2013-08-02 16:31:55 -04:00
|
|
|
# Copyright (c) 2013 Cortney T. Buffington, N0MJS n0mjs@me.com
|
|
|
|
#
|
|
|
|
# This work is licensed under the Creative Commons Attribution-ShareAlike
|
|
|
|
# 3.0 Unported License.To view a copy of this license, visit
|
|
|
|
# http://creativecommons.org/licenses/by-sa/3.0/ or send a letter to
|
|
|
|
# Creative Commons, 444 Castro Street, Suite 900, Mountain View,
|
|
|
|
# California, 94041, USA.
|
|
|
|
|
2013-06-27 17:15:54 -04:00
|
|
|
from __future__ import print_function
|
|
|
|
from twisted.internet.protocol import DatagramProtocol
|
|
|
|
from twisted.internet import reactor
|
|
|
|
from twisted.internet import task
|
2013-07-11 20:45:09 -04:00
|
|
|
import sys
|
2013-06-27 19:17:52 -04:00
|
|
|
import argparse
|
2013-06-27 17:15:54 -04:00
|
|
|
import binascii
|
|
|
|
import hmac
|
|
|
|
import hashlib
|
2013-07-15 13:04:48 -04:00
|
|
|
import socket
|
2013-08-06 23:33:04 -04:00
|
|
|
|
2013-07-11 20:45:09 -04:00
|
|
|
#from logging.config import dictConfig
|
|
|
|
#import logging
|
|
|
|
|
|
|
|
|
|
|
|
#************************************************
|
|
|
|
# IMPORTING OTHER FILES - '#include'
|
|
|
|
#************************************************
|
|
|
|
|
|
|
|
# Import system logger configuration
|
2013-07-20 09:28:52 -04:00
|
|
|
#
|
2013-07-11 20:45:09 -04:00
|
|
|
try:
|
|
|
|
from ipsc_logger import logger
|
|
|
|
except ImportError:
|
|
|
|
sys.exit('System logger configuraiton not found or invalid')
|
|
|
|
|
|
|
|
# Import configuration and informational data structures
|
2013-07-20 09:28:52 -04:00
|
|
|
#
|
2013-06-29 00:38:28 -04:00
|
|
|
try:
|
|
|
|
from my_ipsc_config import NETWORK
|
|
|
|
except ImportError:
|
2013-07-11 20:45:09 -04:00
|
|
|
sys.exit('Configuration file not found, or not valid formatting')
|
|
|
|
|
|
|
|
# Import IPSC message types and version information
|
2013-07-20 09:28:52 -04:00
|
|
|
#
|
2013-07-11 20:45:09 -04:00
|
|
|
try:
|
|
|
|
from ipsc_message_types import *
|
|
|
|
except ImportError:
|
|
|
|
sys.exit('IPSC message types file not found or invalid')
|
|
|
|
|
|
|
|
# Import IPSC flag mask values
|
2013-07-20 09:28:52 -04:00
|
|
|
#
|
2013-07-11 20:45:09 -04:00
|
|
|
try:
|
|
|
|
from ipsc_mask import *
|
|
|
|
except ImportError:
|
|
|
|
sys.exit('IPSC mask values file not found or invalid')
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
#************************************************
|
|
|
|
# GLOBALLY SCOPED FUNCTIONS
|
|
|
|
#************************************************
|
2013-06-29 00:36:39 -04:00
|
|
|
|
2013-07-20 09:28:52 -04:00
|
|
|
|
2013-07-29 14:38:59 -04:00
|
|
|
# Remove the hash from a paket and return the payload
|
|
|
|
#
|
|
|
|
def strip_hash(_data):
|
|
|
|
return _data[:-10]
|
|
|
|
|
2013-08-06 23:33:04 -04:00
|
|
|
|
2013-07-29 22:12:12 -04:00
|
|
|
# Determine if the provided peer ID is valid for the provided network
|
2013-07-29 22:06:25 -04:00
|
|
|
#
|
2013-08-06 23:33:04 -04:00
|
|
|
def valid_peer(_peer_list, _peerid):
|
|
|
|
if _peerid in _peer_list:
|
|
|
|
return True
|
|
|
|
return False
|
|
|
|
|
2013-07-29 14:38:59 -04:00
|
|
|
|
2013-07-29 22:12:12 -04:00
|
|
|
# Determine if the provided master ID is valid for the provided network
|
|
|
|
#
|
|
|
|
def valid_master(_network, _peerid):
|
2013-07-30 11:52:10 -04:00
|
|
|
if NETWORK[_network]['MASTER']['RADIO_ID'] == _peerid:
|
|
|
|
return True
|
|
|
|
else:
|
|
|
|
return False
|
2013-07-29 22:12:12 -04:00
|
|
|
|
2013-08-06 23:33:04 -04:00
|
|
|
|
2013-07-20 09:28:52 -04:00
|
|
|
# Take a packet to be SENT, calcualte auth hash and return the whole thing
|
|
|
|
#
|
2013-07-11 20:45:09 -04:00
|
|
|
def hashed_packet(_key, _data):
|
2013-07-29 21:51:21 -04:00
|
|
|
hash = binascii.a2b_hex((hmac.new(_key,_data,hashlib.sha1)).hexdigest()[:20])
|
2013-07-29 14:38:59 -04:00
|
|
|
return (_data + hash)
|
2013-07-20 09:28:52 -04:00
|
|
|
|
|
|
|
|
|
|
|
# Take a RECEIVED packet, calculate the auth hash and verify authenticity
|
|
|
|
#
|
2013-07-11 20:45:09 -04:00
|
|
|
def validate_auth(_key, _data):
|
2013-07-29 21:51:21 -04:00
|
|
|
_log = logger.debug
|
2013-07-29 14:23:37 -04:00
|
|
|
_payload = _data[:-10]
|
|
|
|
_hash = _data[-10:]
|
2013-07-29 21:51:21 -04:00
|
|
|
_chk_hash = binascii.a2b_hex((hmac.new(_key,_payload,hashlib.sha1)).hexdigest()[:20])
|
2013-07-29 14:23:37 -04:00
|
|
|
|
|
|
|
if _chk_hash == _hash:
|
2013-07-29 21:51:21 -04:00
|
|
|
_log(' AUTH: Valid - Payload: %s, Hash: %s', binascii.b2a_hex(_payload), binascii.b2a_hex(_hash))
|
2013-07-29 14:23:37 -04:00
|
|
|
return True
|
|
|
|
else:
|
2013-07-29 21:51:21 -04:00
|
|
|
_log(' AUTH: Invalid - Payload: %s, Hash: %s', binascii.b2a_hex(_payload), binascii.b2a_hex(_hash))
|
2013-07-29 14:23:37 -04:00
|
|
|
return False
|
2013-07-11 20:45:09 -04:00
|
|
|
|
2013-08-27 11:23:53 -04:00
|
|
|
|
2013-08-08 22:48:28 -04:00
|
|
|
# Forward Group Voice Packet
|
2013-08-27 11:23:53 -04:00
|
|
|
#
|
2013-08-08 22:48:28 -04:00
|
|
|
def fwd_group_voice(_network, _data):
|
|
|
|
_src_group = _data[9:12]
|
|
|
|
_src_ipsc = _data[1:5]
|
2013-08-25 17:13:23 -04:00
|
|
|
|
2013-08-23 08:52:50 -04:00
|
|
|
for source in NETWORK[_network]['RULES']['GROUP_VOICE']:
|
2013-08-08 22:48:28 -04:00
|
|
|
if source['SRC_GROUP'] == _src_group:
|
2013-08-26 09:16:54 -04:00
|
|
|
_target = source['DST_NET']
|
|
|
|
_target_sock = NETWORK[_target]['MASTER']['IP'], NETWORK[_target]['MASTER']['PORT']
|
|
|
|
_data = _data.replace(_src_ipsc, NETWORK[_target]['LOCAL']['RADIO_ID'])
|
2013-08-25 17:13:23 -04:00
|
|
|
_data = _data.replace(_src_group, source['DST_GROUP'])
|
2013-08-26 09:16:54 -04:00
|
|
|
_data = hashed_packet(NETWORK[_target]['LOCAL']['AUTH_KEY'], _data)
|
|
|
|
networks[_target].transport.write(_data, (_target_sock))
