--- /dev/null
+# remove sensitive files
+secrets.json
--- /dev/null
+# Copyright (c) 2015-2019 Volodymyr Shymanskyy. See the file LICENSE for copying permission.
+
+__version__ = "1.0.0"
+
+import struct
+import time
+import sys
+import os
+
+try:
+ import machine
+ gettime = lambda: time.ticks_ms()
+ SOCK_TIMEOUT = 0
+except ImportError:
+ const = lambda x: x
+ gettime = lambda: int(time.time() * 1000)
+ SOCK_TIMEOUT = 0.05
+
+def dummy(*args):
+ pass
+
+MSG_RSP = const(0)
+MSG_LOGIN = const(2)
+MSG_PING = const(6)
+
+MSG_TWEET = const(12)
+MSG_NOTIFY = const(14)
+MSG_BRIDGE = const(15)
+MSG_HW_SYNC = const(16)
+MSG_INTERNAL = const(17)
+MSG_PROPERTY = const(19)
+MSG_HW = const(20)
+MSG_HW_LOGIN = const(29)
+MSG_EVENT_LOG = const(64)
+
+MSG_REDIRECT = const(41) # TODO: not implemented
+MSG_DBG_PRINT = const(55) # TODO: not implemented
+
+STA_SUCCESS = const(200)
+STA_INVALID_TOKEN = const(9)
+
+DISCONNECTED = const(0)
+CONNECTING = const(1)
+CONNECTED = const(2)
+
+print("""
+ ___ __ __
+ / _ )/ /_ _____ / /__
+ / _ / / // / _ \\/ '_/
+ /____/_/\\_, /_//_/_/\\_\\
+ /___/ for Python v""" + __version__ + " (" + sys.platform + ")\n")
+
+class EventEmitter:
+ def __init__(self):
+ self._cbks = {}
+
+ def on(self, evt, f=None):
+ if f:
+ self._cbks[evt] = f
+ else:
+ def D(f):
+ self._cbks[evt] = f
+ return f
+ return D
+
+ def emit(self, evt, *a, **kv):
+ if evt in self._cbks:
+ self._cbks[evt](*a, **kv)
+
+
+class BlynkProtocol(EventEmitter):
+ def __init__(self, auth, tmpl_id=None, fw_ver=None, heartbeat=50, buffin=1024, log=None):
+ EventEmitter.__init__(self)
+ self.heartbeat = heartbeat*1000
+ self.buffin = buffin
+ self.log = log or dummy
+ self.auth = auth
+ self.tmpl_id = tmpl_id
+ self.fw_ver = fw_ver
+ self.state = DISCONNECTED
+ self.connect()
+
+ def virtual_write(self, pin, *val):
+ self._send(MSG_HW, 'vw', pin, *val)
+
+ def send_internal(self, pin, *val):
+ self._send(MSG_INTERNAL, pin, *val)
+
+ def set_property(self, pin, prop, *val):
+ self._send(MSG_PROPERTY, pin, prop, *val)
+
+ def sync_virtual(self, *pins):
+ self._send(MSG_HW_SYNC, 'vr', *pins)
+
+ def log_event(self, *val):
+ self._send(MSG_EVENT_LOG, *val)
+
+ def _send(self, cmd, *args, **kwargs):
+ if 'id' in kwargs:
+ id = kwargs.get('id')
+ else:
+ id = self.msg_id
+ self.msg_id += 1
+ if self.msg_id > 0xFFFF:
+ self.msg_id = 1
+
+ if cmd == MSG_RSP:
+ data = b''
+ dlen = args[0]
+ else:
+ data = ('\0'.join(map(str, args))).encode('utf8')
+ dlen = len(data)
+
+ self.log('<', cmd, id, '|', *args)
+ msg = struct.pack("!BHH", cmd, id, dlen) + data
+ self.lastSend = gettime()
+ self._write(msg)
+
+ def connect(self):
+ if self.state != DISCONNECTED: return
+ self.msg_id = 1
+ (self.lastRecv, self.lastSend, self.lastPing) = (gettime(), 0, 0)
+ self.bin = b""
+ self.state = CONNECTING
+ self._send(MSG_HW_LOGIN, self.auth)
+ self.emit('connected')
+
+ def disconnect(self):
+ if self.state == DISCONNECTED: return
+ self.bin = b""
+ self.state = DISCONNECTED
+ self.emit('disconnected')
+
+ def process(self, data=None):
+ if not (self.state == CONNECTING or self.state == CONNECTED): return
+ now = gettime()
+ if now - self.lastRecv > self.heartbeat+(self.heartbeat//2):
+ return self.disconnect()
+ if (now - self.lastPing > self.heartbeat//10 and
+ (now - self.lastSend > self.heartbeat or
+ now - self.lastRecv > self.heartbeat)):
+ self._send(MSG_PING)
+ self.lastPing = now
+
+ if data != None and len(data):
+ self.bin += data
+
+ while True:
+ if len(self.bin) < 5:
+ break
+
+ cmd, i, dlen = struct.unpack("!BHH", self.bin[:5])
+ if i == 0: return self.disconnect()
+
+ self.lastRecv = now
+ if cmd == MSG_RSP:
+ self.bin = self.bin[5:]
+
+ self.log('>', cmd, i, '|', dlen)
+ if self.state == CONNECTING and i == 1:
+ if dlen == STA_SUCCESS:
+ self.state = CONNECTED
+ dt = now - self.lastSend
+ info = ['ver', __version__, 'h-beat', self.heartbeat//1000, 'buff-in', self.buffin, 'dev', sys.platform+'-py']
+ if self.tmpl_id:
+ info.extend(['tmpl', self.tmpl_id])
+ info.extend(['fw-type', self.tmpl_id])
+ if self.fw_ver:
+ info.extend(['fw', self.fw_ver])
+ self._send(MSG_INTERNAL, *info)
+ try:
+ self.emit('connected', ping=dt)
+ except TypeError:
+ self.emit('connected')
+ else:
+ if dlen == STA_INVALID_TOKEN:
+ self.emit("invalid_auth")
+ print("Invalid auth token")
+ return self.disconnect()
+ else:
+ if dlen >= self.buffin:
+ print("Cmd too big: ", dlen)
+ return self.disconnect()
+
+ if len(self.bin) < 5+dlen:
+ break
+
+ data = self.bin[5:5+dlen]
+ self.bin = self.bin[5+dlen:]
+
+ args = list(map(lambda x: x.decode('utf8'), data.split(b'\0')))
+
+ self.log('>', cmd, i, '|', ','.join(args))
+ if cmd == MSG_PING:
+ self._send(MSG_RSP, STA_SUCCESS, id=i)
+ elif cmd == MSG_HW or cmd == MSG_BRIDGE:
+ if args[0] == 'vw':
+ self.emit("V"+args[1], args[2:])
+ self.emit("V*", args[1], args[2:])
+ elif cmd == MSG_INTERNAL:
+ self.emit("internal:"+args[0], args[1:])
+ elif cmd == MSG_REDIRECT:
+ self.emit("redirect", args[0], int(args[1]))
+ else:
+ print("Unexpected command: ", cmd)
+ return self.disconnect()
+
+import socket
+
+class Blynk(BlynkProtocol):
+ def __init__(self, auth, **kwargs):
+ self.insecure = kwargs.pop('insecure', False)
+ self.server = kwargs.pop('server', 'blynk.cloud')
+ self.port = kwargs.pop('port', 80 if self.insecure else 443)
+ BlynkProtocol.__init__(self, auth, **kwargs)
+ self.on('redirect', self.redirect)
+
+ def redirect(self, server, port):
+ self.server = server
+ self.port = port
+ self.disconnect()
+ self.connect()
+
+ def connect(self):
+ print('Connecting to %s:%d...' % (self.server, self.port))
+ s = socket.socket()
