Research
Security News
Quasar RAT Disguised as an npm Package for Detecting Vulnerabilities in Ethereum Smart Contracts
Socket researchers uncover a malicious npm package posing as a tool for detecting vulnerabilities in Etherium smart contracts.
This library aims to provide python way to communicate with gardena smart gateway and all smart gardena systems.
Feel free to join the discord server :
The py-smart-gardena library aims to provide python way to communicate with gardena smart systems and all gardena smart equipment. Configuration of the equipement and inclusion has still to be done using the Gardena application or website.
This project needs your support.
Gardena equipments are expensive, and I need to buy them in order to add support.
If you find this library useful and want to help me support more devices (or if you
just want to reward me for my spent time), you are very welcome !
Your help is very much appreciated.
Here are the links if you want to show your support :
Thx for your support !
For now, only few devices are supported. I may add new ones in the future :
Gardena requires the creation of an account and an application in order to use their API. You can find how to create such an account and application here : Account and application creation
$ pip install py-smart-gardena
The entrypoint of the library is the the SmartSytem class (in gardena.smart_system package). From there, you can get all locations from your account, and for each of these locations, get the declared devices.
All communications are not done directly with the gateway. This library uses a websocket in order to communicate with gardena systems in order to avoid throttling. There is only one connection to authenticate, and two connections to revoke tokens, everything else is done through websockets.
You first need to get a client id (also called application key in the API documentation) for your personal installation of gardena. To do so, create an account here : https://developer.husqvarnagroup.cloud/
Then you need to create an application, add APIs (Authentication API and GARDENA smart system API), and copy the application key as explained here: https://developer.husqvarnagroup.cloud/docs/getting-started
The library manages the token for you then. An exception is raised if authentication fails.
from gardena.smart_system import SmartSystem
import pprint
smart_system = SmartSystem(client_id="client_id", client_secret="client_secret")
await smart_system.authenticate()
await smart_system.update_locations()
for location in smart_system.locations.values():
await smart_system.update_devices(location)
pprint.pprint(location)
for device in location.devices.values():
pprint.pprint(device)
await smart_system.start_ws(smart_system.locations['LOCATION_ID'])
Once authentication is successful, you need to gather locations and devices for the first time and then, you can create start the websocket in order to get updates automatically.
Locations are automatically retrieved the first time from the API, and then the websocket is used to get updates.
Here is the list of the current available fields and methods :
for location in smart_system.locations.values():
print("location : " + location.name + "(" + location.id + ")")
Devices are automatically retrieved the first time from the API, and then the websocket is used to get updates. They are stored in each locations. Depending on the function type, you can have diffrents fields.
for device in smart_system.locations["LOCATION_ID"].find_device_by_type("MOWER"):
print(f"name : {device.name}")
print(f"id : {device.id}")
print(f"type : {device.type}")
print(f"model_type : {device.model_type}")
print(f"battery_level : {device.battery_level}")
print(f"battery_state : {device.battery_state}")
print(f"rf_link_level : {device.rf_link_level}")
print(f"rf_link_state : {device.rf_link_state}")
print(f"serial : {device.serial}")
print(f"activity : {device.activity}")
print(f"operating_hours : {device.operating_hours}")
print(f"state : {device.state}")
print(f"last_error_code : {device.last_error_code}")
for device in smart_system.locations["LOCATION_ID"].find_device_by_type("POWER_SOCKET"):
print(f"name : {device.name}")
print(f"id : {device.id}")
print(f"type : {device.type}")
print(f"model_type : {device.model_type}")
print(f"battery_level : {device.battery_level}")
print(f"battery_state : {device.battery_state}")
print(f"rf_link_level : {device.rf_link_level}")
print(f"rf_link_state : {device.rf_link_state}")
print(f"serial : {device.serial}")
print(f"activity : {device.activity}")
print(f"state : {device.state}")
for device in smart_system.locations["LOCATION_ID"].find_device_by_type("SENSOR"):
print(f"name : {device.name}")
print(f"id : {device.id}")
print(f"type : {device.type}")
print(f"model_type : {device.model_type}")
print(f"battery_level : {device.battery_level}")
print(f"battery_state : {device.battery_state}")
print(f"rf_link_level : {device.rf_link_level}")
print(f"rf_link_state : {device.rf_link_state}")
print(f"serial : {device.serial}")
print(f"ambient_temperature : {device.ambient_temperature}")
print(f"light_intensity : {device.light_intensity}")
print(f"soil_humidity : {device.soil_humidity}")
print(f"soil_temperature : {device.soil_temperature}")
for device in smart_system.locations["LOCATION_ID"].find_device_by_type("SMART_IRRIGATION_CONTROL"):
print(f"name : {device.name}")
print(f"id : {device.id}")
print(f"type : {device.type}")
print(f"model_type : {device.model_type}")
print(f"battery_level : {device.battery_level}")
print(f"battery_state : {device.battery_state}")
print(f"rf_link_level : {device.rf_link_level}")
print(f"rf_link_state : {device.rf_link_state}")
print(f"serial : {device.serial}")
print(f"valve_set_id : {device.valve_set_id}")
print(f"valve_set_state : {device.valve_set_state}")
print(f"valve_set_last_error_code : {device.valve_set_last_error_code}")
for valve in device.valves.values():
print(f"name : {valve['name']}")
print(f"{valve['name']} - id : {valve['id']}")
print(f"{valve['name']} - activity : {valve['activity']}")
print(f"{valve['name']} - state : {valve['state']}")
print(f"{valve['name']} - last_error_code : {valve['last_error_code']}")
for device in smart_system.locations["LOCATION_ID"].find_device_by_type("WATER_CONTROL"):
print(f"name : {device.name}")
print(f"id : {device.id}")
print(f"type : {device.type}")
print(f"model_type : {device.model_type}")
print(f"battery_level : {device.battery_level}")
print(f"battery_state : {device.battery_state}")
print(f"rf_link_level : {device.rf_link_level}")
print(f"rf_link_state : {device.rf_link_state}")
print(f"serial : {device.serial}")
print(f"valve_set_id : {device.valve_set_id}")
print(f"valve_name : {device.valve_name}")
print(f"valve_id : {device.valve_id}")
print(f"valve_activity : {device.valve_activity}")
print(f"valve_state : {device.valve_state}")
Once the websocket has been started, everything is managed and the devices are automatically updated once their state change. In order for your to be alerted of such a change, you need to add a callback to the device. This callback will be called each time the device state changed :
def my_callback(device):
print(f"The device {device.name} has been updated !")
device.add_callback(my_callback)
To install the dev environment, you just have to do, in the source code directory :
$ pip install -e .[dev]
FAQs
This library aims to provide python way to communicate with gardena smart gateway and all smart gardena systems.
We found that py-smart-gardena demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket researchers uncover a malicious npm package posing as a tool for detecting vulnerabilities in Etherium smart contracts.
Security News
Research
A supply chain attack on Rspack's npm packages injected cryptomining malware, potentially impacting thousands of developers.
Research
Security News
Socket researchers discovered a malware campaign on npm delivering the Skuld infostealer via typosquatted packages, exposing sensitive data.