|
|
|
|
|
2013-08-06 23:33:04 -04:00
|
|
|
|
2013-07-29 14:38:59 -04:00
|
|
|
# Take a recieved peer list and the network it belongs to, process and populate the
|
|
|
|
# data structure in my_ipsc_config with the results.
|
|
|
|
#
|
2013-08-07 15:15:53 -04:00
|
|
|
def process_peer_list(_data, _network, _peer_list):
|
2013-07-29 21:51:21 -04:00
|
|
|
_log = logger.debug
|
2013-07-28 23:22:04 -04:00
|
|
|
|
|
|
|
NETWORK[_network]['MASTER']['STATUS']['PEER-LIST'] = True
|
|
|
|
_num_peers = int(str(int(binascii.b2a_hex(_data[5:7]), 16))[1:])
|
|
|
|
NETWORK[_network]['LOCAL']['NUM_PEERS'] = _num_peers
|
|
|
|
|
|
|
|
_log('<<- (%s) The Peer List has been Received from Master\n%s \
|
|
|
|
There are %s peers in this IPSC Network', _network, (' '*(len(_network)+7)), _num_peers)
|
|
|
|
|
|
|
|
for i in range(7, (_num_peers*11)+7, 11):
|
|
|
|
hex_radio_id = (_data[i:i+4])
|
|
|
|
hex_address = (_data[i+4:i+8])
|
|
|
|
hex_port = (_data[i+8:i+10])
|
|
|
|
hex_mode = (_data[i+10:i+11])
|
2013-08-23 08:52:50 -04:00
|
|
|
decoded_mode = mode_decode(hex_mode, _data)
|
2013-08-06 23:33:04 -04:00
|
|
|
|
2013-08-07 15:15:53 -04:00
|
|
|
if hex_radio_id not in _peer_list:
|
2013-08-06 23:35:31 -04:00
|
|
|
_peer_list.append(hex_radio_id)
|
2013-08-06 23:33:04 -04:00
|
|
|
NETWORK[_network]['PEERS'].append({
|
|
|
|
'RADIO_ID': hex_radio_id,
|
|
|
|
'IP': socket.inet_ntoa(hex_address),
|
|
|
|
'PORT': int(binascii.b2a_hex(hex_port), 16),
|
|
|
|
'MODE': hex_mode,
|
|
|
|
'PEER_OPER': decoded_mode[0],
|
|
|
|
'PEER_MODE': decoded_mode[1],
|
|
|
|
'TS1_LINK': decoded_mode[2],
|
|
|
|
'TS2_LINK': decoded_mode[3],
|
|
|
|
'STATUS': {'CONNECTED': False, 'KEEP_ALIVES_SENT': 0, 'KEEP_ALIVES_MISSED': 0, 'KEEP_ALIVES_OUTSTANDING': 0}
|
2013-08-07 22:46:51 -04:00
|
|
|
})
|
2013-08-06 23:35:31 -04:00
|
|
|
return _peer_list
|
2013-08-06 23:33:04 -04:00
|
|
|
|
2013-07-28 23:22:04 -04:00
|
|
|
|
2013-07-29 14:38:59 -04:00
|
|
|
# Given a mode byte, decode the functions and return a tuple of results
|
|
|
|
#
|
2013-08-23 08:52:50 -04:00
|
|
|
def mode_decode(_mode, _data):
|
2013-07-29 14:38:59 -04:00
|
|
|
_log = logger.debug
|
2013-07-15 13:04:48 -04:00
|
|
|
_mode = int(binascii.b2a_hex(_mode), 16)
|
|
|
|
link_op = _mode & PEER_OP_MSK
|
|
|
|
link_mode = _mode & PEER_MODE_MSK
|
|
|
|
ts1 = _mode & IPSC_TS1_MSK
|
2013-07-30 12:50:29 -04:00
|
|
|
ts2 = _mode & IPSC_TS2_MSK
|
2013-07-28 23:22:04 -04:00
|
|
|
# Determine whether or not the peer is operational
|
|
|
|
if link_op == 0b01000000:
|
|
|
|
_peer_op = True
|
2013-07-15 13:04:48 -04:00
|
|
|
elif link_op == 0b00000000:
|
2013-07-28 23:22:04 -04:00
|
|
|
_peer_op = False
|
2013-07-15 13:04:48 -04:00
|
|
|
else:
|
2013-07-30 12:50:29 -04:00
|
|
|
_peer_op = False
|
2013-07-28 23:22:04 -04:00
|
|
|
# Determine the operational mode of the peer
|
|
|
|
if link_mode == 0b00000000:
|
|
|
|
_peer_mode = 'NO_RADIO'
|
2013-07-15 13:04:48 -04:00
|
|
|
elif link_mode == 0b00010000:
|
2013-07-28 23:22:04 -04:00
|
|
|
_peer_mode = 'ANALOG'
|
2013-07-15 13:04:48 -04:00
|
|
|
elif link_mode == 0b00100000:
|
2013-07-28 23:22:04 -04:00
|
|
|
_peer_mode = 'DIGITAL'
|
2013-07-15 13:04:48 -04:00
|
|
|
else:
|
2013-07-29 14:38:59 -04:00
|
|
|
_peer_node = 'NO_RADIO'
|
2013-07-28 23:22:04 -04:00
|
|
|
# Determine whether or not timeslot 1 is linked
|
2013-07-15 13:04:48 -04:00
|
|
|
if ts1 == 0b00001000:
|
2013-07-28 23:22:04 -04:00
|
|
|
_ts1 = True
|
|
|
|
else:
|
|
|
|
_ts1 = False
|
|
|
|
# Determine whether or not timeslot 2 is linked
|
2013-07-15 13:04:48 -04:00
|
|
|
if ts2 == 0b00000010:
|
2013-07-28 23:22:04 -04:00
|
|
|
_ts2 = True
|
|
|
|
else:
|
2013-07-30 12:50:29 -04:00
|
|
|
_ts2 = False
|
2013-07-28 23:22:04 -04:00
|
|
|
# Return a tuple with the decoded values
|
|
|
|
return _peer_op, _peer_mode, _ts1, _ts2
|
2013-07-20 09:28:52 -04:00
|
|
|
|
|
|
|
|
|
|
|
# Gratuituous print-out of the peer list.. Pretty much debug stuff.
|
|
|
|
#
|
2013-07-28 23:33:14 -04:00
|
|
|
def print_peer_list(_network):
|
2013-07-22 22:44:53 -04:00
|
|
|
_log = logger.info
|
2013-07-31 13:33:31 -04:00
|
|
|
# os.system('clear')
|
2013-07-28 23:33:14 -04:00
|
|
|
if not NETWORK[_network]['PEERS']:
|
2013-08-07 22:46:51 -04:00
|
|
|
print('No peer list for: {}' .format(_network))
|
2013-07-28 23:33:14 -04:00
|
|
|
return
|
|
|
|
|
2013-07-31 13:33:31 -04:00
|
|
|
print('Peer List for: %s' % _network)
|
|
|
|
for dictionary in NETWORK[_network]['PEERS']:
|
2013-07-31 21:56:49 -04:00
|
|
|
if dictionary['RADIO_ID'] == NETWORK[_network]['LOCAL']['RADIO_ID']:
|
|
|
|
me = '(self)'
|
|
|
|
else:
|
|
|
|
me = ''
|
|
|
|
print('\tRADIO ID: {} {}' .format(int(binascii.b2a_hex(dictionary['RADIO_ID']), 16), me))
|
2013-07-31 13:33:31 -04:00
|
|
|
print('\t\tIP Address: {}:{}' .format(dictionary['IP'], dictionary['PORT']))
|
|
|
|
print('\t\tOperational: {}, Mode: {}, TS1 Link: {}, TS2 Link: {}' .format(dictionary['PEER_OPER'], dictionary['PEER_MODE'], dictionary['TS1_LINK'], dictionary['TS2_LINK']))
|
2013-07-31 14:58:53 -04:00
|
|
|
print('\t\tStatus: {}, KeepAlives Sent: {}, KeepAlives Outstanding: {}, KeepAlives Missed: {}' .format(dictionary['STATUS']['CONNECTED'], dictionary['STATUS']['KEEP_ALIVES_SENT'], dictionary['STATUS']['KEEP_ALIVES_OUTSTANDING'], dictionary['STATUS']['KEEP_ALIVES_MISSED']))
|
2013-07-31 13:33:31 -04:00
|
|
|
print('')
|
2013-07-11 20:45:09 -04:00
|
|
|
|
|
|
|
|
2013-07-20 09:28:52 -04:00
|
|
|
|
|
|
|
#************************************************
|
|
|
|
#******** ***********
|
2013-07-20 16:41:21 -04:00
|
|
|
#******** IPSC Network 'Engine' ***********
|
2013-07-20 09:28:52 -04:00
|
|
|
#******** ***********
|
|
|
|
#************************************************
|
|
|
|
|
2013-07-11 20:45:09 -04:00
|
|
|
#************************************************
|
2013-07-20 09:28:52 -04:00
|
|
|
# INITIAL SETUP of IPSC INSTANCE
|
2013-07-11 20:45:09 -04:00
|
|
|
#************************************************
|
2013-06-27 17:15:54 -04:00
|
|
|
|
|
|
|
class IPSC(DatagramProtocol):
|
|
|
|
|
2013-07-20 09:28:52 -04:00
|
|
|
# Modify the initializer to set up our environment and build the packets
|
|
|
|
# we need to maitain connections
|
|
|
|
#
|
2013-06-27 17:15:54 -04:00
|
|
|
def __init__(self, *args, **kwargs):
|
|
|
|
if len(args) == 1:
|
2013-07-20 16:41:21 -04:00
|
|
|
# Housekeeping: create references to the configuration and status data for this IPSC instance.
|
2013-07-28 16:53:56 -04:00
|
|
|
# Some configuration objects that are used frequently and have lengthy names are shortened
|
|
|
|
# such as (self._master_sock) expands to (self._config['MASTER']['IP'], self._config['MASTER']['PORT'])
|
2013-07-20 16:41:21 -04:00
|
|
|
#
|
2013-07-28 17:22:25 -04:00
|
|
|
self._network = args[0]
|
|
|
|
self._config = NETWORK[self._network]
|
2013-07-28 16:53:56 -04:00
|
|
|
#
|
|
|
|
self._local = self._config['LOCAL']
|
|
|
|
self._local_stat = self._local['STATUS']
|
|
|
|
self._local_id = self._local['RADIO_ID']
|
|
|
|
#
|
|
|
|
self._master = self._config['MASTER']
|
|
|
|
self._master_stat = self._master['STATUS']
|
|
|
|
self._master_sock = self._master['IP'], self._master['PORT']
|
|
|
|
#
|
|
|
|
self._peers = self._config['PEERS']
|
2013-08-06 23:33:04 -04:00
|
|
|
#
|
2013-08-08 22:48:28 -04:00
|
|
|
# This is a regular list to store peers for the IPSC. At times, parsing a simple list is much less
|
|
|
|
# Spendy than iterating a list of dictionaries... Maybe I'll find a better way in the future. Also
|
|
|
|
# We have to know when we have a new peer list, so a variable to indicate we do (or don't)
|
|
|
|
#
|
2013-08-06 23:33:04 -04:00
|
|
|
self._peer_list = []
|
2013-08-08 22:48:28 -04:00
|
|
|
self._peer_list_new = False
|
2013-07-28 16:53:56 -04:00
|
|
|
|
2013-06-27 17:15:54 -04:00
|
|
|
args = ()
|
2013-07-20 16:41:21 -04:00
|
|
|
|
|
|
|
# Packet 'constructors' - builds the necessary control packets for this IPSC instance
|
|
|
|
#
|
2013-07-28 16:53:56 -04:00
|
|
|
self.TS_FLAGS = (self._local['MODE'] + self._local['FLAGS'])
|
|
|
|
self.MASTER_REG_REQ_PKT = (MASTER_REG_REQ + self._local_id + self.TS_FLAGS + IPSC_VER)
|
|
|
|
self.MASTER_ALIVE_PKT = (MASTER_ALIVE_REQ + self._local_id + self.TS_FLAGS + IPSC_VER)
|
|
|
|
self.PEER_LIST_REQ_PKT = (PEER_LIST_REQ + self._local_id)
|
|
|
|
self.PEER_REG_REQ_PKT = (PEER_REG_REQ + self._local_id + IPSC_VER)
|
|
|
|
self.PEER_REG_REPLY_PKT = (PEER_REG_REPLY + self._local_id + IPSC_VER)
|
|
|
|
self.PEER_ALIVE_REQ_PKT = (PEER_ALIVE_REQ + self._local_id + self.TS_FLAGS)
|
|
|
|
self.PEER_ALIVE_REPLY_PKT = (PEER_ALIVE_REPLY + self._local_id + self.TS_FLAGS)
|
2013-08-08 22:48:28 -04:00
|
|
|
|
2013-06-27 17:15:54 -04:00
|
|
|
else:
|
2013-07-20 16:41:21 -04:00
|
|
|
# If we didn't get called correctly, log it!
|
|
|
|
#
|
2013-07-28 17:22:25 -04:00
|
|
|
logger.error('(%s) Unexpected arguments found.', self._network)
|
2013-07-15 13:04:48 -04:00
|
|
|
|
2013-07-20 09:28:52 -04:00
|
|
|
# This is called by REACTOR when it starts, We use it to set up the timed
|
|
|
|
# loop for each instance of the IPSC engine
|
|
|
|
#
|
2013-06-27 17:15:54 -04:00
|
|
|
def startProtocol(self):
|
2013-07-20 16:41:21 -04:00
|
|
|
# Timed loop for IPSC connection establishment and maintenance
|
|
|
|
# Others could be added later for things like updating a Web
|
|
|
|
# page, etc....
|
|
|
|
#
|
2013-07-15 13:04:48 -04:00
|
|
|
self._call = task.LoopingCall(self.timed_loop)
|
2013-07-28 16:53:56 -04:00
|
|
|
self._loop = self._call.start(self._local['ALIVE_TIMER'])
|
2013-06-27 17:15:54 -04:00
|
|
|
|
2013-07-20 09:28:52 -04:00
|
|
|
|
|
|
|
#************************************************
|
|
|
|
# FUNCTIONS FOR IPSC Network Engine
|
|
|
|
#************************************************
|
|
|
|
|
|
|
|
#************************************************
|
|
|
|
# TIMED LOOP - MY CONNECTION MAINTENANCE
|
|
|
|
#************************************************
|
|
|
|
|
2013-08-08 22:48:28 -04:00
|
|
|
def timed_loop(self):
|
2013-07-28 17:22:25 -04:00
|
|
|
print_peer_list(self._network)
|
2013-07-20 09:28:52 -04:00
|
|
|
|
2013-08-08 22:48:28 -04:00
|
|
|
if (self._master_stat['CONNECTED'] == False):
|
2013-07-28 16:53:56 -04:00
|
|
|
reg_packet = hashed_packet(self._local['AUTH_KEY'], self.MASTER_REG_REQ_PKT)
|
|
|
|
self.transport.write(reg_packet, (self._master_sock))
|
2013-07-20 09:28:52 -04:00
|
|
|
|
2013-08-08 22:48:28 -04:00
|
|
|
elif (self._master_stat['CONNECTED'] == True):
|
2013-07-28 16:53:56 -04:00
|
|
|
master_alive_packet = hashed_packet(self._local['AUTH_KEY'], self.MASTER_ALIVE_PKT)
|
|
|
|
self.transport.write(master_alive_packet, (self._master_sock))
|
2013-07-20 09:28:52 -04:00
|
|
|
|
2013-07-28 16:53:56 -04:00
|
|
|
if (self._master_stat['KEEP_ALIVES_OUTSTANDING']) > 0:
|
|
|
|
self._master_stat['KEEP_ALIVES_MISSED'] += 1
|
2013-07-20 09:28:52 -04:00
|
|
|
|
2013-07-28 16:53:56 -04:00
|
|
|
if self._master_stat['KEEP_ALIVES_OUTSTANDING'] >= self._local['MAX_MISSED']:
|
|
|
|
self._master_stat['CONNECTED'] = False
|
2013-07-20 09:28:52 -04:00
|
|
