2018-12-27 15:31:08 -05:00
#!/usr/bin/env python
#
###############################################################################
2019-02-22 17:30:16 -05:00
# Copyright (C) 2016-2019 Cortney T. Buffington, N0MJS <n0mjs@me.com>
2018-12-27 15:31:08 -05:00
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation; either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software Foundation,
# Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
###############################################################################
'''
2019-02-22 17:27:58 -05:00
This program does very little on its own . It is intended to be used as a module
2018-12-27 15:31:08 -05:00
to build applications on top of the HomeBrew Repeater Protocol . By itself , it
will only act as a peer or master for the systems specified in its configuration
file ( usually hblink . cfg ) . It is ALWAYS best practice to ensure that this program
works stand - alone before troubleshooting any applications that use it . It has
sufficient logging to be used standalone as a troubleshooting application .
'''
# Specifig functions from modules we need
from binascii import b2a_hex as ahex
from binascii import a2b_hex as bhex
from random import randint
from hashlib import sha256 , sha1
from hmac import new as hmac_new , compare_digest
2019-06-19 11:03:29 -04:00
from time import time
2018-12-27 15:31:08 -05:00
from collections import deque
# Twisted is pretty important, so I keep it separate
from twisted . internet . protocol import DatagramProtocol , Factory , Protocol
from twisted . protocols . basic import NetstringReceiver
from twisted . internet import reactor , task
# Other files we pull from -- this is mostly for readability and segmentation
import log
import config
2021-08-04 23:26:48 -04:00
from config import acl_build
2018-12-27 15:36:32 -05:00
from const import *
2019-01-04 16:32:13 -05:00
from dmr_utils3 . utils import int_id , bytes_4 , try_download , mk_id_dict
2018-12-27 15:31:08 -05:00
# Imports for the reporting server
2019-01-07 10:44:36 -05:00
import pickle
2018-12-27 15:31:08 -05:00
from reporting_const import *
# The module needs logging logging, but handlers, etc. are controlled by the parent
import logging
logger = logging . getLogger ( __name__ )
2021-05-02 22:15:54 -04:00
# Used for user auth
import os , ast
2021-05-06 00:18:37 -04:00
import requests , json
import base64
2021-05-10 20:13:22 -04:00
import libscrc
2021-08-07 19:15:32 -04:00
import re
2021-05-06 00:18:37 -04:00
2021-09-04 22:57:15 -04:00
# Encryption library
from cryptography . fernet import Fernet
2021-05-02 22:15:54 -04:00
2018-12-27 15:31:08 -05:00
# Does anybody read this stuff? There's a PEP somewhere that says I should do this.
__author__ = ' Cortney T. Buffington, N0MJS '
2019-03-05 20:01:07 -05:00
__copyright__ = ' Copyright (c) 2016-2019 Cortney T. Buffington, N0MJS and the K0USY Group '
2018-12-27 15:31:08 -05:00
__credits__ = ' Colin Durbridge, G4EML, Steve Zingman, N4IRS; Mike Zingman, N4IRR; Jonathan Naylor, G4KLX; Hans Barthen, DL5DI; Torsten Shultze, DG1HT '
__license__ = ' GNU GPLv3 '
__maintainer__ = ' Cort Buffington, N0MJS '
__email__ = ' n0mjs@me.com '
# Global variables used whether we are a module or __main__
systems = { }
2021-09-04 22:57:15 -04:00
# Functions that provide a basic symetrical encryption using Fernet
def encrypt_packet ( key , message ) :
f = Fernet ( key )
token = f . encrypt ( message )
return token
def decrypt_packet ( key , message ) :
f = Fernet ( key )
token = f . decrypt ( message , ttl = 1 )
return token
2018-12-27 15:31:08 -05:00
# Timed loop used for reporting HBP status
def config_reports ( _config , _factory ) :
2019-01-07 10:44:36 -05:00
def reporting_loop ( _logger , _server ) :
_logger . debug ( ' (GLOBAL) Periodic reporting loop started ' )
_server . send_config ( )
2018-12-27 15:31:08 -05:00
2019-01-07 10:44:36 -05:00
logger . info ( ' (GLOBAL) HBlink TCP reporting server configured ' )
2018-12-27 15:31:08 -05:00
2019-01-07 10:44:36 -05:00
report_server = _factory ( _config )
report_server . clients = [ ]
reactor . listenTCP ( _config [ ' REPORTS ' ] [ ' REPORT_PORT ' ] , report_server )
2018-12-27 15:31:08 -05:00
2019-01-07 10:44:36 -05:00
reporting = task . LoopingCall ( reporting_loop , logger , report_server )
reporting . start ( _config [ ' REPORTS ' ] [ ' REPORT_INTERVAL ' ] )
2018-12-27 15:31:08 -05:00
return report_server
# Shut ourselves down gracefully by disconnecting from the masters and peers.
def hblink_handler ( _signal , _frame ) :
for system in systems :
2019-01-07 10:44:36 -05:00
logger . info ( ' (GLOBAL) SHUTDOWN: DE-REGISTER SYSTEM: %s ' , system )
2018-12-27 15:31:08 -05:00
systems [ system ] . dereg ( )
# Check a supplied ID against the ACL provided. Returns action (True|False) based
# on matching and the action specified.
def acl_check ( _id , _acl ) :
id = int_id ( _id )
for entry in _acl [ 1 ] :
if entry [ 0 ] < = id < = entry [ 1 ] :
return _acl [ 0 ]
return not _acl [ 0 ]
2021-06-03 16:38:47 -04:00
def download_burnlist ( _CONFIG ) :
2021-09-05 21:53:20 -04:00
user_man_url = _CONFIG [ ' WEB_SERVICE ' ] [ ' URL ' ]
shared_secret = str ( sha256 ( _CONFIG [ ' WEB_SERVICE ' ] [ ' SHARED_SECRET ' ] . encode ( ) ) . hexdigest ( ) )
2021-06-03 16:38:47 -04:00
burn_check = {
' burn_list ' : True ,
' secret ' : shared_secret
}
json_object = json . dumps ( burn_check , indent = 4 )
try :
req = requests . post ( user_man_url , data = json_object , headers = { ' Content-Type ' : ' application/json ' } )
resp = json . loads ( req . text )
return resp [ ' burn_list ' ]
# For exception, write blank dict
except requests . ConnectionError :
return { }
2021-05-06 21:14:20 -04:00
2018-12-27 15:31:08 -05:00
#************************************************
# OPENBRIDGE CLASS
#************************************************
class OPENBRIDGE ( DatagramProtocol ) :
def __init__ ( self , _name , _config , _report ) :
# Define a few shortcuts to make the rest of the class more readable
self . _CONFIG = _config
self . _system = _name
self . _report = _report
self . _config = self . _CONFIG [ ' SYSTEMS ' ] [ self . _system ]
self . _laststrid = deque ( [ ] , 20 )
def dereg ( self ) :
logger . info ( ' ( %s ) is mode OPENBRIDGE. No De-Registration required, continuing shutdown ' , self . _system )
def send_system ( self , _packet ) :
2021-09-05 11:17:50 -04:00
if _packet [ : 4 ] == DMRD or _packet [ : 4 ] == EOBP :
2019-01-07 10:44:36 -05:00
#_packet = _packet[:11] + self._config['NETWORK_ID'] + _packet[15:]
_packet = b ' ' . join ( [ _packet [ : 11 ] , self . _config [ ' NETWORK_ID ' ] , _packet [ 15 : ] ] )
#_packet += hmac_new(self._config['PASSPHRASE'],_packet,sha1).digest()
_packet = b ' ' . join ( [ _packet , ( hmac_new ( self . _config [ ' PASSPHRASE ' ] , _packet , sha1 ) . digest ( ) ) ] )
2021-09-05 11:17:50 -04:00
if self . _config [ ' USE_ENCRYPTION ' ] == True or _packet [ : 4 ] == EOBP :
2021-09-04 22:57:15 -04:00
_enc_pkt = encrypt_packet ( self . _config [ ' ENCRYPTION_KEY ' ] , _packet )
_packet = b ' EOBP ' + _enc_pkt
2018-12-27 15:31:08 -05:00
self . transport . write ( _packet , ( self . _config [ ' TARGET_IP ' ] , self . _config [ ' TARGET_PORT ' ] ) )
# KEEP THE FOLLOWING COMMENTED OUT UNLESS YOU'RE DEBUGGING DEEPLY!!!!
# logger.debug('(%s) TX Packet to OpenBridge %s:%s -- %s', self._system, self._config['TARGET_IP'], self._config['TARGET_PORT'], ahex(_packet))
2021-09-04 22:57:15 -04:00
# Special Server Data packet, encrypted using frenet, send
elif _packet [ : 4 ] == SVRD :
_enc_pkt = encrypt_packet ( self . _config [ ' ENCRYPTION_KEY ' ] , _packet )
_packet = b ' SVRD ' + _enc_pkt
self . transport . write ( _packet , ( self . _config [ ' TARGET_IP ' ] , self . _config [ ' TARGET_PORT ' ] ) )
2021-09-05 18:37:35 -04:00
logger . info ( ' SVRD packet ' )
2018-12-27 15:31:08 -05:00
else :
2019-01-09 10:51:04 -05:00
logger . error ( ' ( %s ) OpenBridge system was asked to send non DMRD packet: %s ' , self . _system , _packet )
2018-12-27 15:31:08 -05:00
def dmrd_received ( self , _peer_id , _rf_src , _dst_id , _seq , _slot , _call_type , _frame_type , _dtype_vseq , _stream_id , _data ) :
pass
#print(int_id(_peer_id), int_id(_rf_src), int_id(_dst_id), int_id(_seq), _slot, _call_type, _frame_type, repr(_dtype_vseq), int_id(_stream_id))
2021-09-06 14:20:47 -04:00
def svrd_received ( self , _mode , _data ) :
pass
2018-12-27 15:31:08 -05:00
def datagramReceived ( self , _packet , _sockaddr ) :
2021-09-06 22:58:56 -04:00
## print(_packet[:4])
2018-12-27 15:31:08 -05:00
# Keep This Line Commented Unless HEAVILY Debugging!
2021-09-04 22:57:15 -04:00
## logger.debug('(%s) RX packet from %s -- %s', self._system, _sockaddr, ahex(_packet))
if _packet [ : 4 ] == DMRD or _packet [ : 4 ] == EOBP :
if _packet [ : 4 ] == EOBP :
_d_pkt = decrypt_packet ( self . _config [ ' ENCRYPTION_KEY ' ] , _packet [ 4 : ] )
_packet = _d_pkt
# DMRData -- encapsulated DMR data frame
if _packet [ : 4 ] == DMRD :
_data = _packet [ : 53 ]
_hash = _packet [ 53 : ]
_ckhs = hmac_new ( self . _config [ ' PASSPHRASE ' ] , _data , sha1 ) . digest ( )
if compare_digest ( _hash , _ckhs ) and _sockaddr == self . _config [ ' TARGET_SOCK ' ] :
_peer_id = _data [ 11 : 15 ]
_seq = _data [ 4 ]
_rf_src = _data [ 5 : 8 ]
_dst_id = _data [ 8 : 11 ]
_bits = _data [ 15 ]
_slot = 2 if ( _bits & 0x80 ) else 1
#_call_type = 'unit' if (_bits & 0x40) else 'group'
if _bits & 0x40 :
_call_type = ' unit '
elif ( _bits & 0x23 ) == 0x23 :
_call_type = ' vcsbk '
else :
_call_type = ' group '
_frame_type = ( _bits & 0x30 ) >> 4
_dtype_vseq = ( _bits & 0xF ) # data, 1=voice header, 2=voice terminator; voice, 0=burst A ... 5=burst F
_stream_id = _data [ 16 : 20 ]
#logger.debug('(%s) DMRD - Seqence: %s, RF Source: %s, Destination ID: %s', self._system, int_id(_seq), int_id(_rf_src), int_id(_dst_id))
# Sanity check for OpenBridge -- all calls must be on Slot 1 for Brandmeister or DMR+. Other HBlinks can process timeslot on OPB if the flag is set
if _slot != 1 and not self . _config [ ' BOTH_SLOTS ' ] and not _call_type == ' unit ' :
logger . error ( ' ( %s ) OpenBridge packet discarded because it was not received on slot 1. SID: %s , TGID %s ' , self . _system , int_id ( _rf_src ) , int_id ( _dst_id ) )
2018-12-27 15:31:08 -05:00
return
2021-09-04 22:57:15 -04:00
# ACL Processing
if self . _CONFIG [ ' GLOBAL ' ] [ ' USE_ACL ' ] :
if not acl_check ( _rf_src , self . _CONFIG [ ' GLOBAL ' ] [ ' SUB_ACL ' ] ) :
if _stream_id not in self . _laststrid :
logger . info ( ' ( %s ) CALL DROPPED WITH STREAM ID %s FROM SUBSCRIBER %s BY GLOBAL ACL ' , self . _system , int_id ( _stream_id ) , int_id ( _rf_src ) )
self . _laststrid . append ( _stream_id )
return
if _slot == 1 and not acl_check ( _dst_id , self . _CONFIG [ ' GLOBAL ' ] [ ' TG1_ACL ' ] ) :
if _stream_id not in self . _laststrid :
logger . info ( ' ( %s ) CALL DROPPED WITH STREAM ID %s ON TGID %s BY GLOBAL TS1 ACL ' , self . _system , int_id ( _stream_id ) , int_id ( _dst_id ) )
self . _laststrid . append ( _stream_id )
return
if self . _config [ ' USE_ACL ' ] :
if not acl_check ( _rf_src , self . _config [ ' SUB_ACL ' ] ) :
if _stream_id not in self . _laststrid :
logger . info ( ' ( %s ) CALL DROPPED WITH STREAM ID %s FROM SUBSCRIBER %s BY SYSTEM ACL ' , self . _system , int_id ( _stream_id ) , int_id ( _rf_src ) )
self . _laststrid . append ( _stream_id )
return
if not acl_check ( _dst_id , self . _config [ ' TG1_ACL ' ] ) :
if _stream_id not in self . _laststrid :
logger . info ( ' ( %s ) CALL DROPPED WITH STREAM ID %s ON TGID %s BY SYSTEM ACL ' , self . _system , int_id ( _stream_id ) , int_id ( _dst_id ) )
self . _laststrid . append ( _stream_id )
return
# Userland actions -- typically this is the function you subclass for an application
self . dmrd_received ( _peer_id , _rf_src , _dst_id , _seq , _slot , _call_type , _frame_type , _dtype_vseq , _stream_id , _data )
2021-09-05 18:37:35 -04:00
else :
if not compare_digest ( _hash , _ckhs ) :
logger . info ( ' ( %s ) OpenBridge HMAC failed, packet discarded - OPCODE: %s DATA: %s HMAC LENGTH: %s HMAC: %s ' , self . _system , _packet [ : 4 ] , repr ( _packet [ : 53 ] ) , len ( _packet [ 53 : ] ) , repr ( _packet [ 53 : ] ) )
if not _sockaddr == self . _config [ ' TARGET_SOCK ' ] :
logger . info ( ' ( %s ) OpenBridge socket mismatch, packet discarded - OPCODE: %s DATA: %s ' , self . _system , _packet [ : 4 ] , repr ( _packet [ : 53 ] ) )
2021-09-04 22:57:15 -04:00
# Server Data packet, decrypt and process it.
elif _packet [ : 4 ] == SVRD :
_d_pkt = decrypt_packet ( self . _config [ ' ENCRYPTION_KEY ' ] , _packet [ 4 : ] )
2021-09-06 14:20:47 -04:00
## logger.info('SVRD Received: ' + str(_d_pkt))
2021-09-05 18:37:35 -04:00
# DMR Data packet, sent via SVRD
2021-09-06 22:58:56 -04:00
## if _d_pkt[4:8] == b'DATA':
## print('----------------------')
## _data = _d_pkt[4:]
## _peer_id = _data[11:15]
## _seq = _data[4]
## _rf_src = _data[5:8]
## _dst_id = _data[8:11]
## _bits = _data[15]
## _slot = 2 if (_bits & 0x80) else 1
## #_call_type = 'unit' if (_bits & 0x40) else 'group'
## if _bits & 0x40:
## _call_type = 'unit'
## elif (_bits & 0x23) == 0x23:
## _call_type = 'vcsbk'
## else:
## _call_type = 'group'
## _frame_type = (_bits & 0x30) >> 4
## _dtype_vseq = (_bits & 0xF) # data, 1=voice header, 2=voice terminator; voice, 0=burst A ... 5=burst F
## _stream_id = _data[16:20]
## print(_stream_id)
##
## print(_call_type)
## self.dmrd_received(_peer_id, _rf_src, _dst_id, _seq, _slot, _call_type, _frame_type, _dtype_vseq, _stream_id, _data)
## else:
2021-09-06 19:06:14 -04:00
2021-09-06 22:58:56 -04:00
self . svrd_received ( _d_pkt [ 4 : 8 ] , _d_pkt [ 8 : ] )
2021-09-05 18:37:35 -04:00
2018-12-27 15:31:08 -05:00
#************************************************
# HB MASTER CLASS
#************************************************
class HBSYSTEM ( DatagramProtocol ) :
def __init__ ( self , _name , _config , _report ) :
# Define a few shortcuts to make the rest of the class more readable
self . _CONFIG = _config
self . _system = _name
self . _report = _report
self . _config = self . _CONFIG [ ' SYSTEMS ' ] [ self . _system ]
2019-09-25 15:36:20 -04:00
self . _laststrid = { 1 : b ' ' , 2 : b ' ' }
2018-12-27 15:31:08 -05:00
# Define shortcuts and generic function names based on the type of system we are
if self . _config [ ' MODE ' ] == ' MASTER ' :
self . _peers = self . _CONFIG [ ' SYSTEMS ' ] [ self . _system ] [ ' PEERS ' ]
self . send_system = self . send_peers
self . maintenance_loop = self . master_maintenance_loop
self . datagramReceived = self . master_datagramReceived
self . dereg = self . master_dereg
elif self . _config [ ' MODE ' ] == ' PEER ' :
self . _stats = self . _config [ ' STATS ' ]
self . send_system = self . send_master
self . maintenance_loop = self . peer_maintenance_loop
self . datagramReceived = self . peer_datagramReceived
self . dereg = self . peer_dereg
2020-10-24 20:53:48 -04:00
elif self . _config [ ' MODE ' ] == ' XLXPEER ' :
self . _stats = self . _config [ ' XLXSTATS ' ]
self . send_system = self . send_master
self . maintenance_loop = self . peer_maintenance_loop
self . datagramReceived = self . peer_datagramReceived
self . dereg = self . peer_dereg
2021-06-03 12:15:01 -04:00
2021-06-18 15:02:12 -04:00
def check_user_man ( self , _id , server_name , peer_ip , _system ) :
2021-05-06 21:14:20 -04:00
#Change this to a config value
2021-09-05 21:53:20 -04:00
user_man_url = self . _CONFIG [ ' WEB_SERVICE ' ] [ ' URL ' ]
shared_secret = str ( sha256 ( self . _CONFIG [ ' WEB_SERVICE ' ] [ ' SHARED_SECRET ' ] . encode ( ) ) . hexdigest ( ) )
2021-06-15 18:32:40 -04:00
## print(int(str(int_id(_id))[:7]))
2021-05-06 21:14:20 -04:00
auth_check = {
2021-06-04 00:08:31 -04:00
