2014-01-03 16:01:43 -05:00
|
|
|
#!/usr/bin/env python
|
|
|
|
#
|
2013-11-24 23:01:30 -05:00
|
|
|
# This work is licensed under the Creative Commons Attribution-ShareAlike
|
|
|
|
# 3.0 Unported License.To view a copy of this license, visit
|
|
|
|
# http://creativecommons.org/licenses/by-sa/3.0/ or send a letter to
|
|
|
|
# Creative Commons, 444 Castro Street, Suite 900, Mountain View,
|
|
|
|
# California, 94041, USA.
|
|
|
|
|
|
|
|
# This is a sample application that uses the Repeater Call Monitor packets to display events in the IPSC
|
|
|
|
# NOTE: dmrlink.py MUST BE CONFIGURED TO CONNECT AS A "REPEATER CALL MONITOR" PEER!!!
|
|
|
|
# ALSO NOTE, I'M NOT DONE MAKING THIS WORK, SO UNTIL THIS MESSAGE IS GONE, DON'T EXPECT GREAT THINGS.
|
|
|
|
|
|
|
|
from __future__ import print_function
|
|
|
|
from twisted.internet.protocol import DatagramProtocol
|
|
|
|
from twisted.internet import reactor
|
|
|
|
from twisted.internet import task
|
|
|
|
from binascii import b2a_hex as h
|
|
|
|
|
2014-05-18 16:23:19 -04:00
|
|
|
import datetime
|
2013-11-24 23:01:30 -05:00
|
|
|
import binascii
|
|
|
|
import dmrlink
|
2014-04-28 22:42:47 -04:00
|
|
|
from dmrlink import IPSC, NETWORK, networks, get_info, int_id, subscriber_ids, peer_ids, talkgroup_ids, logger
|
2013-11-24 23:01:30 -05:00
|
|
|
|
2014-01-03 16:01:43 -05:00
|
|
|
__author__ = 'Cortney T. Buffington, N0MJS'
|
2014-04-28 23:07:34 -04:00
|
|
|
__copyright__ = 'Copyright (c) 2013, 2014 Cortney T. Buffington, N0MJS and the K0USY Group'
|
2014-01-03 16:01:43 -05:00
|
|
|
__credits__ = 'Adam Fast, KC0YLK, Dave K, and he who wishes not to be named'
|
|
|
|
__license__ = 'Creative Commons Attribution-ShareAlike 3.0 Unported'
|
|
|
|
__version__ = '0.2a'
|
|
|
|
__maintainer__ = 'Cort Buffington, N0MJS'
|
|
|
|
__email__ = 'n0mjs@me.com'
|
|
|
|
__status__ = 'Production'
|
|
|
|
|
2014-04-28 22:52:53 -04:00
|
|
|
try:
|
|
|
|
from ipsc.ipsc_message_types import *
|
|
|
|
except ImportError:
|
|
|
|
sys.exit('IPSC message types file not found or invalid')
|
2013-11-24 23:01:30 -05:00
|
|
|
|
2014-05-27 11:28:39 -04:00
|
|
|
status = True
|
|
|
|
rpt = False
|
|
|
|
nack = False
|
|
|
|
|
2013-11-24 23:01:30 -05:00
|
|
|
class rcmIPSC(IPSC):
|
|
|
|
|
|
|
|
def __init__(self, *args, **kwargs):
|
|
|
|
IPSC.__init__(self, *args, **kwargs)
|
|
|
|
|
|
|
|
#************************************************
|
|
|
|
# CALLBACK FUNCTIONS FOR USER PACKET TYPES
|
|
|
|
#************************************************
|
2014-04-28 23:01:33 -04:00
|
|
|
#
|
2014-05-18 16:28:27 -04:00
|
|
|
def call_mon_status(self, _network, _data):
|
2014-05-27 11:28:39 -04:00
|
|
|
if not status:
|
|
|
|
return
|
2014-05-18 16:23:19 -04:00
|
|
|
_source = _data[1:5]
|
2013-11-26 17:05:21 -05:00
|
|
|
_ipsc_src = _data[5:9]
|
2014-05-18 16:23:19 -04:00
|
|
|
_seq_num = _data[9:13]
|
|
|
|
_ts = _data[13]
|
|
|
|
_status = _data[15] # suspect [14:16] but nothing in leading byte?
|
|
|
|
_rf_src = _data[16:19]
|
|
|
|
_rf_tgt = _data[19:22]
|
|
|
|
_type = _data[22]
|
|
|
|
_prio = _data[23]
|
|
|
|
_sec = _data[24]
|
2013-11-26 17:05:21 -05:00
|
|
|
|
2014-05-18 16:23:19 -04:00
|
|
|
_source = get_info(int_id(_source), peer_ids)
|
2013-12-01 21:59:53 -05:00
|
|
|
_ipsc_src = get_info(int_id(_ipsc_src), peer_ids)
|
2013-11-26 17:05:21 -05:00
|
|
|
_rf_src = get_info(int_id(_rf_src), subscriber_ids)
|
|
|
|
|
2013-12-01 21:59:53 -05:00
|
|
|
if _type == '\x4F' or '\x51':
|
2013-11-26 17:05:21 -05:00
|
|
|
_rf_tgt = get_info(int_id(_rf_tgt), talkgroup_ids)
|
|
|
|
else:
|
|
|
|
_rf_tgt = get_info(int_id(_rf_tgt), subscriber_ids)
|
|
|
|
|
2014-05-18 16:29:01 -04:00
|
|
|
print('Call Monitor - Call Status')
|
2014-05-27 11:28:39 -04:00
|
|
|
print('TIME: ', datetime.datetime.now().strftime("%Y-%m-%d %H:%M:%S"))
|
2014-05-18 16:23:19 -04:00
|
|
|
print('DATA SOURCE: ', _source)
|
2013-11-26 17:05:21 -05:00
|
|
|
print('IPSC: ', _network)
|
2013-12-01 21:59:53 -05:00
|
|
|
print('IPSC Source: ', _ipsc_src)
|
2013-11-26 17:05:21 -05:00
|
|
|
print('Timeslot: ', TS[_ts])
|
2014-05-18 16:23:19 -04:00
|
|
|
try:
|
|
|
|
print('Status: ', STATUS[_status])
|
|
|
|
except KeyError:
|
|
|
|
print('Status (unknown): ', h(status))
|
|
|
|
try:
|
|
|
|
print('Type: ', TYPE[_type])
|
|
|
|
except KeyError:
|
|
|
|
print('Type (unknown): ', h(_type))
|
2013-11-26 17:05:21 -05:00
|
|
|
print('Source Sub: ', _rf_src)
|
|
|
|
print('Target Sub: ', _rf_tgt)
|
|
|
|
print()
|
2014-05-18 16:23:19 -04:00
|
|
|
|
|
|
|
def call_mon_rpt(self, _network, _data):
|
2014-05-27 11:28:39 -04:00
|
|
|
if not rpt:
|
|
|
|
return
|
2014-05-18 17:18:21 -04:00
|
|
|
_source = _data[1:5]
|
|
|
|
_ts1_state = _data[5]
|
|
|
|
_ts2_state = _data[6]
|
2014-05-18 16:23:19 -04:00
|
|
|
|
|
|
|
_source = get_info(int_id(_source), peer_ids)
|
|
|
|
|
|
|
|
print('Call Monitor - Repeater State')
|
2014-05-27 11:28:39 -04:00
|
|
|
print('TIME: ', datetime.datetime.now().strftime("%Y-%m-%d %H:%M:%S"))
|
2014-05-18 16:23:19 -04:00
|
|
|
print('DATA SOURCE: ', _source)
|
2014-05-18 17:18:21 -04:00
|
|
|
|
|
|
|
try:
|
|
|
|
print('TS1 State: ', REPEAT[_ts1_state])
|
|
|
|
except KeyError:
|
|
|
|
print('TS1 State (unknown): ', h(_ts1_state))
|
2014-05-18 16:23:19 -04:00
|
|
|
try:
|
2014-05-18 17:18:21 -04:00
|
|
|
print('TS2 State: ', REPEAT[_ts2_state])
|
2014-05-18 16:23:19 -04:00
|
|
|
except KeyError:
|
2014-05-18 17:18:21 -04:00
|
|
|
print('TS2 State (unknown): ', h(_ts2_state))
|
2014-05-18 16:23:19 -04:00
|
|
|
print()
|
|
|
|
|
|
|
|
def call_mon_nack(self, _network, _data):
|
2014-05-27 11:28:39 -04:00
|
|
|
if not nack:
|
|
|
|
return
|
2014-05-18 16:23:19 -04:00
|
|
|
_source = _data[1:5]
|
|
|
|
_nack = _data[5]
|
2013-12-01 21:59:53 -05:00
|
|
|
|
2014-05-18 16:23:19 -04:00
|
|
|
_source = get_info(int_id(_source), peer_ids)
|
|
|
|
|
2014-05-18 16:39:06 -04:00
|
|
|
print('Call Monitor - Transmission NACK')
|
2014-05-27 11:28:39 -04:00
|
|
|
print('TIME: ', datetime.datetime.now().strftime("%Y-%m-%d %H:%M:%S"))
|
2014-05-18 16:23:19 -04:00
|
|
|
print('DATA SOURCE: ', _source)
|
|
|
|
try:
|
2014-05-18 16:25:22 -04:00
|
|
|
print('NACK Cause: ', NACK[_nack])
|
2014-05-18 16:23:19 -04:00
|
|
|
except KeyError:
|
|
|
|
print('NACK Cause (unknown): ', h(_nack))
|
|
|
|
print()
|
|
|
|
|
2013-12-01 21:59:53 -05:00
|
|
|
def repeater_wake_up(self, _network, _data):
|
|
|
|
_source = _data[1:5]
|
|
|
|
_source_dec = int_id(_source)
|
|
|
|
_source_name = get_info(_source_dec, peer_ids)
|
2014-05-18 16:23:19 -04:00
|
|
|
#print('({}) Repeater Wake-Up Packet Received: {} ({})' .format(_network, _source_name, _source_dec))
|
2013-11-24 23:01:30 -05:00
|
|
|
|
2014-04-28 22:42:47 -04:00
|
|
|
|
2013-11-24 23:01:30 -05:00
|
|
|
if __name__ == '__main__':
|
2014-04-28 22:42:47 -04:00
|
|
|
logger.info('DMRlink \'rcm.py\' (c) 2013, 2014 N0MJS & the K0USY Group - SYSTEM STARTING...')
|
2013-11-24 23:01:30 -05:00
|
|
|
for ipsc_network in NETWORK:
|
2014-04-28 22:42:47 -04:00
|
|
|
if NETWORK[ipsc_network]['LOCAL']['ENABLED']:
|
|
|
|
networks[ipsc_network] = rcmIPSC(ipsc_network)
|
2013-11-24 23:01:30 -05:00
|
|
|
reactor.listenUDP(NETWORK[ipsc_network]['LOCAL']['PORT'], networks[ipsc_network])
|
|
|
|
reactor.run()
|