2014-01-03 16:01:43 -05:00
|
|
|
#!/usr/bin/env python
|
|
|
|
#
|
2013-10-29 08:09:18 -04:00
|
|
|
# This work is licensed under the Creative Commons Attribution-ShareAlike
|
|
|
|
# 3.0 Unported License.To view a copy of this license, visit
|
|
|
|
# http://creativecommons.org/licenses/by-sa/3.0/ or send a letter to
|
|
|
|
# Creative Commons, 444 Castro Street, Suite 900, Mountain View,
|
|
|
|
# California, 94041, USA.
|
|
|
|
|
2014-08-31 12:27:00 -04:00
|
|
|
# This is a sample application to bridge traffic between IPSC networks. it uses
|
|
|
|
# one required (bridge_rules.py) and one optional (known_bridges.py) additional
|
|
|
|
# configuration files. Both files have their own documentation for use.
|
|
|
|
#
|
|
|
|
# "bridge_rules" contains the IPSC network, Timeslot and TGID matching rules to
|
|
|
|
# determine which voice calls are bridged between IPSC networks and which are
|
|
|
|
# not.
|
|
|
|
#
|
|
|
|
# "known_bridges" contains DMR radio ID numbers of known bridges. This file is
|
|
|
|
# used when you want bridge.py to be "polite" or serve as a backup bridge. If
|
|
|
|
# a known bridge exists in either a source OR target IPSC network, then no
|
|
|
|
# bridging between those IPSC networks will take place. This behavior is
|
|
|
|
# dynamic and updates each keep-alive interval (main configuration file).
|
|
|
|
# For faster failover, configure a short keep-alive time and a low number of
|
|
|
|
# missed keep-alives before timout. I recommend 5 sec keep-alive and 3 missed.
|
|
|
|
# That gives a worst-case scenario of 15 seconds to fail over. Recovery will
|
|
|
|
# typically happen with a single "blip" in the transmission up to about 5
|
|
|
|
# seconds.
|
|
|
|
#
|
|
|
|
# While this file is listed as Beta status, K0USY Group depends on this code
|
|
|
|
# for the bridigng of it's many repeaters. We consider it reliable, but you
|
|
|
|
# get what you pay for... as usual, no guarantees.
|
2013-11-24 23:01:20 -05:00
|
|
|
|
2013-10-29 08:09:18 -04:00
|
|
|
from __future__ import print_function
|
|
|
|
from twisted.internet import reactor
|
2014-08-31 12:27:00 -04:00
|
|
|
from twisted.internet import task
|
2013-11-13 20:07:20 -05:00
|
|
|
from binascii import b2a_hex as h
|
2013-10-29 08:09:18 -04:00
|
|
|
|
2013-11-21 19:38:15 -05:00
|
|
|
import sys
|
2014-12-20 10:14:54 -05:00
|
|
|
from dmrlink import IPSC, NETWORK, networks, dmr_nat, logger, hex_str_3, hex_str_4, int_id
|
2013-10-31 22:45:57 -04:00
|
|
|
|
2014-01-03 16:01:43 -05:00
|
|
|
__author__ = 'Cortney T. Buffington, N0MJS'
|
2014-04-28 23:07:34 -04:00
|
|
|
__copyright__ = 'Copyright (c) 2013, 2014 Cortney T. Buffington, N0MJS and the K0USY Group'
|
2014-01-03 16:01:43 -05:00
|
|
|
__credits__ = 'Adam Fast, KC0YLK, Dave K, and he who wishes not to be named'
|
|
|
|
__license__ = 'Creative Commons Attribution-ShareAlike 3.0 Unported'
|
2014-08-31 14:18:34 -04:00
|
|
|
__version__ = '0.27b'
|
2014-01-03 16:01:43 -05:00
|
|
|
__maintainer__ = 'Cort Buffington, N0MJS'
|
|
|
|
__email__ = 'n0mjs@me.com'
|
2014-08-31 14:18:34 -04:00
|
|
|
__status__ = 'beta'
|
2014-01-03 16:01:43 -05:00
|
|
|
|
2013-11-21 19:50:01 -05:00
|
|
|
|
2014-09-18 21:08:54 -04:00
|
|
|
BURST_DATA_TYPE = {
|
|
|
|
'VOICE_HEAD': '\x01',
|
|
|
|
'VOICE_TERM': '\x02',
|
|
|
|
'SLOT1_VOICE': '\x0A',
|
|
|
|
'SLOT2_VOICE': '\x8A'
|
|
|
|
}
|
|
|
|
|
2013-11-14 21:14:16 -05:00
|
|
|
# Notes and pieces of next steps...
|
|
|
|
# RPT_WAKE_UP = b'\x85' + NETWORK[_network]['LOCAL']['RADIO_ID] + b'\x00\x00\x00\x01' + b'\x01' + b'\x01'
|
|
|
|
# TS1 = 0, TS2 = 1
|
|
|
|
|
2013-11-17 19:13:59 -05:00
|
|
|
# Import Bridging rules
|
2014-08-31 12:27:00 -04:00
|
|
|
# Note: A stanza *must* exist for any IPSC configured in the main
|
|
|
|
# configuration file and listed as "active". It can be empty,
|
|
|
|
# but it has to exist.
|
2013-11-17 19:13:59 -05:00
|
|
|
#
|
|
|
|
try:
|
|
|
|
from bridge_rules import RULES
|
2014-08-31 12:27:00 -04:00
|
|
|
logger.info('Bridge rules file found and rules imported')
|
2013-11-17 19:13:59 -05:00
|
|
|
except ImportError:
|
|
|
|
sys.exit('Bridging rules file not found or invalid')
|
|
|
|
|
2014-08-31 12:27:00 -04:00
|
|
|
# Convert integer GROUP ID numbers from the config into hex strings
|
|
|
|
# we need to send in the actual data packets.
|
|
|
|
#
|
|
|
|
|
|
|
|
for _ipsc in RULES:
|
|
|
|
for _rule in RULES[_ipsc]['GROUP_VOICE']:
|
|
|
|
_rule['SRC_GROUP'] = hex_str_3(_rule['SRC_GROUP'])
|
|
|
|
_rule['DST_GROUP'] = hex_str_3(_rule['DST_GROUP'])
|
2014-09-18 21:08:54 -04:00
|
|
|
_rule['SRC_TS'] = _rule['SRC_TS'] - 1
|
|
|
|
_rule['DST_TS'] = _rule['DST_TS'] - 1
|
|
|
|
|
2014-08-31 12:27:00 -04:00
|
|
|
|
|
|
|
# Import List of Bridges
|
|
|
|
# This is how we identify known bridges. If one of these is present
|
|
|
|
# and it's mode byte is set to bridge, we don't
|
|
|
|
#
|
|
|
|
try:
|
|
|
|
from known_bridges import BRIDGES
|
|
|
|
logger.info('Known bridges file found and bridge ID list imported ')
|
|
|
|
except ImportError:
|
|
|
|
logger.critical('\'known_bridges.py\' not found - backup bridge service will not be enabled')
|
|
|
|
BRIDGES = []
|
2013-10-29 08:09:18 -04:00
|
|
|
|
2014-08-31 12:27:00 -04:00
|
|
|
|
|
|
|
# The class methods we override, including __init__ will be different
|
|
|
|
# depending on whether or not there is a known_bridges.py file, and
|
|
|
|
# hence whether or not we will implement backup/polite bridging or
|
|
|
|
# not (standard bridging). So, we test to see if the known bridges
|
|
|
|
# data structure "BRIDGES" was imported and had entries or not. If
|
|
|
|
# it did not import or did not have any entries, standard bridging
|
|
|
|
# is used.
|
|
|
|
#
|
|
|
|
if BRIDGES:
|
|
|
|
logger.info('Initializing class methods for backup/polite bridging')
|
|
|
|
class bridgeIPSC(IPSC):
|
2013-10-29 16:16:48 -04:00
|
|
|
|
2014-08-31 12:27:00 -04:00
|
|
|
def __init__(self, *args, **kwargs):
|
|
|
|
IPSC.__init__(self, *args, **kwargs)
|
|
|
|
self.BRIDGE = False
|
|
|
|
self.ACTIVE_CALLS = []
|
|
|
|
logger.info('(%s) Initializing bridge status as: %s', self._network, self.BRIDGE)
|
|
|
|
|
|
|
|
# Setup the backup/polite bridging maintenance loop (based on keep-alive timer)
|
|
|
|
def startProtocol(self):
|
|
|
|
IPSC.startProtocol(self)
|
2013-10-29 08:09:18 -04:00
|
|
|
|
2014-08-31 12:27:00 -04:00
|
|
|
self._bridge_presence = task.LoopingCall(self.bridge_presence_loop)
|
|
|
|
self._bridge_presence_loop = self._bridge_presence.start(self._local['ALIVE_TIMER'])
|
|
|
|
|
|
|
|
# This is the backup/polite bridge maintenance loop
|
|
|
|
def bridge_presence_loop(self):
|
|
|
|
_temp_bridge = True
|
|
|
|
for peer in BRIDGES:
|
|
|
|
_peer = hex_str_4(peer)
|
|
|
|
|
|
|
|
if _peer in self._peers.keys() and (self._peers[_peer]['MODE_DECODE']['TS_1'] or self._peers[_peer]['MODE_DECODE']['TS_2']):
|
|
|
|
_temp_bridge = False
|
|
|
|
logger.debug('(%s) Peer %s is an active bridge', self._network, int_id(_peer))
|
|
|
|
|
|
|
|
if _peer == self._master['RADIO_ID'] \
|
|
|
|
and self._master['STATUS']['CONNECTED'] \
|
|
|
|
and (self._master['MODE_DECODE']['TS_1'] or self._master['MODE_DECODE']['TS_2']):
|
|
|
|
_temp_bridge = False
|
|
|
|
logger.debug('(%s) Master %s is an active bridge',self._network, int_id(_peer))
|
|
|
|
|
|
|
|
if self.BRIDGE != _temp_bridge:
|
|
|
|
logger.info('(%s) Changing bridge status to: %s', self._network, _temp_bridge )
|
|
|
|
self.BRIDGE = _temp_bridge
|
2013-10-29 08:09:18 -04:00
|
|
|
|
2013-11-14 21:30:20 -05:00
|
|
|
|
2014-08-31 12:27:00 -04:00
|
|
|
|
|
|
|
#************************************************
|
|
|
|
# CALLBACK FUNCTIONS FOR USER PACKET TYPES
|
|
|
|
#************************************************
|
|
|
|
#
|
|
|
|
def group_voice(self, _network, _src_sub, _dst_group, _ts, _end, _peerid, _data):
|
2014-09-05 17:02:30 -04:00
|
|
|
logger.debug('(%s) Group Voice Packet Received From: %s, IPSC Peer %s, Destination %s', _network, int_id(_src_sub), int_id(_peerid), int_id(_dst_group))
|
2014-08-31 12:27:00 -04:00
|
|
|
if _ts not in self.ACTIVE_CALLS:
|
|
|
|
self.ACTIVE_CALLS.append(_ts)
|
|
|
|
# send repeater wake up, but send them when a repeater is likely not TXing check time since end (see below)
|
