This is a Docker Hub container for the Amazon Dash Button hack.
It sniffs the network to intercept Amazon Button communications with Amazon, thereby detecting button presses.
It can write to Google Sheets, Google Calendar and fire event in IFTTT.
I use it on my Synology for IoT calendar.
To run the container on Linux:
docker run \
--net host \
-it \
--rm \
-v $PWD/../amazon-dash-private:/amazon-dash-private:ro \
andgineer/amazon-dash-button-hack
In folder ../amazone-dash-private
you should have:
- settings
settings.json
- buttons list
buttons.json
amazon-dash-hack.json
with google API credentials Google Sheets, Google Calendarifttt-key.json
with Maker Webhook key
See details in User manual.
You cannot sniff network from Docker containers running on MacOS and Windows because they do not run docker demon natively but use Virtual Machine to run it.
So to debug on MacOS and Windows:
. ./activate.sh
sudo python src/amazon_dash.py
We use collections.abc
so min Python3.10
To see list of scripts:
make help