|
logger.error('Maximum Master Keep-Alives Missed -- De-registering the Master')
|
2013-08-01 16:09:20 -04:00
|
|
|
|
|
|
|
self._master_stat['KEEP_ALIVES_SENT'] += 1
|
|
|
|
self._master_stat['KEEP_ALIVES_OUTSTANDING'] += 1
|
2013-07-20 09:28:52 -04:00
|
|
|
|
|
|
|
else:
|
2013-07-28 17:22:25 -04:00
|
|
|
logger.error('->> (%s) Master in UNKOWN STATE:%s:%s', self._network, self._master_sock)
|
2013-07-20 09:28:52 -04:00
|
|
|
|
2013-08-08 22:48:28 -04:00
|
|
|
if ((self._master_stat['CONNECTED'] == True) and (self._master_stat['PEER-LIST'] == False)):
|
2013-07-28 16:53:56 -04:00
|
|
|
peer_list_req_packet = hashed_packet(self._local['AUTH_KEY'], self.PEER_LIST_REQ_PKT)
|
|
|
|
self.transport.write(peer_list_req_packet, (self._master_sock))
|
2013-07-20 09:28:52 -04:00
|
|
|
|
2013-08-08 22:48:28 -04:00
|
|
|
if (self._master_stat['PEER-LIST'] == True):
|
2013-07-28 16:53:56 -04:00
|
|
|
for peer in (self._peers):
|
|
|
|
if (peer['RADIO_ID'] == self._local_id): # We are in the peer-list, but don't need to talk to ourselves
|
2013-07-20 09:28:52 -04:00
|
|
|
continue
|
2013-07-26 18:29:47 -04:00
|
|
|
if peer['STATUS']['CONNECTED'] == False:
|
2013-07-28 16:53:56 -04:00
|
|
|
peer_reg_packet = hashed_packet(self._local['AUTH_KEY'], self.PEER_REG_REQ_PKT)
|
2013-07-20 09:28:52 -04:00
|
|
|
self.transport.write(peer_reg_packet, (peer['IP'], peer['PORT']))
|
2013-07-26 18:29:47 -04:00
|
|
|
elif peer['STATUS']['CONNECTED'] == True:
|
2013-07-28 16:53:56 -04:00
|
|
|
peer_alive_req_packet = hashed_packet(self._local['AUTH_KEY'], self.PEER_ALIVE_REQ_PKT)
|
2013-07-20 16:41:21 -04:00
|
|
|
self.transport.write(peer_alive_req_packet, (peer['IP'], peer['PORT']))
|
2013-07-26 18:29:47 -04:00
|
|
|
|
|
|
|
if peer['STATUS']['KEEP_ALIVES_OUTSTANDING'] > 0:
|
|
|
|
peer['STATUS']['KEEP_ALIVES_MISSED'] += 1
|
|
|
|
|
2013-07-28 16:53:56 -04:00
|
|
|
if peer['STATUS']['KEEP_ALIVES_OUTSTANDING'] >= self._local['MAX_MISSED']:
|
2013-07-26 18:29:47 -04:00
|
|
|
peer['STATUS']['CONNECTED'] = False
|
2013-08-08 22:48:28 -04:00
|
|
|
self._peer_list.remove(peer['RADIO_ID']) # Remove the peer from the simple list FIRST
|
|
|
|
self._peers.remove(peer) # Becuase once it's out of the dictionary, you can't use it for anything else.
|
2013-08-07 15:15:53 -04:00
|
|
|
logger.error('Maximum Peer Keep-Alives Missed -- De-registering the Peer: %s', peer)
|
2013-08-01 16:09:20 -04:00
|
|
|
|
|
|
|
peer['STATUS']['KEEP_ALIVES_SENT'] += 1
|
|
|
|
peer['STATUS']['KEEP_ALIVES_OUTSTANDING'] += 1
|
2013-07-20 09:28:52 -04:00
|
|
|
|
|
|
|
|
2013-07-15 13:04:48 -04:00
|
|
|
|
2013-07-20 09:28:52 -04:00
|
|
|
#************************************************
|
|
|
|
# RECEIVED DATAGRAM - ACT IMMEDIATELY!!!
|
|
|
|
#************************************************
|
|
|
|
|
2013-08-08 22:48:28 -04:00
|
|
|
# Actions for recieved packets by type: Call a function or process here...
|
2013-07-20 09:28:52 -04:00
|
|
|
#
|
2013-06-27 17:15:54 -04:00
|
|
|
def datagramReceived(self, data, (host, port)):
|
2013-07-15 13:04:48 -04:00
|
|
|
_packettype = data[0:1]
|
|
|
|
_peerid = data[1:5]
|
2013-07-28 17:22:25 -04:00
|
|
|
_dec_peerid = int(binascii.b2a_hex(_peerid), 16)
|
2013-07-29 14:23:37 -04:00
|
|
|
|
2013-08-08 22:48:28 -04:00
|
|
|
# First action: if Authentication is active, authenticate the packet
|
|
|
|
#
|
2013-07-31 13:33:31 -04:00
|
|
|
if bool(self._local['AUTH_KEY']) == True:
|
|
|
|
if validate_auth(self._local['AUTH_KEY'], data) == False:
|
|
|
|
logger.warning('(%s) AuthError: IPSC packet failed authentication. Type %s: Peer ID: %s', self._network, binascii.b2a_hex(_packettype), _dec_peerid)
|
|
|
|
return
|
2013-08-08 22:48:28 -04:00
|
|
|
data = strip_hash(data)
