Skip to content

andgineer/docker-amazon-dash-button-hack

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Build Status Coverage Docker Automated build

This is a Docker Hub container for the Amazon Dash Button hack.

It sniffs the network to intercept Amazon Button communications with Amazon, thereby detecting button presses.

It can write to Google Sheets, Google Calendar and fire event in IFTTT.

I use it on my Synology for IoT calendar.

To run the container on Linux:

docker run \
    --net host \
    -it \
    --rm \
    -v $PWD/../amazon-dash-private:/amazon-dash-private:ro \
    andgineer/amazon-dash-button-hack

In folder ../amazone-dash-private you should have:

Examples of this files.

See details in User manual.

MacOS and Windows

You cannot sniff network from Docker containers running on MacOS and Windows because they do not run docker demon natively but use Virtual Machine to run it.

So to debug on MacOS and Windows:

. ./activate.sh
sudo python src/amazon_dash.py

Developers

We use collections.abc so min Python3.10

API docs

Scripts

To see list of scripts:

make help

Coverage report