uzlonewolf
uzlonewolf
I had the same issue. Turns out /etc/shairport-sync.conf is incorrectly using "hw:0,0" - I changed it to "hw:1,0" and audio now works for both Bluetooth and Airplay.
The `tinytuya.Cloud()` call connects to the Cloud API to get an auth token, so you can't call it before you have internet. Personally I wouldn't bother trying to connect to...
> I suspect the [Find your Data Point](https://www.zigbee2mqtt.io/advanced/support-new-devices/03_find_tuya_data_points.html#_9-find-your-data-point) link will be a great reference for others too. And I just discovered that you can get a list of all data...
@manj9501 Fixed with #182. tinytuya/BulbDevice.py needs set_version to call `super(BulbDevice, self).set_version(version)` instead of simply doing `self.version = version`
I use udp, but it's set the same way; just add "buffer_size" to the URL query string. My go-to is ```udp://239.255.42.46:5004?buffer_size=5000000&overrun_nonfatal=1&fifo_size=100000 live=1``` (yes, the space before "live=1" is correct) to...
Looking at the docs it looks like upping reorder_queue_size may help as well; I'd see what adding ``` ?reorder_queue_size=1000&buffer_size=5000000 ``` does.
I'm now in the middle of a significant update to the scanner. Making the brute-force search sockets non-blocking and dropping them into select.select() during the `while (count + counts)
The problem is MAC addresses are Layer 2 while a VPN or "different subnet" means you only have Layer 3 access. If you had Layer 2 access to get the...
Well, I gave `get_mac_address()` a try, but as expected it just returns `None` if you only have Layer 3 access to the device. Brute-force key detection is working rather well...
Well, I had it all nice and neat, but after I added broadcast-discovered device polling back in it kinda spaghetti'd. I may make some classes to better handle how the...