![]() Add integration Meross Lan indicating ip of your device.Now your device should connect to your WiFi and mqtt broker.Īfter seeing that device is connected to mqtt broker you need to: meross-setup -gateway 10.10.10.1 -wifi-ssid your ssid name -wifi-pass your wifi pass -mqtt mqtt://yourhaip:8883 When usernames in HA are created and server restarted, you can execute this script:.If necessary, you can disconnect from device's WiFi and connect to it on next step IMPORTANT! create user with same username and password (which you get from device using. connect to WIFI network of your MEROSS device and execute this script:.It should be like that: \ip of your HA\share\mosquittoĪccesscontrollist (no extention) and mosquitto acl.confĪfter that, open both of them with text editor like notepad or notepad++ and put Now you need to create a folder mosquitto in \ip of your HA\share IMPORTANT! You need to copy your SSL certificates created earlier, in a folder: Now you can copy previosly downloaded mosquitto folder to your HA using file explorer:Īfter that, its necesary to open config.json in folder and change name parameter to Mosquitto broker 5 Install Samba Share addon and create username and password for it You should end up with a zip archive with the repo name and commit.Įxtract the folder and fetch only the files you need - mosquitto folder in addons for MQTT Broker. Preparing Home Assistant and installing MQTT 5 brokerīefore you copy anything to your HA - remove the existing add-on and restart HA (hard reboot (Reboot Host) from Supervisor/System)! Fetch an older version of the component client.crt – The client certifcate file.ca.crt – The Certificate authority certificate.\\wsl$\your_installed_Ubuntu\home\your_usernameĬopy these certificates to a folder in your desktop: Now you can open windows explorer accesing to your Ubuntu virtual disk writing: Openssl x509 -req -in client.csr -CA ca.crt -CAkey ca.key -CAcreateserial -out client.crt -days 360 Openssl req -new -out client.csr -key client.key Use the same common name which you used when creating a server key pair ![]() Openssl x509 -req -in server.csr -CA ca.crt -CAkey ca.key -CAcreateserial -out server.crt -days 360Ĭreate a certificate request and use the client private key to sign it. Openssl req -new -out server.csr -key server.key ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |