diff options
Diffstat (limited to 'upstream/archlinux/man5/sane-airscan.5')
-rw-r--r-- | upstream/archlinux/man5/sane-airscan.5 | 154 |
1 files changed, 154 insertions, 0 deletions
diff --git a/upstream/archlinux/man5/sane-airscan.5 b/upstream/archlinux/man5/sane-airscan.5 new file mode 100644 index 00000000..d60ae0a9 --- /dev/null +++ b/upstream/archlinux/man5/sane-airscan.5 @@ -0,0 +1,154 @@ +.\" generated with Ronn-NG/v0.9.1 +.\" http://github.com/apjanke/ronn-ng/tree/0.9.1 +.TH "SANE\-AIRSCAN" "5" "May 2022" "" "AirScan (eSCL) and WSD SANE backend" +.SH "NAME" +\fBsane\-airscan\fR \- SANE backend for AirScan (eSCL) and WSD scanners and MFP +.SH "DESCRIPTION" +The \fBsane\-airscan\fR is the universal backend for "driverless" document scanning\. Currently it supports two protocols: +.IP "" 4 +.nf +1\. eSCL, also known as AirScan or AirPrint scan +2\. WSD, also known as WS\-Scan +.fi +.IP "" 0 +.SH "CONFIGURATION" +The sane\-airscan loads its configuration files from the following places: +.IP "" 4 +.nf +1\. /etc/sane\.d/airscan\.conf +2\. /etc/sane\.d/airscan\.d/* +.fi +.IP "" 0 +.P +The configuration file syntax is very similar to the \.INI file syntax\. It consist of sections, each section contains some variables\. Comments are started from # or ; characters and continies until end of line +.IP "" 4 +.nf +# This is a comment +[section 1] +variable 1 = value 1 ; and another comment +variable 2 = value 2 +.fi +.IP "" 0 +.P +Leading and trailing spaces of variable name and value are striped\. If you want to preserve them, put name or value into quotes ("like this")\. +.SH "CONFIGURATION OF DEVICES" +If scanner and computer are connected to the same LAN segment, everything expected to "just work" out of box, without any need of manual configuration\. +.P +However, in some cases manual configuration can be useful\. For example: +.IP "" 4 +.nf +1\. If computer and scanner are connected via IP router +2\. There are a lot of devices on a corporate network, but + only few of them are interesting +3\. Automatic discovery works unreliable +.fi +.IP "" 0 +.P +To manually configure a device, add the following section to the configuration file: +.IP "" 4 +.nf +[devices] +"Kyocera eSCL" = http://192\.168\.1\.102:9095/eSCL, eSCL +"Kyocera WSD" = http://192\.168\.1\.102:5358/WSDScanner, WSD +"Device I do not want to see" = disable +.fi +.IP "" 0 +.P +The \fB[devices]\fR section contains all manually configured devices, one line per device, and each line contains a device name on a left side of equation and device URL on a rights side, followed by protocol (eSCL or WSD)\. If protocol is omitted, eSCL is assumed\. You may also disable particular device by using the \fBdisable\fR keyword instead of URL\. +.P +In addition, you can manually configure a device by directly passing its URL in a device name without adding it to the configuration file\. This takes the format \fBprotocol:Device Name:URL\fR\. The examples above could be written as \fBescl:Kyocera eSCL:http://192\.168\.1\.102:9095/eSCL\fR and \fBwsd:Kyocera WSD:http://192\.168\.1\.102:5358/WSDScanner\fR\. +.P +To figure out URLs of available devices, the simplest way is to run the supplied \fBairscan\-discover(1)\fR tool on a computer connected with scanner to the same LAN segment\. On success, this program will dump to its standard output a list of discovered devices in a format suitable for inclusion into the configuration file\. +.P +If running \fBairscan\-discover(1)\fR on the same LAN segment as a scanner is not possible, you will have to follow a hard way\. Your administrator must know device IP address, consult your device manual for the eSCL port, and the URL path component most likely is the "/eSCL", though on some devices it may differ\. Discovering WSD URLs doing this way is much harder, because it is very difficult to guess TCP port and URL path, that in a case of eSCL\. +.P +For eSCL devices, the URL can also use the unix:// scheme, such as unix://scanner\.sock/eSCL\. The "host" from the