Building a cheap Raspberry Pi mini arcade cabinet
This is part 1 of a series in which I’ll be building a Raspberry Pi-powered mini arcade cabinet. Check back here for a link to part 2 when I have written it.
I ordered my Raspberry Pi a few months ago, and it’s been sitting on my desk pretty much collecting dust ever since. I had some vague ideas about using it with RetroPie to be the brains in some sort of arcade machine. But what sort of arcade machine would that be?
There are some great guides out there for building your own machine from scratch, but as I don’t have access to sophisticated cutting machinery, they seemed a step too far. I also came across some fairly nice looking pre-built kits, but they are all relatively expensive. I’m just after a bit of fun; not a major investment!
Then I came across this post on Reddit, where user Zero1O1 had used an iCade as the basis for a little Raspberry Pi-based MAME cabinet. If you’re not aware of the iCade, it’s a cabinet that accepts and pares with your iPad using Bluetooth, and allows you to play supported games using the built in arcade stick and buttons.
According to the guide, we'll be needing the following parts to complete our project:
- Raspberry Pi (I have the model B+, but the model B should do)
- An ION iCade
- LCD screen with power supply
- USB controller board for the joystick and buttons
- USB speaker for sound output
ION iCade
iCade’s can be had really cheaply on eBay these days, but I snagged mine on Amazon UK for only £30. Click here to see it Amazon.com. It really is amazing value as you’d struggle to buy just the arcade controls for that money. The iCade arrived in due course and I wasted no time in getting it set up. Here’s my son having his first ever experience of Pac-Man on the iCade (using it with the iPad in its normal configuration):
https://www.youtube.com/watch?v=0IYZMN9uEWE
The screen
In his guide, Zero101 ordered this 10.1” screen from Adafruit, which certainly looks like a nice bit of kit, but is quite pricey at $145.00. Instead, I opted to purchase this screen from DealExtreme for a much more palatable $75.00. DealExtreme ships for free from China, but it does take a while to arrive. We’ll have to see if the quality is up to snuff. My other misgiving is that the screen will be a little too big at 10.1”. There’s definitely enough room for it in the iCade cabinet; I’m just worried it will appear a little cramped. If it really doesn’t work out, I might have to opt for the 7” version instead. Both screens come with a controller board supporting multiple inputs, including HDMI, which should make it really easy to connect to the Raspberry Pi. And both screens require a 12V power source to run. I think I have one lying around, but I’m going to try and find out if it’d be possible to run both the Pi and screen from the same power source. It’d be much nicer to just have the single power cord running into the cabinet.
USB controller board for the joystick and buttons
While it is possible to wire the iCade joystick and buttons directly to the GPIO pins on the Raspberry Pi, I've opted to go for a dedicated controller board that connects to the Pi via USB, and has connectors for all the iCade's buttons and more (might be nice to add some buttons on the side for some Pinball action). I found this one on eBay, which seems to fit the bill.
USB speaker
Any old USB speaker will do, but the smaller the better. These little capsule speakers are really compact, so should do rather nicely.
What’s next?
In the next part of this series, we'll take a look at the various bits I've purchased and see if we can get them all working together.
Three things I did to prevent Drupal registration spam
It started slowly. Every few days I’d have a suspicious looking username pop up in my user list. I thought little of it at first — It’s free to register at Darkadia (my game cataloging service), and, beyond what’s intended, there’s nothing untoward you can do once you’ve logged in. So not a big worry.
But over time the frequency of these spam registrations increased. Now I was getting five or more per day. Finally I got curious enough and decided to try and find out exactly how many of my site’s users were genuine. I did this with a simple database query which showed me how many of my registered users had never returned after that initial registration and login. I was shocked. By my estimates, fully a third of my entire user base were spam registrations.
Something had to be done.
I suppose your first thought at this point might be to simply add a CAPTCHA. But there are few things I hate more on the web than trying to figure out what illegible numbers and letters have been smudged onto those CAPTCHA images. I was not going to inflict that pain on real people in order to thwart a registration bot.
Nope, I was going to need something a little more subtle than that. My attack on spambots would be threefold:
1. Block the offending domains
I noticed that a lot of the spam registrations were making use of email addresses from the domains big-post.com and mail-4server.com. If those had been Gmail or Hotmail addresses I might have left it at that, but as I did not have a single valid user from either of the offending domains, l felt it’d save me a lot of hassle to simply ban those domains outright. This ability is built right into Drupal. I went to the Access Rules section in the admin panel (admin/user/rules), and added a DENY rule for each of the domains. The rule configuration takes a wildcard, so I could simply enter %@big-post.com and %@mail-4server.com.