+ s.connect(socket.getaddrinfo(self.server, self.port)[0][-1])
+
+ try:
+ s.setsockopt(socket.IPPROTO_TCP, socket.TCP_NODELAY, 1)
+ except:
+ pass
+ if self.insecure:
+ self.conn = s
+ else:
+ try:
+ import ussl
+ ssl_context = ussl
+ except ImportError:
+ import ssl
+ ssl_context = ssl.create_default_context()
+ self.conn = ssl_context.wrap_socket(s, server_hostname=self.server)
+ try:
+ self.conn.settimeout(SOCK_TIMEOUT)
+ except:
+ s.settimeout(SOCK_TIMEOUT)
+ BlynkProtocol.connect(self)
+
+ def _write(self, data):
+ #print('<', data)
+ self.conn.write(data)
+ # TODO: handle disconnect
+
+ def run(self):
+ data = b''
+ try:
+ data = self.conn.read(self.buffin)
+ #print('>', data)
+ except KeyboardInterrupt:
+ raise
+ except socket.timeout:
+ # No data received, call process to send ping messages when needed
+ pass
+ except: # TODO: handle disconnect
+ return
+ self.process(data)
+
--- /dev/null
+# Copyright (c) 2015-2019 Volodymyr Shymanskyy. See the file LICENSE for copying permission.
+
+__version__ = "1.0.0"
+
+import struct
+import time
+import sys
+import os
+
+try:
+ import machine
+ gettime = lambda: time.ticks_ms()
+ SOCK_TIMEOUT = 0
+except ImportError:
+ const = lambda x: x
+ gettime = lambda: int(time.time() * 1000)
+ SOCK_TIMEOUT = 0.05
+
+def dummy(*args):
+ pass
+
+MSG_RSP = const(0)
+MSG_LOGIN = const(2)
+MSG_PING = const(6)
+
+MSG_TWEET = const(12)
+MSG_NOTIFY = const(14)
+MSG_BRIDGE = const(15)
+MSG_HW_SYNC = const(16)
+MSG_INTERNAL = const(17)
+MSG_PROPERTY = const(19)
+MSG_HW = const(20)
+MSG_HW_LOGIN = const(29)
+MSG_EVENT_LOG = const(64)
+
+MSG_REDIRECT = const(41) # TODO: not implemented
+MSG_DBG_PRINT = const(55) # TODO: not implemented
+
+STA_SUCCESS = const(200)
+STA_INVALID_TOKEN = const(9)
+
+DISCONNECTED = const(0)
+CONNECTING = const(1)
+CONNECTED = const(2)
+
+print("""
+ ___ __ __
+ / _ )/ /_ _____ / /__
+ / _ / / // / _ \\/ '_/
+ /____/_/\\_, /_//_/_/\\_\\
+ /___/ for Python v""" + __version__ + " (" + sys.platform + ")\n")
+
+class EventEmitter:
+ def __init__(self):
+ self._cbks = {}
+
+ def on(self, evt, f=None):
+ if f:
+ self._cbks[evt] = f
+ else:
+ def D(f):
+ self._cbks[evt] = f
+ return f
+ return D
+
+ def emit(self, evt, *a, **kv):
+ if evt in self._cbks:
+ self._cbks[evt](*a, **kv)
+
+
+class BlynkProtocol(EventEmitter):
+ def __init__(self, auth, tmpl_id=None, fw_ver=None, heartbeat=50, buffin=1024, log=None):
+ EventEmitter.__init__(self)
+ self.heartbeat = heartbeat*1000
+ self.buffin = buffin
+ self.log = log or dummy
+ self.auth = auth
+ self.tmpl_id = tmpl_id
+ self.fw_ver = fw_ver
+ self.state = DISCONNECTED
+ self.connect()
+
+ def virtual_write(self, pin, *val):
+ self._send(MSG_HW, 'vw', pin, *val)
+
+ def send_internal(self, pin, *val):
+ self._send(MSG_INTERNAL, pin, *val)
+
+ def set_property(self, pin, prop, *val):
