Modern, async Python client for the open‑source FMD (Find My Device) server. It handles authentication, key management, encrypted data decryption, location/picture retrieval, and common device commands with safe, validated helpers.
- Requires Python 3.8+
- Stable (PyPI):
pip install fmd_api
- Pre‑release (Test PyPI):
pip install --pre --index-url https://test.pypi.org/simple/ \ --extra-index-url https://pypi.org/simple/ fmd_api
import asyncio, json
from fmd_api import FmdClient
async def main():
# Recommended: async context manager auto-closes session
async with await FmdClient.create("https://fmd.example.com", "alice", "secret") as client:
# Request a fresh GPS fix and wait a bit on your side
await client.request_location("gps")
# Fetch most recent locations and decrypt the latest
blobs = await client.get_locations(num_to_get=1)
loc = json.loads(client.decrypt_data_blob(blobs[0]))
print(loc["lat"], loc["lon"], loc.get("accuracy"))
# Take a picture (validated helper)
await client.take_picture("front")
asyncio.run(main())Find My Device always requires HTTPS; plain HTTP is not allowed by this client. If you need to connect to a server with a self-signed certificate, you have two options:
- Preferred (secure): provide a custom SSLContext that trusts your CA or certificate
- Last resort (not for production): disable certificate validation explicitly
Examples:
import ssl
from fmd_api import FmdClient
# 1) Custom CA bundle / pinned cert (recommended)
ctx = ssl.create_default_context()
ctx.load_verify_locations(cafile="/path/to/your/ca.pem")
# Via constructor
client = FmdClient("https://fmd.example.com", ssl=ctx)
# Or via factory
# async with await FmdClient.create("https://fmd.example.com", "user", "pass", ssl=ctx) as client:
# 2) Disable verification (development only)
insecure_client = FmdClient("https://fmd.example.com", ssl=False)Notes:
- HTTP (http://) is rejected. Use only HTTPS URLs.
- Prefer a custom SSLContext over disabling verification.
- For higher security, consider pinning the server cert in your context.
Warning
Passing
ssl=Falsedisables TLS certificate validation and should only be used in development. For production, use a customssl.SSLContextthat trusts your CA/certificate or pin the server certificate. The client enforces HTTPS and rejectshttp://URLs.
If you're using a self-signed certificate and want to pin to that exact cert, load the server's PEM (or DER) directly into an SSLContext. This ensures only that certificate (or its CA) is trusted.
import ssl
from fmd_api import FmdClient
# Export your server's certificate to PEM (e.g., server-cert.pem)
ctx = ssl.create_default_context()
ctx.verify_mode = ssl.CERT_REQUIRED
ctx.check_hostname = True # keep hostname verification when possible
ctx.load_verify_locations(cafile="/path/to/server-cert.pem")
client = FmdClient("https://fmd.example.com", ssl=ctx)
# async with await FmdClient.create("https://fmd.example.com", "user", "pass", ssl=ctx) as client:Tips:
- If the server cert changes, pinning will fail until you update the PEM.
- For intermediate/CA signing chains, prefer pinning a private CA instead of the leaf.
-
FmdClient(primary API)-
Auth and key retrieval (salt → Argon2id → access token → private key decrypt)
-
Decrypt blobs (RSA‑OAEP wrapped AES‑GCM)
-
Fetch data:
get_locations,get_pictures -
Export:
export_data_zip(out_path)— client-side packaging of all locations/pictures into ZIP (mimics web UI, no server endpoint) -
Validated command helpers:
request_location("all|gps|cell|last")take_picture("front|back")set_bluetooth(enable: bool)— True = on, False = offset_do_not_disturb(enable: bool)— True = on, False = offset_ringer_mode("normal|vibrate|silent")get_device_stats()
-
Low‑level:
decrypt_data_blob(b64_blob)
-
-
Devicehelper (per‑device convenience)await device.refresh()→ hydrate cached stateawait device.get_location()→ parsed last locationawait device.fetch_pictures(n)+await device.download_photo(item)
Runnable scripts under tests/functional/:
test_auth.py– basic auth smoke testtest_locations.py– list and decrypt recent locationstest_pictures.py– list and download/decrypt a phototest_device.py– device helper flowstest_commands.py– validated command wrappers (no raw strings)test_export.py– export data to ZIPtest_request_location.py– request location and poll for results
Put credentials in tests/utils/credentials.txt (copy from credentials.txt.example).
Located in tests/unit/:
test_client.py– client HTTP flows with mocked responsestest_device.py– device wrapper logic
Run with pytest:
pip install -e ".[dev]"
pytest tests/unit/- Encryption compatible with FMD web client
- RSA‑3072 OAEP (SHA‑256) wrapping AES‑GCM session key
- AES‑GCM IV: 12 bytes; RSA packet size: 384 bytes
- Password/key derivation with Argon2id
- Robust HTTP JSON/text fallback and 401 re‑auth
- "Blob too small for decryption": server returned empty/placeholder data. Skip and continue.
- Pictures may be double‑encoded (encrypted blob → base64 image string). The examples show how to decode safely.
This client targets the FMD ecosystem:
- https://fmd-foss.org/
- https://gitlab.com/fmd-foss
- Public community instance: https://fmd.nulide.de/
MIT © 2025 Devin Slick