Update
Thanks to @typhonius for pointing out in the comments that the access rules functionality has been removed from the Drupal 7 core. It is now provided by the User restrictions module.
2. Filter out the bots without annoying my users
For this I turned to a great little module called Spamicide, which lays an effective honeypot trap for the spambots. It adds an input field to your registration form that is hidden from your users, but visible to spambots. When the field is filled in, the registration attempt is rejected. Spamicide supports any form on a Drupal website and, with some measures built in to avoid detection, it works a treat — in the three months since I turned it on, it’s blocked over 900 registration attempts.
3. Require email verification
Implementing the first two measures dramatically reduced the number of spam registrations I was receiving. But it didn’t quite get rid of all of them. And now that I had the bit between my teeth, I couldn’t just let it lie there. Nevertheless, requiring my visitors to verify their emails was a tough decision, because it was going to be an inconvenience. Ultimately though, I just wasn’t comfortable with the idea of having spambots with valid accounts on my site — I could well implement some change in the future that could give spammers free reign to ply their trade.
Drupal supports email verification out of the box, so if you’re happily using that you can skip the rest of this section. But what if you want users to choose their password during registration? You can’t have it both ways with Drupal running in its standard configuration — you either have email verification enabled, or you disable that to let new users choose their password. But the problem with letting them choose their password is that anyone can register using any bogus email address and now they’re a fully authenticated user of your system and, depending on how your permissions are configured, they can start spamming you to death.
Enter LoginToboggan. This module modifies Drupal’s login system in a number of ways and you can check the project page for a full rundown. What we’re interested in though, is that it allows you to require email verification AND let users choose their own passwords. It does this by assigning the new user a role with a minumum set of permissions, and automatically upgrading the user once the email address is verified. You can even set it to delete unverified accounts after a set interval.
Conclusion
Completing step 3 was the final nail in the spammers’ coffin; at least as far as Darkadia is concerned. I’m convinced the above measures will stop all spambots, and all but the most determined of spammers. And most importantly, I didn't have to penalise my own users just to make life difficult for spammers.
Alternatives
Mollom is a popular option for preventing spam on your Drupal site. It works by employing a learning algorithm to determine whether a registration attempt or comment posted is genuine.
Update
The Honeypot module provides the same form protection as Spamicide, but it also adds a timestamp-based deterrent that ensures a small amount of time has passed between page load and form submission. It is in use on drupal.org, so is clearly a solid option. (Thanks to @servercheck for pointing this out in the comments.)
Recreating my perfect web development environment using a Parallels VM and CentOS
As MacUpdate has just launched an excellent bundle deal that includes the virtualization software Parallels Desktop for Mac, I decided the time was ripe to replace my ageing copy of VMWare Fusion with its creaky installation of Ubuntu Server. Almost all of my web development work is done on my Macbook Pro, and my previous setup of running Ubuntu in a VM as my local web server has worked very well. As my external hosting is done on a VPS running CentOS, I thought it'd be a good idea to start running the popular OS locally as well. Parallels meanwhile has been garnering good reviews, and I was particularly drawn to the improved 3D performance over VMWare Fusion (who doesn't love a bit of gaming now and then), as well as the improved power management features, which should lead to longer battery life.
I had my VMWare Fusion/Ubuntu server setup configured to my particular tastes, and if the new setup was going to work out, Parallels would have to be able to replicate all of that functionality. In particular it would have to:
- Let me configure the guest OS (CentOS Linux) with a fixed IP address accessible from the host computer (Mac OS), and
- Let me keep my development files outside of the VM, i.e. on the host computer, so that I can edit the files in Mac OS, yet have them served by the VM.
Happy to report that everything went swimmingly, and I'm back up and running with my development work within a day. There was a fair bit of trial and error along the way, and I've recorded the steps here for your enjoyment. Hope it helps!
Prepare Parallels networking
The first thing we need to do is tweak Parallel's networking settings. What we need to do is leave a gap in the DHCP range that we can use to assign a static IP address to our VM.
- Open the Parallels preferences, and switch to the Advanced tab.
- Click Change settings next to Network.
- Under Shared, ensure IPv4 DHCP is enabled
- Configure the following values:
- Start Address: 10.211.55.20
- End Address: 10.211.55.254
- Subnet mask: 255.255.255.0
Install CentOS
Next we download and install CentOS. I've chosen to download the CentOS 6 minimal distribution as I wanted to keep things compact, and install only the components I need. I've chosen to forego a GUI for example. The installation itself is pretty straightforward, but pay particular attention to the network configuration bit.
