tuya-convert/start_flash.sh

107 lines
4.5 KiB
Bash
Raw Normal View History

2019-01-16 19:32:16 +00:00
#!/bin/bash
2019-01-21 16:39:30 +00:00
bold=$(tput bold)
normal=$(tput sgr0)
screen_minor=`screen --version | cut -d . -f 2`
if [ $screen_minor -gt 5 ]; then
2019-01-27 14:28:16 +00:00
screen_with_log="sudo screen -L -Logfile"
elif [ $screen_minor -eq 5 ]; then
2019-01-27 14:28:16 +00:00
screen_with_log="sudo screen -L"
else
screen_with_log="sudo screen -L -t"
2019-01-27 14:28:16 +00:00
fi
2019-01-16 19:32:16 +00:00
. ./config.txt
./stop_flash.sh >/dev/null
pushd scripts
echo "======================================================"
2019-01-21 16:39:30 +00:00
echo "${bold}TUYA-CONVERT${normal}"
echo
2019-01-28 13:11:55 +00:00
echo "https://github.com/ct-Open-Source/tuya-convert"
2019-01-21 16:39:30 +00:00
echo "TUYA-CONVERT was developed by Michael Steigerwald from the IT security company VTRUST (https://www.vtrust.de/) in collaboration with the techjournalists Merlin Schumacher, Pina Merkert, Andrijan Moecker and Jan Mahn at c't Magazine. (https://www.ct.de/)"
echo
echo
2019-01-18 16:26:16 +00:00
echo "======================================================"
2019-01-21 16:39:30 +00:00
echo "${bold}PLEASE READ THIS CAREFULLY!${normal}"
2019-01-18 16:26:16 +00:00
echo "======================================================"
2019-01-21 16:39:30 +00:00
echo "TUYA-CONVERT creates a fake update server environment for ESP8266/85 based tuya devices. It enables you to backup your devices firmware and upload an alternative one (e.g. ESPEasy, Tasmota, Espurna) without the need to open the device and solder a serial connection (OTA, Over-the-air)."
2019-01-18 16:26:16 +00:00
echo "Please make sure that you understand the consequences of flashing an alternative firmware, since you might lose functionality!"
echo
2019-01-21 17:49:55 +00:00
echo "Flashing an alternative firmware can cause unexpected device behavior and/or render the device unusable. Be aware that you do use this software at YOUR OWN RISK! Please acknowledge that VTRUST and c't Magazine (or Heise Medien GmbH & Co. KG) CAN NOT be held accountable for ANY DAMAGE or LOSS OF FUNCTIONALITY by typing ${bold}yes + Enter${normal}"
2019-01-18 16:26:16 +00:00
echo
2019-01-21 13:00:17 +00:00
read
2019-01-18 16:26:16 +00:00
if [ "$REPLY" != "yes" ]; then
exit
fi
2019-01-16 19:32:16 +00:00
echo "======================================================"
echo " Starting AP in a screen"
2019-01-27 14:28:16 +00:00
$screen_with_log smarthack-wifi.log -S smarthack-wifi -m -d ./setup_ap.sh
2019-01-27 20:41:25 +00:00
echo " Stopping any apache web server"
2019-01-16 19:32:16 +00:00
sudo service apache2 stop >/dev/null 2>&1
2019-01-27 20:41:25 +00:00
echo " Starting web server in a screen"
2019-01-27 14:28:16 +00:00
$screen_with_log smarthack-web.log -S smarthack-web -m -d ./fake-registration-server.py
2019-01-16 19:32:16 +00:00
echo " Starting Mosquitto in a screen"
2019-01-21 16:39:30 +00:00
sudo service mosquitto stop >/dev/null 2>&1
2019-01-27 14:28:16 +00:00
$screen_with_log smarthack-mqtt.log -S smarthack-mqtt -m -d mosquitto -v
2019-01-16 19:32:16 +00:00
echo
echo "======================================================"
echo
echo "IMPORTANT"
2019-01-27 20:41:25 +00:00
echo "1. Connect any other device (a smartphone or something) to the WIFI $AP"
2019-01-21 16:39:30 +00:00
echo " The wpa-password is ${bold}$PASS${normal}"
2019-01-16 19:32:16 +00:00
echo " This step is IMPORTANT otherwise the smartconfig will not work!"
echo "2. Put your IoT device in autoconfig/smartconfig/pairing mode (LED will blink fast). This is usually done by pressing and holding the primary button of the device"
2019-01-21 16:39:30 +00:00
echo "3. Press ${bold}ENTER${normal} to continue"
2019-01-16 19:32:16 +00:00
read x
2019-01-21 16:39:30 +00:00
echo ""
2019-01-16 19:32:16 +00:00
echo "======================================================"
echo "Starting pairing procedure in screen"
sudo ip route add 255.255.255.255 dev $WLAN
$screen_with_log smarthack-smartconfig.log -S smarthack-smartconfig -m -d ./smartconfig/main.py
popd
2019-01-16 19:32:16 +00:00
echo "Waiting for the upgraded device to appear"
echo "If this does not work have a look at the '*.log'-files in the 'scripts' subfolder!"
2019-01-16 19:32:16 +00:00
while ! timeout 0.2 ping -c 1 -n 10.42.42.42 &> /dev/null
do
printf "."
sleep 1
done
echo
echo "IoT-device is online with ip 10.42.42.42"
echo "Fetching firmware backup"
sleep 2
curl -JO http://10.42.42.42/backup
2019-01-16 19:32:16 +00:00
echo "======================================================"
echo "Getting Info from IoT-device"
curl http://10.42.42.42 2> /dev/null | tee device-info.txt
echo
echo "======================================================"
2019-01-18 16:26:16 +00:00
echo "Please make sure to note the correct SPI flash mode!"
2019-01-21 13:00:17 +00:00
echo "Installing an alternative firmware with the wrong flash mode will leave the ESP unable to boot!"
2019-01-16 19:32:16 +00:00
echo
echo "Next steps:"
echo "1. To go back to the orginal software"
echo " # curl http://10.42.42.42/undo"
echo
echo "2. Be sure the conversion software runs in user2"
echo " # curl http://10.42.42.42/flash2"
echo
echo "3. Flash a third party firmware to the device"
2019-01-21 13:00:17 +00:00
echo "BE SURE THE FIRMWARE FITS THE DEVICE AND USES THE CORRECT FLASH MODE!"
2019-01-16 19:32:16 +00:00
echo "MAXIMUM SIZE IS 512KB"
echo "put or link it to ./files/thirdparty.bin"
echo "A basic build of Sonoff-Tasmota v6.5.0 is already included in this repository."
2019-01-16 19:32:16 +00:00
echo " # curl http://10.42.42.42/flash3"
2019-01-22 13:26:52 +00:00
echo "Alternatively let the device download and flash a file via HTTP:"
echo " # curl http://10.42.42.42/flashURL?url=http://10.42.42.1/files/thirdparty.bin"
2019-01-16 19:32:16 +00:00
echo
echo "HAVE FUN!"