+ self._send(MSG_PROPERTY, pin, prop, *val)
+
+ def sync_virtual(self, *pins):
+ self._send(MSG_HW_SYNC, 'vr', *pins)
+
+ def log_event(self, *val):
+ self._send(MSG_EVENT_LOG, *val)
+
+ def _send(self, cmd, *args, **kwargs):
+ if 'id' in kwargs:
+ id = kwargs.get('id')
+ else:
+ id = self.msg_id
+ self.msg_id += 1
+ if self.msg_id > 0xFFFF:
+ self.msg_id = 1
+
+ if cmd == MSG_RSP:
+ data = b''
+ dlen = args[0]
+ else:
+ data = ('\0'.join(map(str, args))).encode('utf8')
+ dlen = len(data)
+
+ self.log('<', cmd, id, '|', *args)
+ msg = struct.pack("!BHH", cmd, id, dlen) + data
+ self.lastSend = gettime()
+ self._write(msg)
+
+ def connect(self):
+ if self.state != DISCONNECTED: return
+ self.msg_id = 1
+ (self.lastRecv, self.lastSend, self.lastPing) = (gettime(), 0, 0)
+ self.bin = b""
+ self.state = CONNECTING
+ self._send(MSG_HW_LOGIN, self.auth)
+ self.emit('connected')
+
+ def disconnect(self):
+ if self.state == DISCONNECTED: return
+ self.bin = b""
+ self.state = DISCONNECTED
+ self.emit('disconnected')
+
+ def process(self, data=None):
+ if not (self.state == CONNECTING or self.state == CONNECTED): return
+ now = gettime()
+ if now - self.lastRecv > self.heartbeat+(self.heartbeat//2):
+ return self.disconnect()
+ if (now - self.lastPing > self.heartbeat//10 and
+ (now - self.lastSend > self.heartbeat or
+ now - self.lastRecv > self.heartbeat)):
+ self._send(MSG_PING)
+ self.lastPing = now
+
+ if data != None and len(data):
+ self.bin += data
+
+ while True:
+ if len(self.bin) < 5:
+ break
+
+ cmd, i, dlen = struct.unpack("!BHH", self.bin[:5])
+ if i == 0: return self.disconnect()
+
+ self.lastRecv = now
+ if cmd == MSG_RSP:
+ self.bin = self.bin[5:]
+
+ self.log('>', cmd, i, '|', dlen)
+ if self.state == CONNECTING and i == 1:
+ if dlen == STA_SUCCESS:
+ self.state = CONNECTED
+ dt = now - self.lastSend
+ info = ['ver', __version__, 'h-beat', self.heartbeat//1000, 'buff-in', self.buffin, 'dev', sys.platform+'-py']
+ if self.tmpl_id:
+ info.extend(['tmpl', self.tmpl_id])
+ info.extend(['fw-type', self.tmpl_id])
+ if self.fw_ver:
+ info.extend(['fw', self.fw_ver])
+ self._send(MSG_INTERNAL, *info)
+ try:
+ self.emit('connected', ping=dt)
+ except TypeError:
+ self.emit('connected')
+ else:
+ if dlen == STA_INVALID_TOKEN:
+ self.emit("invalid_auth")
+ print("Invalid auth token")
+ return self.disconnect()
+ else:
+ if dlen >= self.buffin:
+ print("Cmd too big: ", dlen)
+ return self.disconnect()
+
+ if len(self.bin) < 5+dlen:
+ break
+
+ data = self.bin[5:5+dlen]
+ self.bin = self.bin[5+dlen:]
+
+ args = list(map(lambda x: x.decode('utf8'), data.split(b'\0')))
+
+ self.log('>', cmd, i, '|', ','.join(args))
+ if cmd == MSG_PING:
+ self._send(MSG_RSP, STA_SUCCESS, id=i)
+ elif cmd == MSG_HW or cmd == MSG_BRIDGE:
+ if args[0] == 'vw':
+ self.emit("V"+args[1], args[2:])
+ self.emit("V*", args[1], args[2:])
+ elif cmd == MSG_INTERNAL:
+ self.emit("internal:"+args[0], args[1:])
+ elif cmd == MSG_REDIRECT:
+ self.emit("redirect", args[0], int(args[1]))
+ else:
+ print("Unexpected command: ", cmd)
+ return self.disconnect()
+
+import socket
+
+class Blynk(BlynkProtocol):
+ def __init__(self, auth, **kwargs):
+ self.insecure = kwargs.pop('insecure', False)
+ self.server = kwargs.pop('server', 'blynk.cloud')
+ self.port = kwargs.pop('port', 80 if self.insecure else 443)
+ BlynkProtocol.__init__(self, auth, **kwargs)
+ self.on('redirect', self.redirect)
+
+ def redirect(self, server, port):
+ self.server = server
+ self.port = port
+ self.disconnect()
+ self.connect()
+
+ def connect(self):
+ print('Connecting to %s:%d...' % (self.server, self.port))
+ s = socket.socket()
+ s.connect(socket.getaddrinfo(self.server, self.port)[0][-1])
+
+ try:
+ s.setsockopt(socket.IPPROTO_TCP, socket.TCP_NODELAY, 1)
+ except:
+ pass
+ if self.insecure:
+ self.conn = s
+ else:
+ try:
+ import ussl
+ ssl_context = ussl
+ except ImportError:
+ import ssl
+ ssl_context = ssl.create_default_context()
+ self.conn = ssl_context.wrap_socket(s, server_hostname=self.server)
+ try:
+ self.conn.settimeout(SOCK_TIMEOUT)
+ except:
+ s.settimeout(SOCK_TIMEOUT)
+ BlynkProtocol.connect(self)
+
+ def _write(self, data):
+ #print('<', data)
+ self.conn.write(data)
+ # TODO: handle disconnect
+
+ def run(self):
+ data = b''
+ try:
+ data = self.conn.read(self.buffin)
+ #print('>', data)
+ except KeyboardInterrupt:
+ raise
+ except socket.timeout:
+ # No data received, call process to send ping messages when needed
+ pass
+ except: # TODO: handle disconnect
+ return
+ self.process(data)
+
--- /dev/null
+import machine,network,time, BlynkLib, sys, gc, ujson
+from neopixel import NeoPixel
+from machine import Pin
+
+def readSecrets():
+ with open('secrets.json') as fp:
+ secrets=ujson.loads(fp.read())
+ return secrets
+
+# connect to Blynk
+secrets=readSecrets()
+BLYNK_AUTH=secrets['home_wifi']['blynkAuth']
+blynk=BlynkLib.Blynk(BLYNK_AUTH,server='ny3.blynk.cloud')
+vpin=1
+
+# button connected to pin 39, ground, when btn pressed value=0
+btn=machine.Pin(39,machine.Pin.IN,machine.Pin.PULL_UP)
+
+# button connected to pin 18, ground, when btn pressed blynk.disconnect
+#btnD=machine.Pin(18,machine.Pin.IN,machine.Pin.PULL_UP)
+
+# LED GP25
+LED_GPIO = const(27)
+matrix_size_x = const(5)
+matrix_size_y = const(5)
+is_atom_matrix = True
+
+np = NeoPixel(Pin(LED_GPIO), matrix_size_x * matrix_size_y)
+
+# set up datastream to Blynk (btn.value=pin v1)
+@blynk.on('read V1')
+def read_virtual_pin_handler(vpin):
+ blynk.virtual_write(vpin,int(btn.value()))
+
+# LED handler (turn on when connected)
+@blynk.on("connected")
+def blynk_connected():
+ np.fill((0,25,0))
+ np.write()
+
+# LED handler (turn off when disconnected)
