2019-09-23 16:33:52 +00:00
|
|
|
import logging
|
|
|
|
import threading
|
|
|
|
import time
|
|
|
|
import random
|
2019-09-23 21:47:12 +00:00
|
|
|
import socket
|
2019-11-22 16:16:40 +00:00
|
|
|
from functools import reduce
|
|
|
|
from operator import and_
|
2020-03-21 21:40:39 +00:00
|
|
|
from owrx.config import Config
|
2019-09-23 20:45:55 +00:00
|
|
|
from owrx.version import openwebrx_version
|
2019-09-24 22:35:57 +00:00
|
|
|
from owrx.locator import Locator
|
2019-11-22 16:16:40 +00:00
|
|
|
from owrx.metrics import Metrics, CounterMetric
|
2021-04-07 15:54:14 +00:00
|
|
|
from owrx.reporting.reporter import Reporter
|
2019-09-23 16:33:52 +00:00
|
|
|
|
|
|
|
logger = logging.getLogger(__name__)
|
|
|
|
|
|
|
|
|
2021-01-14 19:52:56 +00:00
|
|
|
class PskReporter(Reporter):
|
2021-09-30 22:09:20 +00:00
|
|
|
"""
|
|
|
|
This class implements the reporting interface to send received signals to pskreporter.info.
|
|
|
|
|
|
|
|
It interfaces with pskreporter as documented here: https://pskreporter.info/pskdev.html
|
|
|
|
"""
|
2021-01-14 19:52:56 +00:00
|
|
|
interval = 300
|
2019-10-31 21:24:31 +00:00
|
|
|
|
2021-01-14 19:52:56 +00:00
|
|
|
def getSupportedModes(self):
|
2021-09-30 22:09:20 +00:00
|
|
|
"""
|
|
|
|
Supports all valid MODE and SUBMODE values from the ADIF standard.
|
|
|
|
|
|
|
|
Current version at the time of the last change:
|
2023-02-16 18:47:46 +00:00
|
|
|
https://www.adif.org/314/ADIF_314.htm#Mode_Enumeration
|
2021-09-30 22:09:20 +00:00
|
|
|
"""
|
2023-02-16 18:47:46 +00:00
|
|
|
return ["FT8", "FT4", "JT9", "JT65", "FST4", "JS8", "Q65", "WSPR", "FST4W", "MSK144"]
|
2019-09-24 22:36:22 +00:00
|
|
|
|
2021-01-14 19:52:56 +00:00
|
|
|
def stop(self):
|
|
|
|
self.cancelTimer()
|
2021-04-07 15:54:14 +00:00
|
|
|
with self.spotLock:
|
|
|
|
self.spots = []
|
2019-10-31 21:24:31 +00:00
|
|
|
|
2019-09-23 16:33:52 +00:00
|
|
|
def __init__(self):
|
|
|
|
self.spots = []
|
|
|
|
self.spotLock = threading.Lock()
|
2019-09-23 20:45:55 +00:00
|
|
|
self.uploader = Uploader()
|
2019-10-31 21:24:31 +00:00
|
|
|
self.timer = None
|
2019-11-22 16:16:40 +00:00
|
|
|
metrics = Metrics.getSharedInstance()
|
|
|
|
self.dupeCounter = CounterMetric()
|
|
|
|
metrics.addMetric("pskreporter.duplicates", self.dupeCounter)
|
|
|
|
self.spotCounter = CounterMetric()
|
|
|
|
metrics.addMetric("pskreporter.spots", self.spotCounter)
|
2019-09-23 16:33:52 +00:00
|
|
|
|
|
|
|
def scheduleNextUpload(self):
|
2019-10-31 21:24:31 +00:00
|
|
|
if self.timer:
|
|
|
|
return
|
2019-09-24 19:41:31 +00:00
|
