- Timestamp:
- Jul 21, 2016, 5:04:30 PM (8 years ago)
- Location:
- trunk/tools/scripts
- Files:
-
- 2 edited
- 2 copied
- 1 moved
Legend:
- Unmodified
- Added
- Removed
-
trunk/tools/scripts/dualshock3.sh
r27 r28 2 2 ARCH_DIR=$(uname -m) 3 3 4 # $1 is the drone ip 5 if [ "$#" -ne 1 ] ; then 6 echo "Usage: $0 drone_ip_address" 7 exit 1 8 fi 9 10 . ${FLAIR_ROOT}/flair-bin/tools/scripts/ubuntu_cgroup_hack.sh 4 #This script is the only one that calls itself with sudo. 5 #As a consequence, only one exception is needed in sudoers (the following 2 lines) 6 # Defaults!/opt/flair/flair-bin/tools/scripts/dualshock3.sh setenv 7 # uav ALL=(root) /opt/flair/flair-bin/tools/scripts/dualshock3.sh 11 8 12 9 #we must run as root … … 15 12 fi 16 13 14 . ${FLAIR_ROOT}/flair-bin/tools/scripts/ubuntu_cgroup_hack.sh 15 17 16 export LD_LIBRARY_PATH="${OECORE_HOST_SYSROOT}/usr/lib:${OECORE_HOST_SYSROOT}/lib" 18 ${FLAIR_ROOT}/flair-bin/tools/$ARCH_DIR/unix/dualshock3 -a ${1}:20000 -x ${FLAIR_ROOT}/flair-bin/tools/scripts/dualshock3.xml17 ${FLAIR_ROOT}/flair-bin/tools/$ARCH_DIR/unix/dualshock3 $* -
trunk/tools/scripts/dualshock3_bt.sh
r27 r28 8 8 fi 9 9 10 . ${FLAIR_ROOT}/flair-bin/tools/scripts/ubuntu_cgroup_hack.sh 10 ${FLAIR_ROOT}/flair-bin/tools/scripts/dualshock3.sh -a ${1}:20000 -x ${FLAIR_ROOT}/flair-bin/tools/scripts/dualshock3.xml 11 11 12 #we must run as root13 if [ $EUID -ne 0 ]; then14 exec sudo -E $0 $*15 fi16 17 export LD_LIBRARY_PATH="${OECORE_HOST_SYSROOT}/usr/lib:${OECORE_HOST_SYSROOT}/lib"18 ${FLAIR_ROOT}/flair-bin/tools/$ARCH_DIR/unix/dualshock3 -a ${1}:20000 -x ${FLAIR_ROOT}/flair-bin/tools/scripts/dualshock3.xml -
trunk/tools/scripts/dualshock3_local_bt.sh
r27 r28 1 1 #! /bin/bash 2 ${FLAIR_ROOT}/flair-bin/tools/$ARCH_DIR/scripts/dualshock3 .sh 127.0.0.12 ${FLAIR_ROOT}/flair-bin/tools/$ARCH_DIR/scripts/dualshock3_bt.sh 127.0.0.1 -
trunk/tools/scripts/dualshock3_local_usb.sh
r22 r28 1 1 #! /bin/bash 2 ${FLAIR_ROOT}/flair-bin/tools/ $ARCH_DIR/scripts/dualshock3_usb.sh 127.0.0.12 ${FLAIR_ROOT}/flair-bin/tools/scripts/dualshock3_usb.sh 127.0.0.1 -
trunk/tools/scripts/dualshock3_usb.sh
r22 r28 8 8 fi 9 9 10 . $FLAIR_ROOT/flair-dev/scripts/ubuntu_cgroup_hack.sh 10 $FLAIR_ROOT/flair-bin/tools/scripts/dualshock3.sh -a ${1}:20000 -c usb -t 100 -x ${FLAIR_ROOT}/flair-bin/tools/scripts/dualshock3.xml 11 11 12 #we must run as root13 if [ $EUID -ne 0 ]; then14 exec sudo -E $0 $*15 fi16 17 export LD_LIBRARY_PATH="${OECORE_HOST_SYSROOT}/usr/lib:${OECORE_HOST_SYSROOT}/lib"18 ${FLAIR_ROOT}/flair-bin/tools/$ARCH_DIR/unix/dualshock3 -a ${1}:20000 -c usb -t 100 -x ${FLAIR_ROOT}/flair-bin/tools/scripts/dualshock3.xml19
Note:
See TracChangeset
for help on using the changeset viewer.