Skip to main content

A Python client for the FMD (Find My Device) server API

Project description

fmd_api: Python client for FMD (Find My Device)

Tests codecov PyPI - Downloads

Modern, async Python client for the open‑source FMD (Find My Device) server. It handles authentication, key management, encrypted data decryption, location/picture retrieval, and common device commands with safe, validated helpers.

Install

  • Requires Python 3.8+
  • Stable (PyPI):
    pip install fmd_api
    

Quickstart

import asyncio, json
from fmd_api import FmdClient

async def main():
  # Recommended: async context manager auto-closes session
  async with await FmdClient.create("https://fmd.example.com", "alice", "secret", drop_password=True) as client:
    # Request a fresh GPS fix and wait a bit on your side
    await client.request_location("gps")

    # Fetch most recent locations and decrypt the latest
    blobs = await client.get_locations(num_to_get=1)
    # decrypt_data_blob() returns raw bytes — decode then parse JSON for clarity
    decrypted = client.decrypt_data_blob(blobs[0])
    loc = json.loads(decrypted.decode("utf-8"))
    print(loc["lat"], loc["lon"], loc.get("accuracy"))

    # Take a picture (validated helper)
    await client.take_picture("front")

asyncio.run(main())

TLS and self-signed certificates

HTTPS is strongly recommended for all connections to FMD server. HTTP is permitted for local development or trusted private networks, but should not be used in production. If you need to connect to a server with a self-signed certificate, you have two options:

  • Preferred (secure): provide a custom SSLContext that trusts your CA or certificate
  • Last resort (not for production): disable certificate validation explicitly

Examples:

import ssl
from fmd_api import FmdClient

# 1) Custom CA bundle / pinned cert (recommended)
ctx = ssl.create_default_context()
ctx.load_verify_locations(cafile="/path/to/your/ca.pem")

# Via constructor
client = FmdClient("https://fmd.example.com", ssl=ctx)

# Or via factory
# async with await FmdClient.create("https://fmd.example.com", "user", "pass", ssl=ctx) as client:

# 2) Disable verification (development only)
insecure_client = FmdClient("https://fmd.example.com", ssl=False)

Notes:

  • HTTPS is strongly recommended. Use HTTP only on trusted local networks or for development.
  • Prefer a custom SSLContext over disabling verification.
  • For higher security, consider pinning the server cert in your context.

Warning

Passing ssl=False disables TLS certificate validation and should only be used in development. For production, use a custom ssl.SSLContext that trusts your CA/certificate or pin the server certificate. Using http:// URLs sends credentials and data in plaintext — only use HTTP on trusted local networks or for development purposes.

Pinning the exact server certificate (recommended for self-signed)

If you're using a self-signed certificate and want to pin to that exact cert, load the server's PEM (or DER) directly into an SSLContext. This ensures only that certificate (or its CA) is trusted.

import ssl
from fmd_api import FmdClient

# Export your server's certificate to PEM (e.g., server-cert.pem)
ctx = ssl.create_default_context()
ctx.verify_mode = ssl.CERT_REQUIRED
ctx.check_hostname = True  # keep hostname verification when possible
ctx.load_verify_locations(cafile="/path/to/server-cert.pem")

client = FmdClient("https://fmd.example.com", ssl=ctx)
# async with await FmdClient.create("https://fmd.example.com", "user", "pass", ssl=ctx) as client:

Tips:

  • If the server cert changes, pinning will fail until you update the PEM.
  • For intermediate/CA signing chains, prefer pinning a private CA instead of the leaf.

What’s in the box

  • FmdClient (primary API)

    • Auth and key retrieval (salt → Argon2id → access token → private key retrieval and decryption)
    • Decrypt blobs (RSA‑OAEP wrapped AES‑GCM)
    • Fetch data: get_locations, get_pictures
    • Export: export_data_zip(out_path) — client-side packaging of all locations/pictures into ZIP (mimics web UI, no server endpoint)
    • Validated command helpers:
      • request_location("all|gps|cell|last")
      • take_picture("front|back")
      • set_bluetooth(enable: bool) — True = on, False = off
      • set_do_not_disturb(enable: bool) — True = on, False = off
      • set_ringer_mode("normal|vibrate|silent")

    Note: Device statistics functionality (get_device_stats()) has been temporarily removed and will be restored when the FMD server supports it (see fmd-server#74).

    • Low‑level: decrypt_data_blob(b64_blob)
  • Device helper (per‑device convenience)

    • await device.refresh() → hydrate cached state
    • await device.get_location() → parsed last location
    • await device.get_picture_blobs(n) + await device.decode_picture(blob)
    • await device.get_picture_metadata(n) -> returns only metadata dicts (if the server exposes them)

    IMPORTANT (breaking change in v2.0.5): legacy compatibility wrappers were removed. The following legacy methods were removed from the Device API: fetch_pictures, get_pictures, download_photo, get_picture, take_front_photo, and take_rear_photo. Update your code to use get_picture_blobs(), decode_picture(), take_front_picture() and take_rear_picture() instead.

    • Commands: await device.play_sound(), await device.take_front_picture(), await device.take_rear_picture(), await device.lock(message=None), await device.wipe(pin="YourSecurePIN", confirm=True) Note: wipe requires the FMD PIN (alphanumeric ASCII, no spaces) and must be enabled in the Android app's General settings. Future versions may enforce a 16+ character PIN length (fmd-android#379).