|
2013-06-29 00:36:39 -04:00
|
|
|
|
2013-08-08 22:48:28 -04:00
|
|
|
# Packets generated by "users" that are the most common should come first for efficiency.
|
|
|
|
#
|
2013-07-31 21:46:03 -04:00
|
|
|
if (_packettype == GROUP_VOICE):
|
2013-08-06 23:33:04 -04:00
|
|
|
if not(valid_master(self._network, _peerid) == False or valid_peer(self._peer_list, _peerid) == False):
|
2013-07-31 21:46:03 -04:00
|
|
|
logger.warning('(%s) PeerError: Peer not in peer-list: %s', self._network, _dec_peerid)
|
|
|
|
return
|
2013-08-08 22:48:28 -04:00
|
|
|
fwd_group_voice(self._network, data)
|
2013-07-31 21:46:03 -04:00
|
|
|
|
2013-08-08 22:48:28 -04:00
|
|
|
# IPSC keep alives, master and peer, come next in processing priority
|
|
|
|
#
|
2013-07-31 21:46:03 -04:00
|
|
|
elif (_packettype == PEER_ALIVE_REQ):
|
2013-08-06 23:33:04 -04:00
|
|
|
if valid_peer(self._peer_list, _peerid) == False:
|
|
|
|
logger.warning('(%s) PeerError: Peer %s not in peer-list: %s', self._network, _dec_peerid, self._peer_list)
|
2013-07-30 12:50:29 -04:00
|
|
|
return
|
2013-07-28 16:53:56 -04:00
|
|
|
peer_alive_reply_packet = hashed_packet(self._local['AUTH_KEY'], self.PEER_ALIVE_REPLY_PKT)
|
2013-07-11 20:45:09 -04:00
|
|
|
self.transport.write(peer_alive_reply_packet, (host, port))
|
|
|
|
|
|
|
|
elif (_packettype == MASTER_ALIVE_REPLY):
|
2013-07-30 12:50:29 -04:00
|
|
|
if valid_master(self._network, _peerid) == False:
|
2013-08-06 23:33:04 -04:00
|
|
|
logger.warning('(%s) PeerError: Peer %s not in peer-list: %s', self._network, _dec_peerid, self._peer_list)
|
2013-07-30 12:50:29 -04:00
|
|
|
return
|
|
|
|
|
2013-07-28 17:22:25 -04:00
|
|
|
logger.debug('<<- (%s) Master Keep-alive Reply From: %s \t@ IP: %s:%s', self._network, _dec_peerid, host, port)
|
2013-08-01 16:09:20 -04:00
|
|
|
self._master_stat['KEEP_ALIVES_OUTSTANDING'] = 0
|
2013-07-11 20:45:09 -04:00
|
|
|
|
|
|
|
elif (_packettype == PEER_ALIVE_REPLY):
|
2013-08-01 16:09:20 -04:00
|
|
|
for peer in self._config['PEERS']:
|
|
|
|
if peer['RADIO_ID'] == _peerid:
