Good catch. Let's hope the new URL keeps working.
I have kept the pkgrel
since this change does not affect the generated package.
Your AUR helper of choice might require manual intervention to download the new PKGBUILD.
Git Clone URL: | https://aur.archlinux.org/nrf-sniffer-ble.git (read-only, click to copy) |
---|---|
Package Base: | nrf-sniffer-ble |
Description: | nRF Sniffer for Bluetooth LE - firmware, SnifferAPI and Wireshark plugin |
Upstream URL: | https://www.nordicsemi.com/Products/Development-tools/nRF-Sniffer-for-Bluetooth-LE |
Keywords: | ble bluetooth nrf wireshark |
Licenses: | custom |
Submitter: | labuwx |
Maintainer: | labuwx |
Last Packager: | labuwx |
Votes: | 2 |
Popularity: | 0.000000 |
First Submitted: | 2021-11-19 00:27 (UTC) |
Last Updated: | 2025-09-07 19:14 (UTC) |
Good catch. Let's hope the new URL keeps working.
I have kept the pkgrel
since this change does not affect the generated package.
Your AUR helper of choice might require manual intervention to download the new PKGBUILD.
Hi, using makepkg the download from https://www.nordicsemi.com/-/media/Software-and-other-downloads/Desktop-software/nRF-Sniffer/sw/nrf_sniffer_for_bluetooth_le_4.1.1.zip fails. Trying it manually via browser works, so I guess they are doing some user agent filtering.
Anyway link for 4.1.1 on the nordic website points to https://nsscprodmedia.blob.core.windows.net/prod/software-and-other-downloads/desktop-software/nrf-sniffer/sw/nrf_sniffer_for_bluetooth_le_4.1.1.zip
This link also works for makepkg, So I recommend changing to this one
Thanks xorly. Fixed in 4.1.1-4.
Hi, can you patch the python 3.12 issue described here https://devzone.nordicsemi.com/f/nordic-q-a/107828/invalid-escape-sequence-s/487308 ?
Thanks mags. Fixed that.
This fails in a clean chroot (extra-x86)64-build) as is.
This line in the PKGBUILD needs to be changed:
patch -p1 -i ../0001-drop-Filelock-use.patch
to:
patch -p1 -i 0001-drop-Filelock-use.patch
Thanks to mniestroj's patch, now it is possible to use the extcap plugin as a non-root user.
However the extcap plugin and the SnifferAPI are not written with unprivileged users in mind. If the capture device does not appear or packets do not show up, check again as root.
The user running the sniffer must
* have write access to the serial port of the nRF chip
* have write access to /tmp/logs/log.txt
and /tmp/logs/capture.pcap
After installing this package, no devices (interfaces) are discovered when using as unpriviledged user. Everything works when running as root. The reason is that the implementation of extcap plugin relies on access to /var/lock/, which is 0755 root:root.
Please consider patching this package with https://github.com/mniestroj/aur-nrf-sniffer-ble/commit/556009ac7aa4cbcf45b9fc6ccb244eb07ea0b9a5, which solves described issue.
Pinned Comments
labuwx commented on 2023-07-19 22:24 (UTC)
Thanks to mniestroj's patch, now it is possible to use the extcap plugin as a non-root user.
However the extcap plugin and the SnifferAPI are not written with unprivileged users in mind. If the capture device does not appear or packets do not show up, check again as root.
The user running the sniffer must * have write access to the serial port of the nRF chip * have write access to
/tmp/logs/log.txt
and/tmp/logs/capture.pcap