+@blynk.on("disconnected")
+def blynk_disconnected():
+ np.fill((25,0,0))
+ np.write()
+
+# garbage collection
+gc.threshold(26144)
+gc.enable()
+
+# main loop
+while True:
+ try:
+ read_virtual_pin_handler(vpin)
+ #print(int(btn.value()))
+ if int(btn.value())==0:
+ blynk.log_event("Mommy_alert")
+ time.sleep(.25)
+
+# if int(btnD.value())==0:
+# wlan.disconnect()
+# blynk.disconnect()
+
+ blynk.run()
+ except KeyboardInterrupt:
+ blynk_disconnected()
+ blynk.disconnect()
+ sys.exit()
\ No newline at end of file
--- /dev/null
+import machine,network,time, BlynkLib, sys, gc, ujson
+from neopixel import NeoPixel
+from machine import Pin
+
+wlan=network.WLAN(network.STA_IF)
+wlan.active(True)
+
+def readSecrets():
+ with open('secrets.json') as fp:
+ secrets=ujson.loads(fp.read())
+ return secrets
+
+def wifiConnect():
+ secrets=readSecrets()
+ wlan.connect(secrets['home_wifi']['ssid'],secrets['home_wifi']['pass'])
+
+wifiConnect()
+
+# connect to Blynk
+secrets=readSecrets()
+BLYNK_AUTH=secrets['home_wifi']['blynkAuth']
+blynk=BlynkLib.Blynk(BLYNK_AUTH)
+vpin=1
+
+# button connected to pin 28, ground, when btn pressed value=0
+btn=machine.Pin(39,machine.Pin.IN,machine.Pin.PULL_UP)
+
+# button connected to pin 18, ground, when btn pressed blynk.disconnect
+#btnD=machine.Pin(18,machine.Pin.IN,machine.Pin.PULL_UP)
+
+# LED GP25
+LED_GPIO = const(27)
+matrix_size_x = const(5)
+matrix_size_y = const(5)
+is_atom_matrix = True
+
+np = NeoPixel(Pin(LED_GPIO), matrix_size_x * matrix_size_y)
+
+# button handler
+def pressed(btn):
+ global pressed
+ if not pressed:
+ pressed=True
+
+# set up datastream to Blynk (btn.value=pin v1)
+@blynk.on('read V1')
+def read_virtual_pin_handler(vpin):
+ blynk.virtual_write(vpin,int(btn.value()))
+
+# LED handler (turn on when connected)
+@blynk.on("connected")
+def blynk_connected():
+ np.fill((0,25,0))
+ np.write()
+
+# LED handler (turn off when disconnected)
+@blynk.on("disconnected")
+def blynk_disconnected():
+ np.fill((25,0,0))
+ np.write()
+
+# garbage collection
+gc.threshold(26144)
+gc.enable()
+
+# main loop
+while True:
+ try:
+ read_virtual_pin_handler(vpin)
+ #print(int(btn.value()))
+ if int(btn.value())==0:
+ blynk.log_event("Mommy_alert")
+ time.sleep(.25)
+
+# if int(btnD.value())==0:
+# wlan.disconnect()
+# blynk.disconnect()
+
+ blynk.run()
+ except KeyboardInterrupt:
+ blynk_disconnected()
+ blynk.disconnect()
+ sys.exit()
\ No newline at end of file
--- /dev/null
+import machine,network,time, BlynkLib, sys, gc, ujson
+
+wlan=network.WLAN(network.STA_IF)
+wlan.active(True)
+
+def readSecrets():
+ with open('secrets.json') as fp:
+ secrets=ujson.loads(fp.read())
+ return secrets
+
+def wifiConnect():
+ secrets=readSecrets()
+ wlan.connect(secrets['home_wifi']['ssid'],secrets['home_wifi']['pass'])
+