|
|
|
|
peer['STATUS']['KEEP_ALIVES_OUTSTANDING'] = 0
|
2013-08-08 22:48:28 -04:00
|
|
|
|
|
|
|
# Registration requests and replies are infrequent, but important. Peer lists can go here too as a part
|
|
|
|
# of the registration process.
|
|
|
|
#
|
2013-07-11 20:45:09 -04:00
|
|
|
elif (_packettype == MASTER_REG_REQ):
|
2013-07-28 23:22:04 -04:00
|
|
|
logger.debug('<<- (%s) Master Registration Packet Recieved', self._network)
|
2013-06-29 00:36:39 -04:00
|
|
|
|
2013-06-27 17:15:54 -04:00
|
|
|
elif (_packettype == MASTER_REG_REPLY):
|
2013-07-30 11:52:10 -04:00
|
|
|
self._master['RADIO_ID'] = _peerid
|
2013-07-28 16:53:56 -04:00
|
|
|
self._master_stat['CONNECTED'] = True
|
|
|
|
self._master_stat['KEEP_ALIVES_OUTSTANDING'] = 0
|
2013-06-29 00:36:39 -04:00
|
|
|
|
2013-07-15 13:04:48 -04:00
|
|
|
elif (_packettype == PEER_REG_REQ):
|
2013-07-28 16:53:56 -04:00
|
|
|
peer_reg_reply_packet = hashed_packet(self._local['AUTH_KEY'], self.PEER_REG_REPLY_PKT)
|
2013-06-27 17:15:54 -04:00
|
|
|
self.transport.write(peer_reg_reply_packet, (host, port))
|
2013-07-15 13:04:48 -04:00
|
|
|
|
|
|
|
elif (_packettype == PEER_REG_REPLY):
|
2013-07-26 18:29:47 -04:00
|
|
|
for peer in self._config['PEERS']:
|
|
|
|
if peer['RADIO_ID'] == _peerid:
|
|
|
|
peer['STATUS']['CONNECTED'] = True
|
2013-06-29 00:36:39 -04:00
|
|
|
|
2013-06-27 17:15:54 -04:00
|
|
|
elif (_packettype == PEER_LIST_REPLY):
|
2013-08-07 15:15:53 -04:00
|
|
|
self._peer_list = process_peer_list(data, self._network, self._peer_list)
|
2013-08-08 22:48:28 -04:00
|
|
|
|
|
|
|
# Other "user" related packet types that we don't do much or anything with yet
|
|
|
|
#
|
2013-07-11 20:45:09 -04:00
|
|
|
elif (_packettype == PVT_VOICE):
|
2013-08-27 11:32:27 -04:00
|
|
|
logger.warning('<<- (%s) Voice Packet From:%s:%s', self._network, host, port)
|
2013-07-11 20:45:09 -04:00
|
|
|
|
|
|
|
elif (_packettype == GROUP_DATA):
|
2013-08-27 11:32:27 -04:00
|
|
|
logger.warning('<<- (%s) Group Data Packet From:%s:%s', self._network, host, port)
|
2013-07-11 20:45:09 -04:00
|
|
|
|
|
|
|
elif (_packettype == PVT_DATA):
|
2013-08-27 11:32:27 -04:00
|
|
|
logger.warning('<<- (%s) Private Data Packet From From:%s:%s', self._network, host, port)
|
2013-07-11 20:45:09 -04:00
|
|
|
|
|
|
|
elif (_packettype == DE_REG_REQ):
|
2013-08-27 11:32:27 -04:00
|
|
|
logger.warning('<<- (%s) Peer De-Registration Request From:%s:%s', self._network, host, port)
|
2013-07-11 20:45:09 -04:00
|
|
|
|
|
|
|
elif (_packettype == DE_REG_REPLY):
|
2013-08-27 11:32:27 -04:00
|
|
|
logger.warning('<<- (%s) Peer De-Registration Reply From:%s:%s', self._network, host, port)
|
2013-07-11 20:45:09 -04:00
|
|
|
|
2013-08-08 22:48:28 -04:00
|
|
|
elif (_packettype == RPT_WAKE_UP):
|
2013-08-27 11:32:27 -04:00
|
|
|
logger.warning('<<- (%s) Repeater Wake-Up Packet From:%s:%s', self._network, host, port)
|
2013-08-08 22:48:28 -04:00
|
|
|
|
|
|
|
# Technically, we're not paying any attention to these types because we're not part of the XCMP call control structure
|
|
|
|
#
|
|
|
|
elif (_packettype == XCMP_XNL):
|
2013-08-27 11:32:27 -04:00
|
|
|
logger.warning('<<- (%s) XCMP_XNL From:%s:%s, but we did not indicate XCMP capable!', self._network, host, port)
|
2013-08-08 22:48:28 -04:00
|
|
|
|
2013-07-11 20:45:09 -04:00
|
|
|
elif (_packettype in (CALL_CTL_1, CALL_CTL_2, CALL_CTL_3)):
|
2013-08-27 11:32:27 -04:00
|
|
|
logger.warning('<<- (%s) Call Control Packet From:%s:%s', self._network, host, port)
|
2013-07-11 20:45:09 -04:00
|
|
|
|
2013-08-08 22:48:28 -04:00
|
|
|
# If there's a packet type we don't know aobut, it should be logged so we can figure it out and take an appropriate action!
|
2013-06-27 17:15:54 -04:00
|
|
|
else:
|
|
|
|
packet_type = binascii.b2a_hex(_packettype)
|
2013-07-28 17:22:25 -04:00
|
|
|
logger.error('<<- (%s) Received Unprocessed Type %s From:%s:%s', self._network, packet_type, host, port)
|
2013-06-27 17:15:54 -04:00
|
|
|
|
2013-07-20 09:28:52 -04:00
|
|
|
|
|
|
|
|
2013-07-11 20:45:09 -04:00
|
|
|
#************************************************
|
|
|
|
# MAIN PROGRAM LOOP STARTS HERE
|
|
|
|
#************************************************
|
2013-06-27 17:15:54 -04:00
|
|
|
|
|
|
|
if __name__ == '__main__':
|
2013-08-16 15:30:20 -04:00
|
|
|
networks = {}
|
2013-07-11 20:45:09 -04:00
|
|
|
for ipsc_network in NETWORK:
|
2013-08-16 15:30:20 -04:00
|
|
|
networks[ipsc_network] = IPSC(ipsc_network)
|
|
|
|
if (NETWORK[ipsc_network]['LOCAL']['ENABLED']):
|
|
|
|
reactor.listenUDP(NETWORK[ipsc_network]['LOCAL']['PORT'], networks[ipsc_network])
|
2013-07-11 20:45:09 -04:00
|
|
|
reactor.run()
|