mitch7391 / cmd4-HisenseTV

Shell script to integrate Hisense TVs using the RemoteNOW app with Homebridge through the homebridge-cmd4 plug-in.
5 stars 1 forks source link
cmd4-hisensetv hisense homebridge homebridge-cmd4 remotenow

cmd4-HisenseTV

Shell script to integrate Hisense TVs using the RemoteNOW app with Homebridge through the homebridge-cmd4 plug-in.

Installation:

  1. Download the RemoteNow app for the TV and pair it to your smart phone. I cant remember if I had pulled this off on my iPhone or the Android tablet I have at home. Home Assistant forums suggest you use an Android device for this. You will need to retrieve the MAC Address of the device you have paired to the TV.
  2. To make sure you have the correct MAC Address (as I had issues on my first attempt), you can download the following program on your laptop to 'work out' the commands the TV sends; here you will see the definite MAC Address being used to send the commands. MQTT Explorer:

  1. Inside this program you will see the commands captured as you use the device you paired to control the TV. This is what I have used to collect the commands to create this TV Accessory. You should by now have both your TV IP Address, TV MAC Address and the MAC Address for the paired device.
  2. From your Homebridge command terminal do the following:
  3. Install mosquitto: sudo apt-get install mosquitto
  4. Install wakeonlan: sudo apt-get install wakeonlan
  5. Install openssl: sudo apt-get install openssl
  6. Get the security certificates from your TV using openssl(add your IP address in here): openssl s_client -host TV_IP_ADDRESS -port 36669 -showcerts . It should spit out a bunch of information, you need to grab only the following area of code that looks like this:
-----BEGIN CERTIFICATE-----
qmierjfpaoisdjmçfaisldjcçfskdjafcaçskdjcçfmasidcf (etc. etc. etc)
-----END CERTIFICATE-----

-----BEGIN CERTIFICATE-----
7ferusycedaystraedyasredyatrdsecdtrseydtraESYDTRASCY (etc. etc. etc)
-----END CERTIFICATE-----
  1. Copy the two certificates, create a new file from your terminal sudo nano hisense.crt and paste the two certifications as found inside. This will have created the certificate file in your home file path (/home/pi/hisense.crt).
  2. Edit HisenseTV.sh with the IP address of your TV, the MAC Address of your TV, the MAC Address of the paired device from earlier (the one you got from MQTT Explorer) and the file path of the certificate you just created.
  3. Copy HisenseTV.sh to a subdirectory of your .homebridge directory; e.g. .homebridge/Cmd4Scripts/HisenseTV.sh. Mine is located in /home/pi/HisenseTV.sh as I find that easier.
  4. OR if you are less savvy like me, you can create the script in the homedrive of your raspberry pi using sudo nano HisenseTV.sh and pasting the contents inside, then saving. Its pathway will be /home/pi/HisenseTV.sh. NOTE: For HOOBS users this would create your shell scripts at the lcation: /home/hoobs/.hoobs/HisenseTV.sh.
  5. Install homebridge-cmd4 plug-in through config-ui-x or via command: sudo npm install -g --unsafe-perm homebridge-cmd4. NOTE: you do not need to follow the extra installation steps on cmd4's page for this.
  6. Add to your Homebridge config.json file (easiest done through homebridge-confi-ui-x web UI); use the config_sample.json file. This file contains all potential input sources, personally I would only add the ones you use as there are 24. NOTE: do not change the values of "identifier" for each input source or they will no longer work.
  7. Restart Homebridge and all should be well... Unless you are me and everything I do goes wrong several times before it goes right haha.

Known Bug:

The following Hisense TV Apps added as input sources do not seem to work:

Troubleshooting:

Special Thanks:

  1. None of this would have been possible without the patience and kindness of homebridge-cmd4 developer John Talbot; who did not have to help me at all, but worked through my script and errors, and put up with my stupid questions.
  2. My wife who has put up with what has become an obsession to get yet another device in Homekit.