Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Cleaning a custom area by name, not by coordinates? #263

Open
redlefloh opened this issue May 25, 2024 · 4 comments
Open

Cleaning a custom area by name, not by coordinates? #263

redlefloh opened this issue May 25, 2024 · 4 comments

Comments

@redlefloh
Copy link

Hi all, I really enjoy the integration, thanks so much! I have a question, can I clean a custom area and reuse the custom areas defined in the Ecovacs App, e.g. "Pet Area Cleaning" instead of defining coordinates as described in custom_area command.

It would be really great if one could just specify the names given in the App since it is easy to define the custom areas there. Is there a way? I imagine something like:

service: vacuum.send_command
target:
  entity_id: vacuum.YOUR_ROBOT_NAME
data:
  command: custom_area
  params:
    name: 'Pet Cleaning Area'

Also, is there also a way to add cleaning preferences to this command?

Thanks!

@edenhaus
Copy link
Contributor

As my bot doesn't support this feature, please feel free to analyze the traffic between the app and the Ecovacs servers to see which commands need to be send

@redlefloh
Copy link
Author

How can one analyze the traffic between the App and the Server?

@redlefloh
Copy link
Author

redlefloh commented Jun 1, 2024

okay I looked arround a bit and started with redirecting the traffic from the App to the Ecovacs servers via a local RasPi by modyfing dnsmasq.conf on my UDM:

address=/ecouser.net/192.168.12.101
address=/ecovacs.com/192.168.12.101
address=/ecovacs.net/192.168.12.101

which worked fine. Then I looked at a few potential sniffing candidates that I found, e.g. xmpppeek described in bumper, or xmpp-mitm, or also xmppmitm. Unfortunately all these tools seem to be outdated (most based on python2) and seem not to be touched for many years. I tried now for almost a day and also looked further around but couldn't find anything that seems to be actively in use to sniff the Ecovacs App to Ecovacs server traffic? Is there a more current approach out there that I am missing? Wireshark also doesn't seem to capture the traffic, I assume because it is TLS encrypted. Any hint on how to best analyse the traffic would be highly appreciated. Also, if someone could confirm that any of the methods above should actually work and it is just me messing it up, that would also be super helpful as well! Thanks!

@edenhaus
Copy link
Contributor

edenhaus commented Jun 4, 2024

I use man in the middle proxy (https://mitmproxy.org/)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants