Skip to content

andgineer/docker-amazon-dash-button-hack

Folders and files

NameName
Last commit message
Last commit date

Latest commit

a639468 · Mar 22, 2025
Mar 13, 2025
Oct 1, 2023
Oct 1, 2023
Mar 13, 2025
Mar 13, 2025
Sep 6, 2023
Mar 13, 2025
Sep 10, 2023
Oct 10, 2023
Jun 17, 2024
Sep 6, 2023
Mar 22, 2025
May 1, 2024
Mar 5, 2019
Mar 14, 2025
Dec 28, 2023
Dec 28, 2023
May 2, 2024
Sep 6, 2023
Sep 18, 2023
Mar 13, 2025
Oct 10, 2018
May 1, 2024
Mar 13, 2025
Sep 27, 2023
Mar 13, 2025

Repository files navigation

Build Status Coverage Docker Automated build

This is a Docker Hub container for the Amazon Dash Button hack.

It sniffs the network to intercept Amazon Button communications with Amazon, thereby detecting button presses.

It can write to Google Sheets, Google Calendar and fire event in IFTTT.

I use it on my Synology for IoT calendar.

To run the container on Linux:

docker run \
    --net host \
    -it \
    --rm \
    -v $PWD/../amazon-dash-private:/amazon-dash-private:ro \
    andgineer/amazon-dash-button-hack

In folder ../amazone-dash-private you should have:

Examples of this files.

See details in User manual.

MacOS and Windows

You cannot sniff network from Docker containers running on MacOS and Windows because they do not run docker demon natively but use Virtual Machine to run it.

So to debug on MacOS and Windows:

. ./activate.sh
sudo python src/amazon_dash.py

Developers

We use collections.abc so min Python3.10

API docs

Scripts

To see list of scripts:

make help

Coverage report