+wifiConnect()
+
+# connect to Blynk
+BLYNK_AUTH='ie_FVuX0HuP5m5k--kuauDHlrvviHbuI'
+blynk=BlynkLib.Blynk(BLYNK_AUTH)
+vpin=1
+
+# button connected to pin 28, ground, when btn pressed value=0
+btn=machine.Pin(28,machine.Pin.IN,machine.Pin.PULL_UP)
+
+# LED GP25
+led=machine.Pin("LED",machine.Pin.OUT)
+
+# button handler
+def pressed(btn):
+ global pressed
+ if not pressed:
+ pressed=True
+
+# set up datastream to Blynk (btn.value=pin v1)
+@blynk.on('read V1')
+def read_virtual_pin_handler(vpin):
+ blynk.virtual_write(vpin,int(btn.value()))
+
+# LED handler (turn on when connected)
+@blynk.on("connected")
+def blynk_connected():
+ led.on()
+
+# LED handler (turn off when disconnected)
+@blynk.on("disconnected")
+def blynk_disconnected():
+ led.off()
+
+# garbage collection
+gc.threshold(26144)
+gc.enable()
+
+# main loop
+while True:
+ try:
+ read_virtual_pin_handler(vpin)
+ #print(int(btn.value()))
+ if int(btn.value())==0:
+ blynk.log_event("Mommy_alert")
+ time.sleep(.25)
+ blynk.run()
+ except KeyboardInterrupt:
+ blynk_disconnected()
+ blynk.disconnect()
+ sys.exit()
\ No newline at end of file
--- /dev/null
+import machine,network,time, BlynkLib, sys, gc, ujson
+from neopixel import NeoPixel
+from machine import Pin
+
+wlan=network.WLAN(network.STA_IF)
+wlan.active(True)
+
+def readSecrets():
+ with open('secrets.json') as fp:
+ secrets=ujson.loads(fp.read())
+ return secrets
+
+def wifiConnect():
+ secrets=readSecrets()
+ if wlan.isconnected()==False:
+ wlan.connect(secrets['home_wifi']['ssid'],secrets['home_wifi']['pass'])
+ elif wlan.isconnected()==True:
+ pass
+
+wifiConnect()
+
+# connect to Blynk
+secrets=readSecrets()
+BLYNK_AUTH=secrets['home_wifi']['blynkAuth']
+blynk=BlynkLib.Blynk(BLYNK_AUTH)
+vpin=1
+
+# button connected to pin 28, ground, when btn pressed value=0
+btn=machine.Pin(39,machine.Pin.IN,machine.Pin.PULL_UP)
+
+# button connected to pin 18, ground, when btn pressed blynk.disconnect
+#btnD=machine.Pin(18,machine.Pin.IN,machine.Pin.PULL_UP)
+
+# LED GP25
+LED_GPIO = const(27)
+matrix_size_x = const(5)
+matrix_size_y = const(5)
+is_atom_matrix = True
+
+np = NeoPixel(Pin(LED_GPIO), matrix_size_x * matrix_size_y)
+
+# button handler
+def pressed(btn):
+ global pressed
+ if not pressed:
+ pressed=True
+
+# set up datastream to Blynk (btn.value=pin v1)
+@blynk.on('read V1')
+def read_virtual_pin_handler(vpin):
+ blynk.virtual_write(vpin,int(btn.value()))
+
+# LED handler (turn on when connected)
+@blynk.on("connected")
+def blynk_connected():
+ np.fill((0,25,0))
+ np.write()
+
+# LED handler (turn off when disconnected)
+@blynk.on("disconnected")
+def blynk_disconnected():
+ np.fill((25,0,0))
+ np.write()
+
+# garbage collection
+gc.threshold(26144)
+gc.enable()
+
+# main loop
+while True:
+ try:
+ read_virtual_pin_handler(vpin)
+ #print(int(btn.value()))