- Download a CentOS 6 64-bit minimal distribution. The filename should be something like CentOS-6.4-x86_64-minimal.iso, but that will depend on the exact version you're downloading.
- Open Parallels and select the downloaded ISO. The installation will run.
- Select Install or upgrade an existing system.
- Live dangerously and skip the media test. The CentOS installer will now launch.
- Click Next, the select your language keyboard preferences.
- Choose Basic Storage Devices.
- Choose Discard any data when configure the filesystem.
- Specify the domain name. I've named mine "firefly". You can use anything you like, but remember it as we'll be using this again later.
- Click Configure Network:
- Select System eth0 and click Edit.
- Tick Connect automatically and Available to all users.
- Under IPV4 settings select Manual from the Method drop down.
- Under Addresses, click Add and enter the following details:
- Address: 10.211.55.2
- Netmask: 255.255.255.0
- Gateway: 10.211.55.20 (the first IP in the DHCP range)
- Under DNS servers, enter 10.211.55.20 again.
- Click Apply then close the Network dialogue.
- Click Next the select your timezone.
- Specify your root password. Click Next.
- Choose Use all space, then Next.
- Choose Write changes to disk, then wait for the file system to be configured.
- The installation will now start. When finished, choose Reboot.
Check and prepare CentOS installation
- Login as root with the password you chose during the installation.
- Check the network settings are correct by entering:
ifconfig
You should see a listing for eth0 with a confirmation of the IP address you specified during the installation (10.211.55.2).
-
You should also get a response when you try to ping an outside address:
ping www.google.com
- Upgrade all the installed packages:
yum -y update
- Install the CentOS setuptool and packages for managing firewall, network, authentication and system service settings:
yum -y install setuptool system-config-securitylevel-tui authconfig system-config-network-tui ntsysv
- Run setuptool:
setup
- Now choose Firewall configuration and then Run tool.
- The firewall should be enabled.
- Choose Customize then tick the boxes for SSH and WWW to allow access from the host machine.
- Click Forward, Close, OK, then Yes.
- I experienced some problems configuring the Apache document root, as well as mounting shared folders in the virtual machine, and found that disabling selinux (Security Enforced linux) solved all of that. To disable it, open /etc/selinux/config for editing and change the Set SELINUX line to:
Set SELINUX=disabled
You'll now need to reboot the VM:
reboot
- It's bad practice to be logged in as root all of time, so let's create a normal user account (replace my name with your own):
adduser rob
Set a password for the new account:
passwd rob
Just remain logged in as root for the duration of this tutorial.
- In the future when you're logged in as the new user, you can perform administrative tasks that require root access by prefixing commands with sudo. We need to tell the system that the new user is allowed to use sudo:
Edit the sudo configuration file:
vi /etc/sudoers
Add the following line to the bottom of the file (again substitute my name for the one you specified when you added the:
rob ALL=(ALL) ALL
Install Parallels Tools
The installation of Parallels Tools is required for certain important features to work, notably sharing folders between the guest and host.
- With the virtual machine selected, choose Virtual Machine from the Parallels menu, and click Install Parallels Tools…
- This is supposed to mount the the Parallels Tools ISO, but as that didn't work for me, I had to manually mount it:
mount -o exec /dev/cdrom /media
- Once mounted you can run the Parallels Tools installer:
/media/install
- Follow the onscreen prompts to complete the installation, ensuring that you answer yes to the prompt to download missing components.
- Reboot the VM when finished:
reboot
Install and configure Apache
- Install Apache:
yum -y install httpd
- Configure Apache to start up at boot time:
chkconfig --level 23 httpd on
- Start Apache:
service httpd start
- If you now enter the IP address of your guest (10.211.55.2, as we configured earlier) in a browser on the host computer, you should see the default Apache page.
- Let's make the Apache server respond to a friendly name instead of an IP address. We'll use the domain name you specified during the CentOS installation.
Set the domain name you specified as the server's host name (I used "firefly"):
hostname firefly
Now edit Apache's configuration file:
vi /etc/httpd/conf/httpd.conf
Do a search for the line containing ServerName, and change it to:
ServerName firefly:80
Now add the host name to the server's hosts file. Edit the hosts file:
vi /etc/hosts
Add the following line to the bottom:
10.211.55.2 firefly
Finally, to access the server by this friendly name from the host computer, we need to update the host computer's hosts file as well:
10.211.55.2 firefly
Set Apache's document root to a folder on the host computer
I prefer keeping my actual development files outside the virtual machine. If the VM ever gets corrupted, I know my important files will still be safe and sound. This could also aid you in making backups, as your backup program wouldn't have to backup the entire virtual machine every time a file is changed. Nowadays, Parallels has good Time Machine integration, so it'll only back up incrementally (not so for VMWare Fusion at the time of writing), but I just feel much safer not having my files wrapped up in a container.