Example: Lock device with a message

import asyncio
from fmd_api import FmdClient, Device

async def main():
  client = await FmdClient.create("https://fmd.example.com", "alice", "secret")
  device = Device(client, "alice")
  # Optional message is sanitized (quotes/newlines removed, whitespace collapsed)
  await device.lock(message="Lost phone. Please call +1-555-555-1234")
  await client.close()

asyncio.run(main())

Example: Inspect pictures metadata (when available)

Use get_picture_blobs() to fetch the raw server responses (strings or dicts). If you want a strongly-typed list of picture metadata objects (where the server provides metadata as JSON objects), use get_picture_metadata(), which filters for dict entries and returns only those.

from fmd_api import FmdClient, Device

async def inspect_metadata():
  client = await FmdClient.create("https://fmd.example.com", "alice", "secret")
  device = Device(client, "alice")

  # Raw values may be strings (base64 blobs) or dicts (metadata). Keep raw when you need
  # to decode or handle both forms yourself.
  raw = await device.get_picture_blobs(10)

  # If you want only metadata entries returned by the server, use get_picture_metadata().
  # This returns a list of dict-like metadata objects (e.g. id/date/filename) and filters
  # out any raw string blobs.
  metadata = await device.get_picture_metadata(10)
  for m in metadata:
    print(m.get("id"), m.get("date"))

  await client.close()

asyncio.run(inspect_metadata())

Testing

Functional tests

Runnable scripts under tests/functional/:

  • test_auth.py – basic auth smoke test
  • test_locations.py – list and decrypt recent locations
  • test_pictures.py – list and download/decrypt a photo
  • test_device.py – device helper flows
  • test_commands.py – validated command wrappers (no raw strings)
  • test_export.py – export data to ZIP
  • test_request_location.py – request location and poll for results

Put credentials in tests/utils/credentials.txt (copy from credentials.txt.example).

Unit tests

Located in tests/unit/:

  • test_client.py – client HTTP flows with mocked responses
  • test_device.py – device wrapper logic

Run with pytest:

pip install -e ".[dev]"
pytest tests/unit/

API highlights

  • Encryption compatible with FMD web client
    • RSA‑3072 OAEP (SHA‑256) wrapping AES‑GCM session key
    • AES‑GCM IV: 12 bytes; RSA packet size: 384 bytes
  • Password/key derivation with Argon2id
  • Robust HTTP JSON/text fallback and 401 re‑auth
    • Supports password-free resume via exported auth artifacts (hash + token + private key)

Advanced: Password-Free Resume

You can onboard once with a raw password, optionally discard it immediately using drop_password=True, export authentication artifacts, and later resume without storing the raw secret:

client = await FmdClient.create(url, fmd_id, password, drop_password=True)
artifacts = await client.export_auth_artifacts()

# Persist `artifacts` securely (contains hash, token, private key)

# Later / after restart
client2 = await FmdClient.from_auth_artifacts(artifacts)
locations = await client2.get_locations(1)

On a 401, the client will transparently reauthenticate using the stored Argon2id password_hash if available. When drop_password=True, the raw password is never retained after initial onboarding.

Troubleshooting

  • "Blob too small for decryption": server returned empty/placeholder data. Skip and continue.
  • Pictures may be double‑encoded (encrypted blob → base64 image string). The examples show how to decode safely.

Credits

This client targets the FMD ecosystem:

MIT © 2025 Devin Slick

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

fmd_api-2.0.9.tar.gz (26.3 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

fmd_api-2.0.9-py3-none-any.whl (23.7 kB view details)

Uploaded Python 3

File details

Details for the file fmd_api-2.0.9.tar.gz.

File metadata

  • Download URL: fmd_api-2.0.9.tar.gz
  • Upload date:
  • Size: 26.3 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.7

File hashes

Hashes for fmd_api-2.0.9.tar.gz
Algorithm Hash digest
SHA256 fba4a9eff9dc6d1215e2c5307061bcf651582d826ba3e1380306ea9fb27b67b5
MD5 1e528fefc016fec77e736c6679b6366e
BLAKE2b-256 2df0f2aafb02e8c5ce67cc44a0cb4600792e1264d3ba26ef5741468a3a80e525

See more details on using hashes here.

Provenance

The following attestation bundles were made for fmd_api-2.0.9.tar.gz:

Publisher: publish.yml on devinslick/fmd_api

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file fmd_api-2.0.9-py3-none-any.whl.

File metadata

  • Download URL: fmd_api-2.0.9-py3-none-any.whl
  • Upload date:
  • Size: 23.7 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.7

File hashes

Hashes for fmd_api-2.0.9-py3-none-any.whl
Algorithm Hash digest
SHA256 e2e25a608260de591a9408e22e0f7174efbeb368e3e191f74fb2a9e5c931b955
MD5 7bb22e6e4643965d02a4557f5f16ff96
BLAKE2b-256 e428e39474cb448a61ef9920772e8f32e976e47afbd8f30c4573470c15d55ee6

See more details on using hashes here.

Provenance

The following attestation bundles were made for fmd_api-2.0.9-py3-none-any.whl:

Publisher: publish.yml on devinslick/fmd_api

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page