2019-08-11 14:37:30 +00:00
|
|
|
import socket
|
|
|
|
import time
|
|
|
|
import logging
|
2019-08-15 23:27:03 +00:00
|
|
|
import random
|
2020-03-21 21:40:39 +00:00
|
|
|
from owrx.config import Config
|
2019-08-11 14:37:30 +00:00
|
|
|
|
|
|
|
logger = logging.getLogger(__name__)
|
|
|
|
|
|
|
|
FEND = 0xC0
|
|
|
|
FESC = 0xDB
|
|
|
|
TFEND = 0xDC
|
2019-08-15 17:56:59 +00:00
|
|
|
TFESC = 0xDD
|
2019-08-11 14:37:30 +00:00
|
|
|
|
|
|
|
|
2019-08-17 22:15:07 +00:00
|
|
|
class DirewolfConfig(object):
|
2019-09-13 20:28:17 +00:00
|
|
|
def getConfig(self, port, is_service):
|
2020-03-21 21:40:39 +00:00
|
|
|
pm = Config.get()
|
2019-08-17 22:15:07 +00:00
|
|
|
|
|
|
|
config = """
|
2019-08-17 23:39:23 +00:00
|
|
|
ACHANNELS 1
|
2020-02-17 11:06:13 +00:00
|
|
|
ADEVICE stdin null
|
2019-08-17 23:39:23 +00:00
|
|
|
|
|
|
|
CHANNEL 0
|
2019-08-17 22:15:07 +00:00
|
|
|
MYCALL {callsign}
|
|
|
|
MODEM 1200
|
2019-08-17 23:39:23 +00:00
|
|
|
|
2019-08-17 22:15:07 +00:00
|
|
|
KISSPORT {port}
|
|
|
|
AGWPORT off
|
|
|
|
""".format(
|
2019-08-17 22:16:08 +00:00
|
|
|
port=port, callsign=pm["aprs_callsign"]
|
2019-08-17 22:15:07 +00:00
|
|
|
)
|
|
|
|
|
2019-09-13 20:28:17 +00:00
|
|
|
if is_service and pm["aprs_igate_enabled"]:
|
2019-08-17 22:15:07 +00:00
|
|
|
config += """
|
|
|
|
IGSERVER {server}
|
|
|
|
IGLOGIN {callsign} {password}
|
|
|
|
""".format(
|
2019-08-17 22:16:08 +00:00
|
|
|
server=pm["aprs_igate_server"], callsign=pm["aprs_callsign"], password=pm["aprs_igate_password"]
|
2019-08-17 22:15:07 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
if pm["aprs_igate_beacon"]:
|
2020-03-29 16:08:26 +00:00
|
|
|
lat = pm["receiver_gps"]["lat"]
|
|
|
|
lon = pm["receiver_gps"]["lon"]
|
2020-03-15 17:45:24 +00:00
|
|
|
direction_ns = "N" if lat > 0 else "S"
|
|
|
|
direction_we = "E" if lon > 0 else "W"
|
|
|
|
lat = abs(lat)
|
|
|
|
lon = abs(lon)
|
|
|
|
lat = "{0:02d}^{1:05.2f}{2}".format(int(lat), (lat - int(lat)) * 60, direction_ns)
|
|
|
|
lon = "{0:03d}^{1:05.2f}{2}".format(int(lon), (lon - int(lon)) * 60, direction_we)
|
2019-08-17 22:15:07 +00:00
|
|
|
|
|
|
|
config += """
|
|
|
|
PBEACON sendto=IG delay=0:30 every=60:00 symbol="igate" overlay=R lat={lat} long={lon} comment="OpenWebRX APRS gateway"
|
2019-08-17 22:16:08 +00:00
|
|
|
""".format(
|
|
|
|
lat=lat, lon=lon
|
|
|
|
)
|
2019-08-17 22:15:07 +00:00
|
|
|
|
|
|
|
return config
|
|
|
|
|
|
|
|
|
2019-08-11 14:37:30 +00:00
|
|
|
class KissClient(object):
|
2019-08-15 23:27:03 +00:00
|
|
|
@staticmethod
|
|
|
|
def getFreePort():
|
|
|
|
# direwolf has some strange hardcoded port ranges
|
|
|
|
while True:
|
|
|
|
try:
|
|
|
|
port = random.randrange(1024, 49151)
|
|
|
|
# test if port is available for use
|
|
|
|
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
|
2019-08-17 22:16:08 +00:00
|
|
|
s.bind(("localhost", port))
|
2019-08-15 23:27:03 +00:00
|
|
|
s.setsockopt(socket.SOL_SOCKET, socket.SO_REUSEADDR, 1)
|
|
|
|
s.close()
|
|
|
|
return port
|
|
|
|
except OSError:
|
|
|
|
pass
|
|
|
|
|
2019-08-11 14:37:30 +00:00
|
|
|
def __init__(self, port):
|
2020-02-27 17:43:58 +00:00
|
|
|
delay = .5
|
|
|
|
retries = 0
|
|
|
|
while True:
|
|
|
|
try:
|
|
|
|
self.socket = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
|
|
|
|
self.socket.connect(("localhost", port))
|
|
|
|
break
|
|
|
|
except ConnectionError:
|
|
|
|
if retries > 20:
|
|
|
|
logger.error("maximum number of connection attempts reached. did direwolf start up correctly?")
|
|
|
|
raise
|
|
|
|
retries += 1
|
|
|
|
time.sleep(delay)
|
2019-08-11 14:37:30 +00:00
|
|
|
|
|
|
|
def read(self):
|
2019-08-15 13:45:15 +00:00
|
|
|
return self.socket.recv(1)
|
|
|
|
|
|
|
|
|
|
|
|
class KissDeframer(object):
|
|
|
|
def __init__(self):
|
|
|
|
self.escaped = False
|
|
|
|
self.buf = bytearray()
|
|
|
|
|
|
|
|
def parse(self, input):
|
|
|
|
frames = []
|
|
|
|
for b in input:
|
|
|
|
if b == FESC:
|
|
|
|
self.escaped = True
|
|
|
|
elif self.escaped:
|
|
|
|
if b == TFEND:
|
|
|
|
self.buf.append(FEND)
|
|
|
|
elif b == TFESC:
|
|
|
|
self.buf.append(FESC)
|
2019-08-11 14:37:30 +00:00
|
|
|
else:
|
|
|
|
logger.warning("invalid escape char: %s", str(input[0]))
|
2019-08-15 13:45:15 +00:00
|
|
|
self.escaped = False
|
2019-08-11 14:37:30 +00:00
|
|
|
elif input[0] == FEND:
|
2019-08-15 13:45:15 +00:00
|
|
|
# data frames start with 0x00
|
|
|
|
if len(self.buf) > 1 and self.buf[0] == 0x00:
|
|
|
|
frames += [self.buf[1:]]
|
|
|
|
self.buf = bytearray()
|
2019-08-11 14:37:30 +00:00
|
|
|
else:
|
2019-08-15 13:45:15 +00:00
|
|
|
self.buf.append(b)
|
|
|
|
return frames
|