool discovery and let agents dynamically find and install MCP servers.
Research
Security News
Socket uncovers an npm Trojan stealing crypto wallets and BullX credentials via obfuscated code and Telegram exfiltration.
Research
Security News
Malicious npm packages posing as developer tools target macOS Cursor IDE users, stealing credentials and modifying files to gain persistent backdoor access.