API - deuill/vector-watch-hacking GitHub Wiki

Various URIs are exposed, used for pulling updates etc. These are:

public static final String API_DEV = "http://52.18.220.232:8080";
public static final String API_PRODUCTION = "https://endpoint.vector.watch";
public static final String API_STAGE = "https://api.vector.watch";
private static String API_URI = "https://endpoint.vector.watch/VectorCloud/rest/";
private static String API_URI_V1 = "https://endpoint.vector.watch/VectorCloud/rest/v1";
private static String API_URI_V2 = "https://endpoint.vector.watch/VectorCloud/rest/v2";

Access to these require the Authorization header set with a valid API token and Content-Type set to application/json. You can fetch the token from log files stored in Android's internal memory, under the VectorWatch folder, using the following command:

awk '/^.*CloudCommunicationHandler.*Auth token/ {print $NF; exit}'