|
|
|
if _end:
|
|
|
|
self.ACTIVE_CALLS.remove(_ts)
|
|
|
|
# flag the time here so we can test to see if the last call ended long enough ago to send a wake-up
|
|
|
|
# timer = time()
|
|
|
|
|
|
|
|
for rule in RULES[_network]['GROUP_VOICE']:
|
2013-12-12 20:59:04 -05:00
|
|
|
_target = rule['DST_NET']
|
2014-08-31 12:27:00 -04:00
|
|
|
# Matching for rules is against the Destination Group in the SOURCE packet (SRC_GROUP)
|
|
|
|
if rule['SRC_GROUP'] == _dst_group and rule['SRC_TS'] == _ts and (self.BRIDGE == True or networks[_target].BRIDGE == True):
|
|
|
|
_tmp_data = _data
|
|
|
|
# Re-Write the IPSC SRC to match the target network's ID
|
2014-08-31 19:33:45 -04:00
|
|
|
_tmp_data = _tmp_data.replace(_peerid, NETWORK[_target]['LOCAL']['RADIO_ID'])
|
2014-08-31 12:27:00 -04:00
|
|
|
# Re-Write the destination Group ID
|
|
|
|
_tmp_data = _tmp_data.replace(_dst_group, rule['DST_GROUP'])
|
2014-09-18 21:08:54 -04:00
|
|
|
|
|
|
|
# Re-Write IPSC timeslot value
|
|
|
|
_call_info = int_id(_data[17:18])
|
|
|
|
if rule['DST_TS'] == 0:
|
|
|
|
_call_info &= ~(1 << 5)
|
|
|
|
elif rule['DST_TS'] == 1:
|
|
|
|
_call_info |= 1 << 5
|
|
|
|
_call_info = chr(_call_info)
|
|
|
|
_tmp_data = _tmp_data[:17] + _call_info + _tmp_data[18:]
|
|
|
|
|
|
|
|
# Re-Write DMR timeslot value
|
|
|
|
# Determine if the slot is present, so we can translate if need be
|
|
|
|
_burst_data_type = _data[30]
|
|
|
|
if _burst_data_type == BURST_DATA_TYPE['SLOT1_VOICE'] or _burst_data_type == BURST_DATA_TYPE['SLOT2_VOICE']:
|
|
|
|
_slot_valid = True
|
|
|
|
else:
|
|
|
|
_slot_valid = False
|
|
|
|
# Re-Write timeslot if necessary...
|
|
|
|
if _slot_valid:
|
|
|
|
if rule['DST_TS'] == 0:
|
|
|
|
_burst_data_type = BURST_DATA_TYPE['SLOT1_VOICE']
|
|
|
|
elif rule['DST_TS'] == 1:
|
|
|
|
_burst_data_type = BURST_DATA_TYPE['SLOT2_VOICE']
|
|
|
|
_tmp_data = _tmp_data[:30] + _burst_data_type + _tmp_data[31:]
|
2014-08-31 12:27:00 -04:00
|
|
|
|
|
|
|
# Calculate and append the authentication hash for the target network... if necessary
|
|
|
|
if NETWORK[_target]['LOCAL']['AUTH_ENABLED']:
|
|
|
|
_tmp_data = self.hashed_packet(NETWORK[_target]['LOCAL']['AUTH_KEY'], _tmp_data)
|
|
|
|
# Send the packet to all peers in the target IPSC
|
2014-12-20 10:14:54 -05:00
|
|
|
networks[_target].send_to_ipsc(_tmp_data)
|
2014-08-31 12:27:00 -04:00
|
|
|
|
|
|
|
else:
|
|
|
|
logger.info('Initializing class methods for standard bridging')
|
|
|
|
class bridgeIPSC(IPSC):
|
|
|
|
|
|
|
|
def __init__(self, *args, **kwargs):
|
|
|
|
IPSC.__init__(self, *args, **kwargs)
|
|
|
|
self.ACTIVE_CALLS = []
|
|
|
|
|
|
|
|
|
|
|
|
#************************************************
|
|
|
|
# CALLBACK FUNCTIONS FOR USER PACKET TYPES
|
|
|
|
#************************************************
|
|
|
|
#
|
|
|
|
def group_voice(self, _network, _src_sub, _dst_group, _ts, _end, _peerid, _data):
|
|
|
|
if _ts not in self.ACTIVE_CALLS:
|
|
|
|
self.ACTIVE_CALLS.append(_ts)
|
|
|
|
