openwebrx-clone/owrx/reporting/pskreporter.py

223 lines
7.5 KiB
Python
Raw Permalink Normal View History

import logging
import threading
import time
import random
2019-09-23 21:47:12 +00:00
import socket
2019-11-22 16:16:40 +00:00
from functools import reduce
from operator import and_
from owrx.config import Config
2019-09-23 20:45:55 +00:00
from owrx.version import openwebrx_version
2019-09-24 22:35:57 +00:00
from owrx.locator import Locator
2019-11-22 16:16:40 +00:00
from owrx.metrics import Metrics, CounterMetric
from owrx.reporting.reporter import Reporter
logger = logging.getLogger(__name__)
class PskReporter(Reporter):
interval = 300
def getSupportedModes(self):
2021-02-03 19:11:07 +00:00
return ["FT8", "FT4", "JT9", "JT65", "FST4", "JS8", "Q65"]
2019-09-24 22:36:22 +00:00
def stop(self):
self.cancelTimer()
with self.spotLock:
self.spots = []
def __init__(self):
self.spots = []
self.spotLock = threading.Lock()
2019-09-23 20:45:55 +00:00
self.uploader = Uploader()
self.timer = None
2019-11-22 16:16:40 +00:00
metrics = Metrics.getSharedInstance()
self.dupeCounter = CounterMetric()
metrics.addMetric("pskreporter.duplicates", self.dupeCounter)
self.spotCounter = CounterMetric()
metrics.addMetric("pskreporter.spots", self.spotCounter)
def scheduleNextUpload(self):
if self.timer:
return
2019-09-24 19:41:31 +00:00
delay = PskReporter.interval + random.uniform(0, 30)
logger.debug("scheduling next pskreporter upload in %f seconds", delay)
self.timer = threading.Timer(delay, self.upload)
self.timer.start()
2019-11-22 16:16:40 +00:00
def spotEquals(self, s1, s2):
keys = ["callsign", "timestamp", "locator", "mode", "msg"]
2019-11-23 00:12:21 +00:00
return reduce(and_, map(lambda key: s1[key] == s2[key], keys))
2019-11-22 16:16:40 +00:00
def spot(self, spot):
with self.spotLock:
2019-11-22 16:16:40 +00:00
if any(x for x in self.spots if self.spotEquals(spot, x)):
# dupe
self.dupeCounter.inc()
else:
self.spotCounter.inc()
self.spots.append(spot)
self.scheduleNextUpload()
def upload(self):
2019-09-28 01:06:34 +00:00
try:
with self.spotLock:
self.timer = None
2019-09-28 01:06:34 +00:00
spots = self.spots
self.spots = []
if spots:
self.uploader.upload(spots)
except Exception:
logger.exception("Failed to upload spots")
def cancelTimer(self):
if self.timer:
self.timer.cancel()
2019-09-23 20:45:55 +00:00
class Uploader(object):
receieverDelimiter = [0x99, 0x92]
senderDelimiter = [0x99, 0x93]
def __init__(self):
self.sequence = 0
2019-09-23 21:47:12 +00:00
self.socket = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
2019-09-23 20:45:55 +00:00
def upload(self, spots):
2019-09-23 21:53:22 +00:00
logger.debug("uploading %i spots", len(spots))
2019-09-23 20:45:55 +00:00
for packet in self.getPackets(spots):
2019-09-23 21:47:12 +00:00
self.socket.sendto(packet, ("report.pskreporter.info", 4739))
2019-09-23 20:45:55 +00:00
def getPackets(self, spots):
encoded = [self.encodeSpot(spot) for spot in spots]
# filter out any erroneous encodes
encoded = [e for e in encoded if e is not None]
2019-09-23 20:45:55 +00:00
def chunks(l, n):
"""Yield successive n-sized chunks from l."""
for i in range(0, len(l), n):
yield l[i : i + n]
rHeader = self.getReceiverInformationHeader()
rInfo = self.getReceiverInformation()
sHeader = self.getSenderInformationHeader()
packets = []
# 50 seems to be a safe bet
for chunk in chunks(encoded, 50):
2019-09-24 22:36:40 +00:00
sInfo = self.getSenderInformation(chunk)
length = 16 + len(rHeader) + len(sHeader) + len(rInfo) + len(sInfo)
2019-09-23 20:45:55 +00:00
header = self.getHeader(length)
2019-09-24 22:47:34 +00:00
packets.append(header + rHeader + sHeader + rInfo + sInfo)
2019-09-23 20:45:55 +00:00
return packets
def getHeader(self, length):
self.sequence += 1
return bytes(
# protocol version
[0x00, 0x0A]
+ list(length.to_bytes(2, "big"))
+ list(int(time.time()).to_bytes(4, "big"))
+ list(self.sequence.to_bytes(4, "big"))
+ list((id(self) & 0xFFFFFFFF).to_bytes(4, "big"))
)
def encodeString(self, s):
return [len(s)] + list(s.encode("utf-8"))
def encodeSpot(self, spot):
try:
return bytes(
self.encodeString(spot["callsign"])
+ list(int(spot["freq"]).to_bytes(4, "big"))
+ list(int(spot["db"]).to_bytes(1, "big", signed=True))
+ self.encodeString(spot["mode"])
+ self.encodeString(spot["locator"])
# informationsource. 1 means "automatically extracted
+ [0x01]
+ list(int(spot["timestamp"] / 1000).to_bytes(4, "big"))
)
except Exception:
logger.exception("Error while encoding spot for pskreporter")
return None
2019-09-23 20:45:55 +00:00
def getReceiverInformationHeader(self):
pm = Config.get()
with_antenna = "pskreporter_antenna_information" in pm and pm["pskreporter_antenna_information"] is not None
num_fields = 4 if with_antenna else 3
length = 12 + num_fields * 8
2019-09-23 20:45:55 +00:00
return bytes(
# id
[0x00, 0x03]
# length
2021-01-20 16:01:46 +00:00
+ list(length.to_bytes(2, "big"))
2019-09-23 20:45:55 +00:00
+ Uploader.receieverDelimiter
# number of fields
2021-01-20 16:01:46 +00:00
+ list(num_fields.to_bytes(2, "big"))
# padding
+ [0x00, 0x00]
2019-09-23 20:45:55 +00:00
# receiverCallsign
+ [0x80, 0x02, 0xFF, 0xFF, 0x00, 0x00, 0x76, 0x8F]
# receiverLocator
+ [0x80, 0x04, 0xFF, 0xFF, 0x00, 0x00, 0x76, 0x8F]
# decodingSoftware
+ [0x80, 0x08, 0xFF, 0xFF, 0x00, 0x00, 0x76, 0x8F]
# antennaInformation
2021-01-20 16:01:46 +00:00
+ ([0x80, 0x09, 0xFF, 0xFF, 0x00, 0x00, 0x76, 0x8F] if with_antenna else [])
2019-09-23 20:45:55 +00:00
# padding
+ [0x00, 0x00]
)
def getReceiverInformation(self):
pm = Config.get()
bodyFields = [
# callsign
pm["pskreporter_callsign"],
# locator
Locator.fromCoordinates(pm["receiver_gps"]),
# decodingSoftware
"OpenWebRX " + openwebrx_version,
]
if "pskreporter_antenna_information" in pm and pm["pskreporter_antenna_information"] is not None:
bodyFields += [pm["pskreporter_antenna_information"]]
body = [b for s in bodyFields for b in self.encodeString(s)]
2019-09-23 20:45:55 +00:00
body = self.pad(body, 4)
body = bytes(Uploader.receieverDelimiter + list((len(body) + 4).to_bytes(2, "big")) + body)
return body
def getSenderInformationHeader(self):
return bytes(
# id, length
[0x00, 0x02, 0x00, 0x3C]
+ Uploader.senderDelimiter
# number of fields
+ [0x00, 0x07]
# senderCallsign
+ [0x80, 0x01, 0xFF, 0xFF, 0x00, 0x00, 0x76, 0x8F]
# frequency
+ [0x80, 0x05, 0x00, 0x04, 0x00, 0x00, 0x76, 0x8F]
# sNR
2019-09-23 21:47:12 +00:00
+ [0x80, 0x06, 0x00, 0x01, 0x00, 0x00, 0x76, 0x8F]
2019-09-23 20:45:55 +00:00
# mode
+ [0x80, 0x0A, 0xFF, 0xFF, 0x00, 0x00, 0x76, 0x8F]
# senderLocator
+ [0x80, 0x03, 0xFF, 0xFF, 0x00, 0x00, 0x76, 0x8F]
# informationSource
+ [0x80, 0x0B, 0x00, 0x01, 0x00, 0x00, 0x76, 0x8F]
# flowStartSeconds
+ [0x00, 0x96, 0x00, 0x04]
)
2019-09-24 22:36:40 +00:00
def getSenderInformation(self, chunk):
sInfo = self.padBytes(b"".join(chunk), 4)
sInfoLength = len(sInfo) + 4
return bytes(Uploader.senderDelimiter) + sInfoLength.to_bytes(2, "big") + sInfo
2019-09-23 21:47:12 +00:00
def pad(self, b, l):
return b + [0x00 for _ in range(0, -1 * len(b) % l)]
def padBytes(self, b, l):
return b + bytes([0x00 for _ in range(0, -1 * len(b) % l)])