2019-01-16 19:32:16 +00:00
#!/bin/bash
2019-01-21 16:39:30 +00:00
bold = $( tput bold)
normal = $( tput sgr0)
2019-01-27 21:09:43 +00:00
screen_minor = ` screen --version | cut -d . -f 2`
if [ $screen_minor -gt 5 ] ; then
2019-01-27 14:28:16 +00:00
screen_with_log = "sudo screen -L -Logfile"
2019-01-27 21:09:43 +00:00
elif [ $screen_minor -eq 5 ] ; then
2019-01-27 14:28:16 +00:00
screen_with_log = "sudo screen -L"
2019-01-27 21:09:43 +00:00
else
screen_with_log = "sudo screen -L -t"
2019-01-27 14:28:16 +00:00
fi
2019-01-16 19:32:16 +00:00
. ./config.txt
./stop_flash.sh >/dev/null
pushd scripts
echo "======================================================"
2019-01-21 16:39:30 +00:00
echo " ${ bold } TUYA-CONVERT ${ normal } "
echo
2019-01-28 13:11:55 +00:00
echo "https://github.com/ct-Open-Source/tuya-convert"
2019-01-21 16:39:30 +00:00
echo "TUYA-CONVERT was developed by Michael Steigerwald from the IT security company VTRUST (https://www.vtrust.de/) in collaboration with the techjournalists Merlin Schumacher, Pina Merkert, Andrijan Moecker and Jan Mahn at c't Magazine. (https://www.ct.de/)"
echo
echo
2019-01-18 16:26:16 +00:00
echo "======================================================"
2019-01-21 16:39:30 +00:00
echo " ${ bold } PLEASE READ THIS CAREFULLY! ${ normal } "
2019-01-18 16:26:16 +00:00
echo "======================================================"
2019-01-21 16:39:30 +00:00
echo "TUYA-CONVERT creates a fake update server environment for ESP8266/85 based tuya devices. It enables you to backup your devices firmware and upload an alternative one (e.g. ESPEasy, Tasmota, Espurna) without the need to open the device and solder a serial connection (OTA, Over-the-air)."
2019-01-18 16:26:16 +00:00
echo "Please make sure that you understand the consequences of flashing an alternative firmware, since you might lose functionality!"
echo
2019-01-21 17:49:55 +00:00
echo " Flashing an alternative firmware can cause unexpected device behavior and/or render the device unusable. Be aware that you do use this software at YOUR OWN RISK! Please acknowledge that VTRUST and c't Magazine (or Heise Medien GmbH & Co. KG) CAN NOT be held accountable for ANY DAMAGE or LOSS OF FUNCTIONALITY by typing ${ bold } yes + Enter ${ normal } "
2019-01-18 16:26:16 +00:00
echo
2019-01-21 13:00:17 +00:00
read
2019-01-18 16:26:16 +00:00
if [ " $REPLY " != "yes" ] ; then
exit
fi
2019-01-16 19:32:16 +00:00
echo "======================================================"
echo " Starting AP in a screen"
2019-01-27 14:28:16 +00:00
$screen_with_log smarthack-wifi.log -S smarthack-wifi -m -d ./setup_ap.sh
2019-01-27 20:41:25 +00:00
echo " Stopping any apache web server"
2019-01-16 19:32:16 +00:00
sudo service apache2 stop >/dev/null 2>& 1
2019-01-27 20:41:25 +00:00
echo " Starting web server in a screen"
2019-01-27 14:28:16 +00:00
$screen_with_log smarthack-web.log -S smarthack-web -m -d ./fake-registration-server.py
2019-01-16 19:32:16 +00:00
echo " Starting Mosquitto in a screen"
2019-01-21 16:39:30 +00:00
sudo service mosquitto stop >/dev/null 2>& 1
2019-01-27 14:28:16 +00:00
$screen_with_log smarthack-mqtt.log -S smarthack-mqtt -m -d mosquitto -v
2019-01-16 19:32:16 +00:00
echo
echo "======================================================"
echo
echo "IMPORTANT"
2019-01-27 20:41:25 +00:00
echo " 1. Connect any other device (a smartphone or something) to the WIFI $AP "
2019-01-21 16:39:30 +00:00
echo " The wpa-password is ${ bold } $PASS ${ normal } "
2019-01-16 19:32:16 +00:00
echo " This step is IMPORTANT otherwise the smartconfig will not work!"
2019-01-26 23:25:16 +00:00
echo "2. Put your IoT device in autoconfig/smartconfig/pairing mode (LED will blink fast). This is usually done by pressing and holding the primary button of the device"
2019-01-21 16:39:30 +00:00
echo " 3. Press ${ bold } ENTER ${ normal } to continue "
2019-01-16 19:32:16 +00:00
read x
2019-01-21 16:39:30 +00:00
echo ""
2019-01-16 19:32:16 +00:00
echo "======================================================"
echo "Starting pairing procedure in screen"
sudo ip route add 255.255.255.255 dev $WLAN
2019-01-28 17:04:45 +00:00
$screen_with_log smarthack-smartconfig.log -S smarthack-smartconfig -m -d ./smartconfig/main.py
2019-03-22 21:09:26 +00:00
popd
2019-01-16 19:32:16 +00:00
echo "Waiting for the upgraded device to appear"
2019-01-26 16:24:28 +00:00
echo "If this does not work have a look at the '*.log'-files in the 'scripts' subfolder!"
2019-01-16 19:32:16 +00:00
while ! timeout 0.2 ping -c 1 -n 10.42.42.42 & > /dev/null
do
printf "."
sleep 1
done
echo
echo "IoT-device is online with ip 10.42.42.42"
echo "Fetching firmware backup"
sleep 2
2019-03-22 21:09:26 +00:00
curl -JO http://10.42.42.42/backup
2019-01-16 19:32:16 +00:00
echo "======================================================"
echo "Getting Info from IoT-device"
curl http://10.42.42.42 2> /dev/null | tee device-info.txt
echo
echo "======================================================"
2019-01-18 16:26:16 +00:00
echo "Please make sure to note the correct SPI flash mode!"
2019-01-21 13:00:17 +00:00
echo "Installing an alternative firmware with the wrong flash mode will leave the ESP unable to boot!"
2019-01-16 19:32:16 +00:00
echo
echo "Next steps:"
echo "1. To go back to the orginal software"
echo " # curl http://10.42.42.42/undo"
echo
echo "2. Be sure the conversion software runs in user2"
echo " # curl http://10.42.42.42/flash2"
echo
echo "3. Flash a third party firmware to the device"
2019-01-21 13:00:17 +00:00
echo "BE SURE THE FIRMWARE FITS THE DEVICE AND USES THE CORRECT FLASH MODE!"
2019-01-16 19:32:16 +00:00
echo "MAXIMUM SIZE IS 512KB"
echo "put or link it to ./files/thirdparty.bin"
2019-03-20 23:37:03 +00:00
echo "A basic build of Sonoff-Tasmota v6.5.0 is already included in this repository."
2019-01-16 19:32:16 +00:00
echo " # curl http://10.42.42.42/flash3"
2019-01-22 13:26:52 +00:00
echo "Alternatively let the device download and flash a file via HTTP:"
echo " # curl http://10.42.42.42/flashURL?url=http://10.42.42.1/files/thirdparty.bin"
2019-01-16 19:32:16 +00:00
echo
echo "HAVE FUN!"