-
-
Notifications
You must be signed in to change notification settings - Fork 20
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Payload validation for 0x01FF packet #145
Comments
Can you provide more information?
|
When I send a packet with my HGI80 to my Itho Spider to set the target temperature I have to send the following: service: ramses_cc.send_packet
data:
device_id: "21:033620"
verb: W
code: 01FF
payload: 0080802727D0000000143C80800000B40080800280FF80040000 Resulting in
The payload is longer than the home assistant integration allows. I changed the python code to allow a longer payload by editing custom_components/ramses_cc/schemas.py, line 78, from 48 to 52. Rebooting HA and I can send it. We got the packet by listening to a Spider Connect Gateway. And I now have the binding working between a HGI80 as gateway and the home icon on the Spider. So now I am testing the setpoint change on the Spider. |
Sorry, I am being stupid. There is a typo in ramses_cc, it should be: vol.Required("payload"): cv.matches_regex(r"^([0-9A-F][0-9A-F]){1,48}$"), I have made this fix - it will be included within 0.31.4. |
The payload validation for 0x1FF in ramses_rf is:
But in ramses_cc the payload validation is:
So, sending
01FF
packages in Home Assistant fails due to the maximum length.The text was updated successfully, but these errors were encountered: