DMRlink/rcm.py

145 lines
5.2 KiB
Python
Raw Normal View History

#!/usr/bin/env python
#
2013-11-24 23:01:30 -05:00
# This work is licensed under the Creative Commons Attribution-ShareAlike
# 3.0 Unported License.To view a copy of this license, visit
# http://creativecommons.org/licenses/by-sa/3.0/ or send a letter to
# Creative Commons, 444 Castro Street, Suite 900, Mountain View,
# California, 94041, USA.
# This is a sample application that uses the Repeater Call Monitor packets to display events in the IPSC
# NOTE: dmrlink.py MUST BE CONFIGURED TO CONNECT AS A "REPEATER CALL MONITOR" PEER!!!
# ALSO NOTE, I'M NOT DONE MAKING THIS WORK, SO UNTIL THIS MESSAGE IS GONE, DON'T EXPECT GREAT THINGS.
from __future__ import print_function
from twisted.internet.protocol import DatagramProtocol
from twisted.internet import reactor
from twisted.internet import task
from binascii import b2a_hex as h
2014-05-18 16:23:19 -04:00
import datetime
2013-11-24 23:01:30 -05:00
import binascii
import dmrlink
from dmrlink import IPSC, NETWORK, networks, get_info, int_id, subscriber_ids, peer_ids, talkgroup_ids, logger
2013-11-24 23:01:30 -05:00
__author__ = 'Cortney T. Buffington, N0MJS'
2014-04-28 23:07:34 -04:00
__copyright__ = 'Copyright (c) 2013, 2014 Cortney T. Buffington, N0MJS and the K0USY Group'
__credits__ = 'Adam Fast, KC0YLK, Dave K, and he who wishes not to be named'
__license__ = 'Creative Commons Attribution-ShareAlike 3.0 Unported'
2014-08-31 14:18:34 -04:00
__version__ = '1.0'
__maintainer__ = 'Cort Buffington, N0MJS'
__email__ = 'n0mjs@me.com'
__status__ = 'Production'
try:
from ipsc.ipsc_message_types import *
except ImportError:
sys.exit('IPSC message types file not found or invalid')
2013-11-24 23:01:30 -05:00
2014-05-27 11:28:39 -04:00
status = True
rpt = False
nack = False
2013-11-24 23:01:30 -05:00
class rcmIPSC(IPSC):
def __init__(self, *args, **kwargs):
IPSC.__init__(self, *args, **kwargs)
#************************************************
# CALLBACK FUNCTIONS FOR USER PACKET TYPES
#************************************************
#
2014-05-18 16:28:27 -04:00
def call_mon_status(self, _network, _data):
2014-05-27 11:28:39 -04:00
if not status:
return
2014-05-18 16:23:19 -04:00
_source = _data[1:5]
2013-11-26 17:05:21 -05:00
_ipsc_src = _data[5:9]
2014-05-18 16:23:19 -04:00
_seq_num = _data[9:13]
_ts = _data[13]
_status = _data[15] # suspect [14:16] but nothing in leading byte?
_rf_src = _data[16:19]
_rf_tgt = _data[19:22]
_type = _data[22]
_prio = _data[23]
_sec = _data[24]
2013-11-26 17:05:21 -05:00
2014-05-18 16:23:19 -04:00
_source = get_info(int_id(_source), peer_ids)
2013-12-01 21:59:53 -05:00
_ipsc_src = get_info(int_id(_ipsc_src), peer_ids)
2013-11-26 17:05:21 -05:00
_rf_src = get_info(int_id(_rf_src), subscriber_ids)
2013-12-01 21:59:53 -05:00
if _type == '\x4F' or '\x51':
2013-11-26 17:05:21 -05:00
_rf_tgt = get_info(int_id(_rf_tgt), talkgroup_ids)
else:
_rf_tgt = get_info(int_id(_rf_tgt), subscriber_ids)
2014-05-18 16:29:01 -04:00
print('Call Monitor - Call Status')
2014-05-27 11:28:39 -04:00
print('TIME: ', datetime.datetime.now().strftime("%Y-%m-%d %H:%M:%S"))
2014-05-18 16:23:19 -04:00
print('DATA SOURCE: ', _source)
2013-11-26 17:05:21 -05:00
print('IPSC: ', _network)
2013-12-01 21:59:53 -05:00
print('IPSC Source: ', _ipsc_src)
2013-11-26 17:05:21 -05:00
print('Timeslot: ', TS[_ts])
2014-05-18 16:23:19 -04:00
try:
print('Status: ', STATUS[_status])
except KeyError:
print('Status (unknown): ', h(status))
try:
print('Type: ', TYPE[_type])
except KeyError:
print('Type (unknown): ', h(_type))
2013-11-26 17:05:21 -05:00
print('Source Sub: ', _rf_src)
print('Target Sub: ', _rf_tgt)
print()
2014-05-18 16:23:19 -04:00
def call_mon_rpt(self, _network, _data):
2014-05-27 11:28:39 -04:00
if not rpt:
return
2014-05-18 17:18:21 -04:00
_source = _data[1:5]
_ts1_state = _data[5]
_ts2_state = _data[6]
2014-05-18 16:23:19 -04:00
_source = get_info(int_id(_source), peer_ids)
print('Call Monitor - Repeater State')
2014-05-27 11:28:39 -04:00
print('TIME: ', datetime.datetime.now().strftime("%Y-%m-%d %H:%M:%S"))
2014-05-18 16:23:19 -04:00
print('DATA SOURCE: ', _source)
2014-05-18 17:18:21 -04:00
try:
print('TS1 State: ', REPEAT[_ts1_state])
except KeyError:
print('TS1 State (unknown): ', h(_ts1_state))
2014-05-18 16:23:19 -04:00
try:
2014-05-18 17:18:21 -04:00
print('TS2 State: ', REPEAT[_ts2_state])
2014-05-18 16:23:19 -04:00
except KeyError:
2014-05-18 17:18:21 -04:00
print('TS2 State (unknown): ', h(_ts2_state))
2014-05-18 16:23:19 -04:00
print()
def call_mon_nack(self, _network, _data):
2014-05-27 11:28:39 -04:00
if not nack:
return
2014-05-18 16:23:19 -04:00
_source = _data[1:5]
_nack = _data[5]
2013-12-01 21:59:53 -05:00
2014-05-18 16:23:19 -04:00
_source = get_info(int_id(_source), peer_ids)
2014-05-18 16:39:06 -04:00
print('Call Monitor - Transmission NACK')
2014-05-27 11:28:39 -04:00
print('TIME: ', datetime.datetime.now().strftime("%Y-%m-%d %H:%M:%S"))
2014-05-18 16:23:19 -04:00
print('DATA SOURCE: ', _source)
try:
2014-05-18 16:25:22 -04:00
print('NACK Cause: ', NACK[_nack])
2014-05-18 16:23:19 -04:00
except KeyError:
print('NACK Cause (unknown): ', h(_nack))
print()
2013-12-01 21:59:53 -05:00
def repeater_wake_up(self, _network, _data):
_source = _data[1:5]
_source_dec = int_id(_source)
_source_name = get_info(_source_dec, peer_ids)
2014-05-18 16:23:19 -04:00
#print('({}) Repeater Wake-Up Packet Received: {} ({})' .format(_network, _source_name, _source_dec))
2013-11-24 23:01:30 -05:00
2013-11-24 23:01:30 -05:00
if __name__ == '__main__':
logger.info('DMRlink \'rcm.py\' (c) 2013, 2014 N0MJS & the K0USY Group - SYSTEM STARTING...')
2013-11-24 23:01:30 -05:00
for ipsc_network in NETWORK:
if NETWORK[ipsc_network]['LOCAL']['ENABLED']:
networks[ipsc_network] = rcmIPSC(ipsc_network)
reactor.listenUDP(NETWORK[ipsc_network]['LOCAL']['PORT'], networks[ipsc_network], interface=NETWORK[ipsc_network]['LOCAL']['IP'])
2013-11-24 23:01:30 -05:00
reactor.run()