# send repeater wake up, but send them when a repeater is likely not TXing check time since end (see below)
|
|
|
|
if _end:
|
|
|
|
self.ACTIVE_CALLS.remove(_ts)
|
|
|
|
# flag the time here so we can test to see if the last call ended long enough ago to send a wake-up
|
|
|
|
# timer = time()
|
|
|
|
|
|
|
|
for rule in RULES[_network]['GROUP_VOICE']:
|
2014-09-18 21:08:54 -04:00
|
|
|
_target = rule['DST_NET']
|
2014-08-31 12:27:00 -04:00
|
|
|
# Matching for rules is against the Destination Group in the SOURCE packet (SRC_GROUP)
|
|
|
|
if rule['SRC_GROUP'] == _dst_group and rule['SRC_TS'] == _ts:
|
|
|
|
_tmp_data = _data
|
|
|
|
# Re-Write the IPSC SRC to match the target network's ID
|
2014-08-31 19:33:45 -04:00
|
|
|
_tmp_data = _tmp_data.replace(_peerid, NETWORK[_target]['LOCAL']['RADIO_ID'])
|
2014-08-31 12:27:00 -04:00
|
|
|
# Re-Write the destination Group ID
|
|
|
|
_tmp_data = _tmp_data.replace(_dst_group, rule['DST_GROUP'])
|
|
|
|
|
2014-09-18 21:08:54 -04:00
|
|
|
# Re-Write IPSC timeslot value
|
|
|
|
_call_info = int_id(_data[17:18])
|
|
|
|
if rule['DST_TS'] == 0:
|
|
|
|
_call_info &= ~(1 << 5)
|
|
|
|
elif rule['DST_TS'] == 1:
|
|
|
|
_call_info |= 1 << 5
|
|
|
|
_call_info = chr(_call_info)
|
|
|
|
_tmp_data = _tmp_data[:17] + _call_info + _tmp_data[18:]
|
|
|
|
|
|
|
|
# Re-Write DMR timeslot value
|
|
|
|
# Determine if the slot is present, so we can translate if need be
|
|
|
|
_burst_data_type = _data[30]
|
|
|
|
if _burst_data_type == BURST_DATA_TYPE['SLOT1_VOICE'] or _burst_data_type == BURST_DATA_TYPE['SLOT2_VOICE']:
|
|
|
|
_slot_valid = True
|
|
|
|
else:
|
|
|
|
_slot_valid = False
|
|
|
|
# Re-Write timeslot if necessary...
|
|
|
|
if _slot_valid:
|
|
|
|
if rule['DST_TS'] == 0:
|
|
|
|
_burst_data_type = BURST_DATA_TYPE['SLOT1_VOICE']
|
|
|
|
elif rule['DST_TS'] == 1:
|
|
|
|
_burst_data_type = BURST_DATA_TYPE['SLOT2_VOICE']
|
|
|
|
_tmp_data = _tmp_data[:30] + _burst_data_type + _tmp_data[31:]
|
|
|
|
|
2014-08-31 12:27:00 -04:00
|
|
|
# Calculate and append the authentication hash for the target network... if necessary
|
|
|
|
if NETWORK[_target]['LOCAL']['AUTH_ENABLED']:
|
|
|
|
_tmp_data = self.hashed_packet(NETWORK[_target]['LOCAL']['AUTH_KEY'], _tmp_data)
|
|
|
|
# Send the packet to all peers in the target IPSC
|
2014-12-20 10:14:54 -05:00
|
|
|
networks[_target].send_to_ipsc(_tmp_data)
|
2014-08-31 12:27:00 -04:00
|
|
|
|
2013-12-12 20:59:04 -05:00
|
|
|
|
|
|
|
|
|
|
|
|
2013-11-09 12:33:52 -05:00
|
|
|
if __name__ == '__main__':
|
2014-04-28 22:42:47 -04:00
|
|
|
logger.info('DMRlink \'bridge.py\' (c) 2013, 2014 N0MJS & the K0USY Group - SYSTEM STARTING...')
|
2013-11-09 12:33:52 -05:00
|
|
|
for ipsc_network in NETWORK:
|
2013-12-03 11:48:08 -05:00
|
|
|
if NETWORK[ipsc_network]['LOCAL']['ENABLED']:
|
2014-04-28 22:42:47 -04:00
|
|
|
networks[ipsc_network] = bridgeIPSC(ipsc_network)
|
2014-10-31 11:30:18 -04:00
|
|
|
reactor.listenUDP(NETWORK[ipsc_network]['LOCAL']['PORT'], networks[ipsc_network], interface=NETWORK[ipsc_network]['LOCAL']['IP'])
|
2014-04-29 23:00:38 -04:00
|
|
|
reactor.run()
|