- With the virtual machine selected, choose Virtual Machine from the Parallels menu, and click Configure.
- Under the Options tab, select Sharing.
- Click Custom Folders.
- Add the folder that contains all your web files, with "Read & Write" permissions.
- You might have to reboot the VM at this point to pick up the new shared folder(s).
- Parallels mounts shared folders in /media/psf, so you should now be able see your shared folders there.
- By default, Apache's document root (the directory from which it serves files), is set to /var/www/html. We'll replace that folder with a symbolic link to the folder we just shared. First we delete the html folder:
cd /var/www rm -rf html/
Next we create the symlink. Replace Sites with the name of your own shared folder:
ln -s /media/pst/Sites html
Install PHP
- Add the package:
yum -y install php
- Now restart Apache:
service httpd restart
Install and configure MySQL
- Add the packages:
yum -y install mysql mysql-server
- Start the MySQL daemon:
service mysqld start
- Configure the MySQL daemon to start up when the server boots:
chkconfig --levels 235 mysqld on
- Set the root password (substitute <PASSWORD> with your own):
mysqladmin -u root password
- Optionally follow my guide for creating databases and additional users.
Optionally install and configure phpMyAdmin
- phpMyAdmin is not available in one of the default repositories, so we need to enable the EPEL (Extra Packages for Enterprise Linux) repository. Go here and download the listed RPM package to your VM.
- From the directory where the RPM is saved, enter:
rpm -ivh
- Now install phpMyAdmin:
yum -y install phpmyadmin
- Edit the phpMyAdmin configuration file to allow access from the host computer:
vi /etc/httpd/conf.d/phpMyAdmin.conf
Locate all instances of Allow from 127.0.0.1 and change them to:
Allow from All
- Restart Apache:
service httpd restart
- You should now be able to access phpMyAdmin from the host computer at http://firefly/phpmyadmin (substituting "firefly" for whatever you've named yours).
Recursively list the most recently changed files on the command line
Here's a command line tip courtesy of snippets.dzone.com to recursively list the recently changed files starting in the current directory. Handy if your site ever gets hacked and you're not sure exactly where the perpetrator has managed to inject his code:
find . -type f -printf '%TY-%Tm-%Td %TT %p\n' | sort
Mac OS X: Automatically connect to a network drive when your computer starts up or wakes from sleep
If you, like me, have dipped your toes into the world of network-attached storage (NAS), you've probably been enjoying the benefits of having your music and photos stored in a central location accessible from all your household Macs. Equally likely, you've run into the annoyance of starting an application such as iTunes, iPhoto or Picasa that relies on the network drive being available, only to discover that it, well, isn't.
Whereas it's fairly trivial to instruct your Mac to connect to a network drive on start up, there is no support in OS X for reconnecting to that drive when the computer wakes from sleep. Fear not, I have a solution for you that will ensure your network drive is always available. We'll be using Automator, shell scripts and the excellent SleepWatcher utility to make it work, so the tutorial assumes you have at least a passing familiarity with the command line.
At the time of writing, I'm running OS X Mountain Lion 10.8.2, but I've had this working on 10.6 and 10.7 as well. If you notice any differences or have any tips, please share them in the comments below.
Step 1: Create an Automator app that connects to your network drive
- Launch Automator.
- Choose Application from the new document dialogue.
- In the search field enter pause.
- Drag the pause action from the results to the right pane.
- Enter 10 seconds to slightly delay the connection attempt to ensure your network connection (wi-fi or otherwise) is ready.
- Do a search for server in the search field.
- Now drag Get Specified Servers and Connect to Servers (in that order) to the right pane.
- In the Get Specified Servers dialogue click Add... and select or enter the address to your network drive. Click OK.
- Disconnect from your network drive (eject it), and click Run in Automator to test it. Your network drive should connect after a 10 second delay.
- Now save your application. I created a folder called Scripts in my home directory and saved it in there as ConnectToNetworkDrive.
Step 2: Add the Automator script to your startup items to reconnect to the network drive when you restart
- In System Preferences select Users & Groups then your user account.
- Select the Login Items tab then drag your newly created Automator app onto the pane.
Step 3: Create a shell script that launches the Automator app
- Create a file on the command line or open your text editor and paste the following in there:
#!/bin/sh echo 'open ~/Scripts/ConnectToNetworkDrive.app/' | /bin/sh\&
- If you've chosen a different name for your Automator app, you'll have to update the script to reflect that.
