The Bouncer

Convenient Web Requests

The second part of the alarm pipeline is shown in Listing  2; the REST request sent to the Pushover API server requires two tokens (lines 12 and 13), which users receive when registering with the Pushover service. The trial period lasts for four weeks and allows free access; if you like what you see, you can then buy a license for $5, which covers a single platform: iOS, Android, or the desktop client.

Registered users will find the token assigned to the user key in the Pushover dashboard overview in Figure 4. The token labeled token, on the other hand, identifies the app (Figure 5) to the Pushover service; in this case, it is the Python script in Listing 2, which I registered with Pushover under the name Snapshot.

Listing 2

pushover

 

Figure 4: Registered users can see their user tokens in the dashboard.
Figure 5: Newly registered user apps receive a token.

For a successful REST request with Python's requests library, you also need the message parameter with the message text for the post() method in line 9 to contact Pushover. In typical Python style, the library throws exceptions that abort the program in case of errors if they're not processed and outputs a stack trace that will hopefully help you solve the problem.

The Python requests library keeps its promise of being a self-proclaimed "HTTP for Humans." At least it is more carefully thought out than urllib and urllib2, which you might remember I have complained about before.

Line 6 in Listing 2 retrieves the text sent from the first part of the pipeline from standard input and truncates it with the usual syntax for array slices in Python – [:1024] – to the maximum length of 1,024 characters allowed by Pushover. The if construct in lines 8-15 then uses the regular expression \S to check whether the message contains printable characters and terminates empty runs without further ado.

Friend Cron

All you have to do now is set up a cron job that calls the pipeline about every five minutes and finds the user's home directory and the writable data directory therein for storing the flag file:

*/5 * * * * /path/authwatch | /path/pushover

The Pushover service distributes any messages sent to all devices registered by the user, so it may happen that a failed login attempt triggers a whole explosion of notifications if several mobile devices in the room are actively connected. At least this only counts as one message, though, in the usage constraints, of which users are allowed 7,500 per month on the all-inclusive tier.

Mike Schilli

Mike Schilli works as a software engineer in the San Francisco Bay area of California. In his column, launched back in 1997, he focuses on short projects in Perl and various other languages. You can contact Mike at mailto:mschilli@perlmeister.com.

Infos

  1. "WiFi Connect Messages" by Mike Schilli, Linux Pro Magazine, issue 186, May 2016, p. 64, http://www.linux-magazine.com/Issues/2016/186/Perl-WiFi-Connect-Messages
  2. Pushover login: https://client.pushover.net
  3. Pygtail: https://github.com/bgreenlee/pygtail
  4. Listings for this article: ftp://ftp.linux-magazine.com/pub/listings/linux-magazine.com/200

Buy this article as PDF

Express-Checkout as PDF
Price $2.95
(incl. VAT)

Buy Linux Magazine

SINGLE ISSUES
 
SUBSCRIPTIONS
 
TABLET & SMARTPHONE APPS
Get it on Google Play

US / Canada

Get it on Google Play

UK / Australia

Related content

  • Homegrown Notes Tool

    If you're tired of the privacy problems and feature bloat of high-end note-taking utilities, try rolling your own.

  • Programming Snapshot – Mileage AI

    On the basis of training data in the form of daily car mileage, Mike Schilli's AI program tries to identify patterns in driving behavior and make forecasts.

  • Cave Painter

    While searching for a method to draw geodata right into the terminal, Mike Schilli discovers the wondrous world of map projections.

  • Patterns in the Archive

    To help him check his Google Drive files with three different pattern matchers, Mike builds a command-line tool in Go to maintain a meta cache.

  • Programming Snapshot – Go

    Every photo you take with your mobile phone stores the GPS location in the Exif data. A Go program was let loose on Mike Schilli's photo collection to locate shots taken within an area around a reference image.

comments powered by Disqus
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters

Support Our Work

Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.

Learn More

News