URL is a file name that will be searched for in the directory specified by socket_dir (see below)\. When connecting to the scanner, all traffic will be sent to the specified UNIX socket instead of a TCP connection\. +.SH "CONFIGURATION OPTIONS" +Miscellaneous options all goes to the \fB[options]\fR section\. Currently the following options are supported: +.IP "" 4 +.nf +[options] +; If there are a lot of scanners around and you are only +; interested in few of them, disable auto discovery and +; configure scanners manually\. +discovery = enable | disable + +; Choose what SANE apps will show in a list of devices: +; scanner network name (the default) or hardware model name\. +model = network | hardware + +; If device supports both eSCL and WSD protocol, sane\-airscan +; may either choose the "best" protocol automatically, or +; expose all variants for user, allowing manual protocol selection\. +; The default is "auto"\. +protocol = auto | manual + +; Discovery of WSD devices may be "fast" or "full"\. The "fast" +; mode works as fast as DNS\-SD discovery, but in some cases +; may be unreliable\. The "full" mode is slow and reliable\. +; It is also possible to disable automatic discovery +; of WSD devices\. The default is "fast"\. +ws\-discovery = fast | full | off + +; Scanners that use the unix:// schema in their URL can only specify a +; socket name (not a full path)\. The name will be searched for in the +; directory specified here\. The default is /var/run\. +socket_dir = /path/to/directory +.fi +.IP "" 0 +.SH "BLACKLISTING DEVICES" +This feature can be useful, if you are on a very big network and have a lot of devices around you, while interesting only in a few of them\. +.IP "" 4 +.nf +[blacklist] +model = "Xerox*" ; blacklist by model name +name = "HP*" ; blacklist by network name +ip = 192\.168\.0\.1 ; blacklist by address +ip = 192\.168\.0\.0/24 ; blacklist the whole subnet +.fi +.IP "" 0 +.P +Network names come from DNS\-SD, WS\-Discovery doesn\'t provide this information\. For filtering by network name to work, Avahi must be enabled and device must be discoverable via DNS\-SD (not necessarily as a scanner, it\'s enough if WSD scanner is discoverable as a printer via DNS\-SD)\. +.P +Blacklisting only affects automatic discovery, and doesn\'t affect manually configured devices\. +.SH "DEBUGGING" +sane\-airscan provides very good instrumentation for troubleshooting without physical access to the problemmatic device\. +.P +Debugging facilities can be controlled using the \fB[debug]\fR section of the configuration file: +.IP "" 4 +.nf +[debug] +; Enable or disable console logging +enable = false | true + +; Enable protocol trace and configure output directory +; for trace files\. Like in shell, to specify path relative to +; the home directory, start it with tilda character, followed +; by slash, i\.e\., "~/airscan/trace"\. The directory will +; be created automatically\. +trace = path + +; Hex dump all traffic to the trace file (very verbose!) +hexdump = false | true +.fi +.IP "" 0 +.SH "FILES" +.TP +\fB/etc/sane\.d/airscan\.conf\fR, \fB/etc/sane\.d/airscan\.d/*\fR +The backend configuration files +.TP +\fB/usr/LIBDIR/sane/libsane\-airscan\.so\fR +The shared library implementing this backend +.SH "ENVIRONMENT" +.TP +\fBSANE_DEBUG_AIRSCAN\fR +This variable if set to \fBtrue\fR or non\-zero numerical value, enables debug messages, that are printed to stdout +.TP +\fBSANE_CONFIG_DIR\fR +This variable alters the search path for configuration files\. This is a colon\-separated list of directories\. These directories are searched for the airscan\.conf configuration file and for the airscan\.d subdirectory, before the standard path (/etc/sane\.d) is searched\. +.SH "BUGS AND SUPPORT" +If you have found a bug, please file a GitHub issue on a GitHub project page: \fBhttps://github\.com/alexpevzner/sane\-airscan\fR +.SH "SEE ALSO" +\fBsane(7), scanimage(1), xsane(1), airscan\-discover(1)\fR +.SH "AUTHOR" +Alexander Pevzner <pzz@apevzner\.com> |