- Save this to your Scripts folder as ConnectOnWake.sh or something equally descriptive.
- We'll have to make that script executable so launch Terminal.app and navigate to your Scripts folder. Assuming you've created it in your home directory and named the script as I have, you would do this:
chmod u+x ~/Scripts/ConnectOnWake.sh
Step 4: Install SleepWatcher
- Download SleepWatcher from http://www.bernhard-baehr.de/.
- Follow the SleepWatcher installation instructions in the enclosed readme.rtf. If you've never installed SleepWatcher before, make sure you follow the instructions under the heading Installation for new SleepWatcher users.
Step 5: Use SleepWatcher to call our shell script when the computer wakes from sleep
- We'll need to create a SleepWatcher configuration file (.plist) that specifies our shell script. We'll use one of SleepWatcher's example files as a starting point. They're located in the config directory in the SleepWatcher download, so go there.
- Make a copy of de.bernhard-baehr.sleepwatcher-20compatibility.plist. I simply called mine WakeNetworkDrive.plist.
- Edit the new file (either on the command line or with Xcode if you have it installed), so that it matches the following:
<?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE plist PUBLIC "-//Apple Computer//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> <plist version="1.0"> <dict> <key>Label</key> <string>wakestora</string> <key>ProgramArguments</key> <array> <string>/usr/local/sbin/sleepwatcher</string> <string>-V</string> <string>-w ~/Scripts/ConnectOnWake.sh</string> </array> <key>RunAtLoad</key> <true/> <key>KeepAlive</key> <true/> </dict> </plist>
- Now copy the plist file to either /Library/LaunchDaemons (to activate it for all users) or ~/Library/LaunchAgents (to activate only for the current user). I chose the latter option.
- Start the SleepWatcher daemon so that it runs automatically the next time you turn on your computer:
sudo launchctl load ~/Library/LaunchAgents/WakeNetworkDrive.plist
- If you get an error message from the above command, change the ownership of your plist file and then try again:
sudo chown root:wheel ~/Library/LaunchAgents/WakeNetworkDrive.plist
- Now test! Restart your computer. Your network drive should automatically connect after 10 seconds. Eject the network drive then put your computer to sleep (close the lid, for example), wait a few seconds then wake the computer. Your network drive should connect within 10 seconds (you might see an animated gear icon in the menu bar while this is happening).
If you have any tips or suggestions, please share them in the comments.
Prevent flickering of CSS transitions and transforms in Webkit
I've run into the problem of flickering CSS transitions and transforms in Webkit browsers (Chrome and Safari) a few times, especially while developing Darkadia, which makes liberal use of these properties. Turns out the solution is quite simple and you can check it out here on Stack Overflow. I'll reproduce the fix here for posterity.
Add the following property to the element your transition is applied to:
#element { -webkit-backface-visibility: hidden; }
That sorted out most of the flickering on Darkadia, but I was still experiencing flickering on a completely unrelated element. Adding the following property to the body tag sorted that out too:
body { -webkit-transform: translate3d(0, 0, 0); }
Omnibar for Safari
I've recently been experimenting with using Safari as my primary browser after mounting disappointment with Chrome's performance on my Mac (random tab crashes and odd rendering issues had me scratching my head). Safari really is very quick and provides a more seamless and polished "Apple" experience, if that's your thing.
What I absolutely love about Chrome though is its Omnibar, the unified search and URL bar that figures out whether you've entered a URL or search term and performs the appropriate action. So I was delighted to find Oliver Poitrey's Safari Omnibar, a free SIMBL plugin that adds all the Omnibar goodness to Safari. It's early days yet as I've only just started using it, but it's standing up well in my testing and I haven't encountered any problems yet.
Now the only thing I'm missing is how the Delicious plugin in Chrome integrates its search results into the Omnibar, but this will do nicely for now.
Use jQuery to get the HTML of a container, including the container itself
Problem: You have the following markup, and you'd like to use jQuery to retrieve the contents of #container, but also include #container's markup in the returned HTML:
<div id="container"> <div class="foo">bar</div> </div>
There are a number of ways to tackle the problem, but the most elegant solution I've come across is one posted as an answer to a question on Stack Overflow. This following snippet selects the container and wraps it in a <div> tag. It then immediately selects the wrapping tag with parent(), before assigning its contents to x.
var x = $('#container').wrap('
').parent().html();
If you like, you can remove the wrapping <div> tag:
$('#container').unwrap();