I don’t understand why, is a brilliant product and no more expensive than a normal shower mixer, set of taps, overflow and waste. It was a no brainer for me.
There will be a way to snuff the Bluetooth packets and make a component but I have no idea where to start
Hi, I also have a Mira Mode shower, their BLE protocol is straightforward except a CRC control code that took me a bit more to figure out. I use the Mira Mode shower via Home Assistant since more than 1 year and it works great. Here’s the Python module:
The remaining integration in Home Assistant is done via ssh shell_commands (I use a separate Raspberry PI in BLE range closer to the shower) and template switches.
From there it’s exposed to Alexa / Google Home.
Hi @alexpilotti,
I’m trying to follow your documentation on your Python module in Github but don’t think I’m understanding it correctly.
I run the command pip install -r requirements.txt on my Pi which install the packages as listed in the text file. Now do I put your __init__.py in /configs/python_scripts on the Pi in HA? Where does your example go too?
Sorry for what probably seem like dumb questions.
`
Hope this helps. Note: the hard part ATM is that, as stated in the README, you need to sniff at least one write packet to figure out the client id, this can be most probably solved by implementing the pairing logic.
Thanks, I see that there, looks like it returns the status for each outlet.
I’m not new to ha and learning python, but this is more complex than anything I’ve integrated so far. How would I get this data into ha and into a sensor?
Hi @alexpilotti - I don’t suppose you’d be able to provide a bit more guidance on how to obtain the device and client IDs please? I have a Bluefruit LE Sniffer connected to a Pi, and I have Wireshark up and running and able to capture BLE packets. What I can’t find amongst the very busy captures I’m getting are any binary payload packets as you have mentioned when I activate the shower. Where abouts in the packet do you see the 0x11 value? I’m seeing a lot of broadcast traffic, but none directed at my shower itself. I’m also seeing my shower broadcast too. Do you perhaps have a screenshot of the captured packet you used, as seen in Wireshark so as I could get a better idea please? I do have a Mira Activate shower, so that could make a difference, but it would be great to compare against a known good packet! This is my first time sniffing BT in Wireshark so it’s quite new territory to me, although I have used Wireshark to sniff LAN traffic for years.
Also, if you could share your brute force loop code that would be appreciated too. I’m struggling to get my head around that logic just using some sample values!
hello, I was wondering how this got on, I have recently been able to get my hands on some of the API end points for the IOS app wondering if that’s of help to anyone