This is a Docker Hub container for the Amazon Dash Button hack.
It sniffs the network to intercept Amazon Button communications with Amazon, thereby detecting button presses.
It can write to Google Sheets, Google Calendar and fire events in IFTTT.
I use it on my Synology for IoT calendar.
To run the container on Linux:
docker run \
--net host \
-it \
--rm \
-v $PWD/../amazon-dash-private:/amazon-dash-private:ro \
andgineer/amazon-dash-button-hack
In folder ../amazon-dash-private you should have:
- settings
settings.json - buttons list
buttons.json amazon-dash-hack.jsonwith Google API credentials Google Sheets, Google Calendarifttt-key.jsonwith Maker Webhook key
See details in User manual.
You cannot sniff network from Docker containers running on MacOS and Windows because they do not run Docker daemon natively but use a virtual machine to run it.
So to debug on MacOS and Windows:
. ./activate.sh
sudo python src/amazon_dash.py
We use collections.abc so minimum Python 3.10
To see the list of scripts:
make help