|
|
delay = PskReporter.interval + random.uniform(0, 30)
|
2019-09-23 16:33:52 +00:00
|
|
|
logger.debug("scheduling next pskreporter upload in %f seconds", delay)
|
2019-10-31 21:24:31 +00:00
|
|
|
self.timer = threading.Timer(delay, self.upload)
|
|
|
|
self.timer.start()
|
2019-09-23 16:33:52 +00:00
|
|
|
|
2019-11-22 16:16:40 +00:00
|
|
|
def spotEquals(self, s1, s2):
|
2022-11-30 00:07:16 +00:00
|
|
|
keys = ["source", "timestamp", "locator", "mode", "msg"]
|
2019-11-22 16:16:40 +00:00
|
|
|
|
2019-11-23 00:12:21 +00:00
|
|
|
return reduce(and_, map(lambda key: s1[key] == s2[key], keys))
|
2019-11-22 16:16:40 +00:00
|
|
|
|
2019-09-23 16:33:52 +00:00
|
|
|
def spot(self, spot):
|
|
|
|
with self.spotLock:
|
2019-11-22 16:16:40 +00:00
|
|
|
if any(x for x in self.spots if self.spotEquals(spot, x)):
|
|
|
|
# dupe
|
|
|
|
self.dupeCounter.inc()
|
|
|
|
else:
|
|
|
|
self.spotCounter.inc()
|
|
|
|
self.spots.append(spot)
|
2020-12-09 21:59:45 +00:00
|
|
|
self.scheduleNextUpload()
|
2019-09-23 16:33:52 +00:00
|
|
|
|
|
|
|
def upload(self):
|
2019-09-28 01:06:34 +00:00
|
|
|
try:
|
|
|
|
with self.spotLock:
|
2020-12-09 21:59:45 +00:00
|
|
|
self.timer = None
|
2019-09-28 01:06:34 +00:00
|
|
|
spots = self.spots
|
|
|
|
self.spots = []
|
|
|
|
|
|
|
|
if spots:
|
|
|
|
self.uploader.upload(spots)
|
|
|
|
except Exception:
|
|
|
|
logger.exception("Failed to upload spots")
|
2019-09-23 16:33:52 +00:00
|
|
|
|
2019-10-31 21:24:31 +00:00
|
|
|
def cancelTimer(self):
|
|
|
|
if self.timer:
|
|
|
|
self.timer.cancel()
|
|
|
|
|
2019-09-23 20:45:55 +00:00
|
|
|
|
|
|
|
class Uploader(object):
|
|
|
|
receieverDelimiter = [0x99, 0x92]
|
|
|
|
senderDelimiter = [0x99, 0x93]
|
|
|
|
|
|
|
|
def __init__(self):
|
|
|
|
self.sequence = 0
|
2019-09-23 21:47:12 +00:00
|
|
|
self.socket = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
|
2019-09-23 20:45:55 +00:00
|
|
|
|
|
|
|
def upload(self, spots):
|
2019-09-23 21:53:22 +00:00
|
|
|
logger.debug("uploading %i spots", len(spots))
|
2019-09-23 20:45:55 +00:00
|
|
|
for packet in self.getPackets(spots):
|
2019-09-23 21:47:12 +00:00
|
|
|
self.socket.sendto(packet, ("report.pskreporter.info", 4739))
|
2019-09-23 20:45:55 +00:00
|
|
|
|
|
|
|
def getPackets(self, spots):
|
|
|
|
encoded = [self.encodeSpot(spot) for spot in spots]
|
2020-12-09 22:38:27 +00:00
|
|
|
# filter out any erroneous encodes
|
|
|
|
encoded = [e for e in encoded if e is not None]
|
2019-09-23 20:45:55 +00:00
|
|
|
|
|
|
|
def chunks(l, n):
|
|
|
|
"""Yield successive n-sized chunks from l."""
|
|
|
|
for i in range(0, len(l), n):
|
|
|
|
yield l[i : i + n]
|
|
|
|
|
|
|
|
rHeader = self.getReceiverInformationHeader()
|
|
|
|
rInfo = self.getReceiverInformation()
|
|
|
|
sHeader = self.getSenderInformationHeader()
|
|
|
|
|
|
|
|
packets = []
|
|
|
|
# 50 seems to be a safe bet
|
|
|
|
for chunk in chunks(encoded, 50):
|
2019-09-24 22:36:40 +00:00
|
|
|
sInfo = self.getSenderInformation(chunk)
|
|
|
|
length = 16 + len(rHeader) + len(sHeader) + len(rInfo) + len(sInfo)
|
2019-09-23 20:45:55 +00:00
|
|
|
header = self.getHeader(length)
|
2019-09-24 22:47:34 +00:00
|
|
|
packets.append(header + rHeader + sHeader + rInfo + sInfo)
|
2019-09-23 20:45:55 +00:00
|
|
|
|
|
|
|
return packets
|
|
|
|
|
|
|
|
def getHeader(self, length):
|
|
|
|
self.sequence += 1
|
|
|
|
return bytes(
|
|
|
|
# protocol version
|
|
|
|
[0x00, 0x0A]
|
|
|
|
+ list(length.to_bytes(2, "big"))
|
|
|
|
+ list(int(time.time()).to_bytes(4, "big"))
|
|
|
|
+ list(self.sequence.to_bytes(4, "big"))
|
|
|
|
+ list((id(self) & 0xFFFFFFFF).to_bytes(4, "big"))
|
|
|
|
)
|
|
|
|
|
|
|
|
def encodeString(self, s):
|
|
|
|
return [len(s)] + list(s.encode("utf-8"))
|
|
|
|
|
|
|
|
def encodeSpot(self, spot):
|
2020-12-09 22:38:27 +00:00
|
|
|
try:
|
|
|
|
return bytes(
|
2022-11-30 00:07:16 +00:00
|
|
|
self.encodeString(spot["source"]["callsign"])
|
2020-12-09 22:38:27 +00:00
|
|
|
+ list(int(spot["freq"]).to_bytes(4, "big"))
|
|
|
|
+ list(int(spot["db"]).to_bytes(1, "big", signed=True))
|
|
|
|
+ self.encodeString(spot["mode"])
|
|
|
|
+ self.encodeString(spot["locator"])
|
|
|
|
# informationsource. 1 means "automatically extracted
|
|
|
|
+ [0x01]
|
|
|
|
+ list(int(spot["timestamp"] / 1000).to_bytes(4, "big"))
|
|
|
|
)
|
|
|
|
except Exception:
|
|
|
|
logger.exception("Error while encoding spot for pskreporter")
|
|
|
|
return None
|
2019-09-23 20:45:55 +00:00
|
|
|
|
|
|
|
def getReceiverInformationHeader(self):
|
2020-12-10 00:36:09 +00:00
|
|
|
pm = Config.get()
|
|
|
|
with_antenna = "pskreporter_antenna_information" in pm and pm["pskreporter_antenna_information"] is not None
|
|
|
|
num_fields = 4 if with_antenna else 3
|
|
|
|
length = 12 + num_fields * 8
|
2019-09-23 20:45:55 +00:00
|
|
|
return bytes(
|
2020-12-10 00:36:09 +00:00
|
|
|
# id
|
|
|
|
[0x00, 0x03]
|
|
|
|
# length
|
2021-01-20 16:01:46 +00:00
|
|
|
+ list(length.to_bytes(2, "big"))
|
2019-09-23 20:45:55 +00:00
|
|
|
+ Uploader.receieverDelimiter
|
|
|
|
# number of fields
|
2021-01-20 16:01:46 +00:00
|
|
|
+ list(num_fields.to_bytes(2, "big"))
|
2020-12-10 00:36:09 +00:00
|
|
|
# padding
|
|
|
|
+ [0x00, 0x00]
|
2019-09-23 20:45:55 +00:00
|
|
|
# receiverCallsign
|
|
|
|
+ [0x80, 0x02, 0xFF, 0xFF, 0x00, 0x00, 0x76, 0x8F]
|
|
|
|
# receiverLocator
|
|
|
|
+ [0x80, 0x04, 0xFF, 0xFF, 0x00, 0x00, 0x76, 0x8F]
|
|
|
|
# decodingSoftware
|
|
|
|
+ [0x80, 0x08, 0xFF, 0xFF, 0x00, 0x00, 0x76, 0x8F]
|
2020-12-10 00:36:09 +00:00
|
|
|
# antennaInformation
|
2021-01-20 16:01:46 +00:00
|
|
|
+ ([0x80, 0x09, 0xFF, 0xFF, 0x00, 0x00, 0x76, 0x8F] if with_antenna else [])
|
2019-09-23 20:45:55 +00:00
|
|
|
# padding
|
|
|
|
+ [0x00, 0x00]
|
|
|
|
)
|
|
|
|
|
|
|
|
def getReceiverInformation(self):
|
2020-03-21 21:40:39 +00:00
|
|
|
pm = Config.get()
|
2020-12-10 00:36:09 +00:00
|
|
|
bodyFields = [
|
|
|
|
# callsign
|
|
|
|
pm["pskreporter_callsign"],
|
|
|
|
# locator
|
|
|
|
Locator.fromCoordinates(pm["receiver_gps"]),
|
|
|
|
# decodingSoftware
|
|
|
|
"OpenWebRX " + openwebrx_version,
|
|
|
|
]
|
|
|
|
if "pskreporter_antenna_information" in pm and pm["pskreporter_antenna_information"] is not None:
|
|
|
|
bodyFields += [pm["pskreporter_antenna_information"]]
|
|
|
|
body = [b for s in bodyFields for b in self.encodeString(s)]
|
2019-09-23 20:45:55 +00:00
|
|
|
body = self.pad(body, 4)
|
|
|
|
body = bytes(Uploader.receieverDelimiter + list((len(body) + 4).to_bytes(2, "big")) + body)
|
|
|
|
return body
|
|
|
|
|
|
|
|
def getSenderInformationHeader(self):
|
|
|
|
return bytes(
|
|
|
|
# id, length
|
|
|
|
[0x00, 0x02, 0x00, 0x3C]
|
|
|
|
+ Uploader.senderDelimiter
|
|
|
|
# number of fields
|
|
|
|
+ [0x00, 0x07]
|
|
|
|
# senderCallsign
|
|
|
|
+ [0x80, 0x01, 0xFF, 0xFF, 0x00, 0x00, 0x76, 0x8F]
|
|
|
|
# frequency
|
|
|
|
+ [0x80, 0x05, 0x00, 0x04, 0x00, 0x00, 0x76, 0x8F]
|
|
|
|
# sNR
|
2019-09-23 21:47:12 +00:00
|
|
|
+ [0x80, 0x06, 0x00, 0x01, 0x00, 0x00, 0x76, 0x8F]
|
2019-09-23 20:45:55 +00:00
|
|
|
# mode
|
|
|
|
+ [0x80, 0x0A, 0xFF, 0xFF, 0x00, 0x00, 0x76, 0x8F]
|
|
|
|
# senderLocator
|
|
|
|
+ [0x80, 0x03, 0xFF, 0xFF, 0x00, 0x00, 0x76, 0x8F]
|
|
|
|
# informationSource
|
|
|
|
+ [0x80, 0x0B, 0x00, 0x01, 0x00, 0x00, 0x76, 0x8F]
|
|
|
|
# flowStartSeconds
|
|
|
|
+ [0x00, 0x96, 0x00, 0x04]
|
|
|
|
)
|
|
|
|
|
2019-09-24 22:36:40 +00:00
|
|
|
def getSenderInformation(self, chunk):
|
|
|
|
sInfo = self.padBytes(b"".join(chunk), 4)
|
|
|
|
sInfoLength = len(sInfo) + 4
|
|
|
|
return bytes(Uploader.senderDelimiter) + sInfoLength.to_bytes(2, "big") + sInfo
|
|
|
|
|
2019-09-23 21:47:12 +00:00
|
|
|
def pad(self, b, l):
|
|
|
|
return b + [0x00 for _ in range(0, -1 * len(b) % l)]
|
|
|
|
|
|
|
|
def padBytes(self, b, l):
|
|
|
|
return b + bytes([0x00 for _ in range(0, -1 * len(b) % l)])
|