+ if int(btn.value())==0:
+ blynk.log_event("Mommy_alert")
+ time.sleep(.25)
+
+# if int(btnD.value())==0:
+# wlan.disconnect()
+# blynk.disconnect()
+
+ blynk.run()
+ except KeyboardInterrupt:
+ blynk_disconnected()
+ blynk.disconnect()
+ sys.exit()
\ No newline at end of file
--- /dev/null
+# This file is executed on every boot (including wake-boot from deepsleep)
+#import esp
+#esp.osdebug(None)
+#import webrepl
+#webrepl.start()
+import network, ujson, time
+from machine import Pin
+from neopixel import NeoPixel
+
+# LED GP25
+LED_GPIO = const(27)
+matrix_size_x = const(5)
+matrix_size_y = const(5)
+is_atom_matrix = True
+
+np = NeoPixel(Pin(LED_GPIO), matrix_size_x * matrix_size_y)
+
+wlan=network.WLAN(network.STA_IF)
+wlan.active(True)
+
+def readSecrets():
+ with open('secrets.json') as fp:
+ secrets=ujson.loads(fp.read())
+ return secrets
+
+def wifiConnect():
+ secrets=readSecrets()
+ if wlan.isconnected()==False:
+ wlan.connect(secrets['home_wifi']['ssid'],secrets['home_wifi']['pass'])
+ np.fill((35,25,0))
+ np.write()
+ time.sleep(3)
+ pass
+ elif wlan.isconnected()==True:
+ pass
+
+wifiConnect()
\ No newline at end of file
--- /dev/null
+import machine,network,time, BlynkLib, sys, gc, ujson
+from neopixel import NeoPixel
+from machine import Pin
+
+def readSecrets():
+ with open('secrets.json') as fp:
+ secrets=ujson.loads(fp.read())
+ return secrets
+
+# connect to Blynk
+secrets=readSecrets()
+BLYNK_AUTH=secrets['home_wifi']['blynkAuth']
+blynk=BlynkLib.Blynk(BLYNK_AUTH,server='ny3.blynk.cloud')
+vpin=1
+
+# button connected to pin 39, ground, when btn pressed value=0
+btn=machine.Pin(39,machine.Pin.IN,machine.Pin.PULL_UP)
+
+# button connected to pin 18, ground, when btn pressed blynk.disconnect
+#btnD=machine.Pin(18,machine.Pin.IN,machine.Pin.PULL_UP)
+
+# LED GP25
+LED_GPIO = const(27)
+matrix_size_x = const(5)
+matrix_size_y = const(5)
+is_atom_matrix = True
+
+np = NeoPixel(Pin(LED_GPIO), matrix_size_x * matrix_size_y)
+
+# set up datastream to Blynk (btn.value=pin v1)
+@blynk.on('read V1')
+def read_virtual_pin_handler(vpin):
+ blynk.virtual_write(vpin,int(btn.value()))
+
+# LED handler (turn on when connected)
+@blynk.on("connected")
+def blynk_connected():
+ np.fill((0,25,0))
+ np.write()
+
+# LED handler (turn off when disconnected)
+@blynk.on("disconnected")
+def blynk_disconnected():
+ np.fill((25,0,0))
+ np.write()
+
+# garbage collection
+gc.threshold(26144)
+gc.enable()
+
+# main loop
+while True:
+ try:
+ read_virtual_pin_handler(vpin)
+ #print(int(btn.value()))
+ if int(btn.value())==0:
+ blynk.log_event("Mommy_alert")
+ time.sleep(.25)
+
+# if int(btnD.value())==0:
+# wlan.disconnect()
+# blynk.disconnect()
+
+ blynk.run()
+ except KeyboardInterrupt:
+ blynk_disconnected()
+ blynk.disconnect()
+ sys.exit()
\ No newline at end of file