' secret ' : shared_secret ,
2021-06-03 16:38:47 -04:00
' login_id ' : int ( str ( int_id ( _id ) ) [ : 7 ] ) ,
2021-06-04 00:08:31 -04:00
' login_ip ' : peer_ip ,
2021-06-18 15:02:12 -04:00
' login_server ' : server_name ,
' system ' : _system
2021-05-06 21:14:20 -04:00
}
json_object = json . dumps ( auth_check , indent = 4 )
try :
req = requests . post ( user_man_url , data = json_object , headers = { ' Content-Type ' : ' application/json ' } )
resp = json . loads ( req . text )
2021-06-15 18:32:40 -04:00
## print(resp)
2021-05-06 21:14:20 -04:00
return resp
except requests . ConnectionError :
return { ' allow ' : True }
2021-09-05 11:17:50 -04:00
# Sends login confirmation for log
2021-06-04 00:08:31 -04:00
def send_login_conf ( self , _id , server_name , peer_ip , old_auth ) :
#Change this to a config value
2021-09-05 21:53:20 -04:00
user_man_url = self . _CONFIG [ ' WEB_SERVICE ' ] [ ' URL ' ]
shared_secret = str ( sha256 ( self . _CONFIG [ ' WEB_SERVICE ' ] [ ' SHARED_SECRET ' ] . encode ( ) ) . hexdigest ( ) )
2021-06-04 00:08:31 -04:00
#print(int(str(int_id(_id))[:7]))
auth_conf = {
' secret ' : shared_secret ,
' login_id ' : int ( str ( int_id ( _id ) ) [ : 7 ] ) ,
' login_ip ' : peer_ip ,
' login_server ' : server_name ,
' login_confirmed ' : True ,
' old_auth ' : old_auth
}
2021-08-07 19:15:32 -04:00
## print(auth_conf)
2021-06-04 00:08:31 -04:00
json_object = json . dumps ( auth_conf , indent = 4 )
2021-06-04 21:33:29 -04:00
try :
req = requests . post ( user_man_url , data = json_object , headers = { ' Content-Type ' : ' application/json ' } )
2021-06-04 00:08:31 -04:00
# resp = json.loads(req.text)
#return resp
2021-06-04 21:33:29 -04:00
except Exception as e :
logger . info ( e )
2021-09-05 11:17:50 -04:00
# Sends PEER info for map and other stuff
2021-08-07 19:15:32 -04:00
def send_peer_loc ( self , _id , call , lat , lon , url , description , loc , soft ) :
#Change this to a config value
2021-09-05 21:53:20 -04:00
user_man_url = self . _CONFIG [ ' WEB_SERVICE ' ] [ ' URL ' ]
shared_secret = str ( sha256 ( self . _CONFIG [ ' WEB_SERVICE ' ] [ ' SHARED_SECRET ' ] . encode ( ) ) . hexdigest ( ) )
2021-08-07 19:15:32 -04:00
peer_loc_conf = {
' secret ' : shared_secret ,
' loc_callsign ' : re . sub ( " b ' | ' | \ s \ s+ " , ' ' , str ( call ) ) ,
' dmr_id ' : int ( str ( int_id ( _id ) ) ) ,
' lat ' : re . sub ( " b ' | ' | \ s \ s \ s+ " , ' ' , str ( lat ) ) ,
' lon ' : re . sub ( " b ' | ' | \ s \ s \ s+ " , ' ' , str ( lon ) ) ,
' url ' : re . sub ( " b ' | ' | \ s \ s \ s+ " , ' ' , str ( url ) ) ,
' description ' : re . sub ( " b ' | ' | \ s \ s+ " , ' ' , str ( description ) ) ,
' loc ' : re . sub ( " b ' | ' | \ s \ s+ " , ' ' , str ( loc ) ) ,
' software ' : re . sub ( " b ' | ' | \ s \ s+ " , ' ' , str ( soft ) )
}
json_object = json . dumps ( peer_loc_conf , indent = 4 )
print ( json_object )
try :
req = requests . post ( user_man_url , data = json_object , headers = { ' Content-Type ' : ' application/json ' } )
# resp = json.loads(req.text)
#return resp
except Exception as e :
logger . info ( e )
2021-06-04 00:08:31 -04:00
2021-06-03 12:15:01 -04:00
def calc_passphrase ( self , peer_id , _salt_str ) :
2021-09-05 21:53:20 -04:00
burn_id = ast . literal_eval ( os . popen ( ' cat ' + self . _CONFIG [ ' WEB_SERVICE ' ] [ ' BURN_FILE ' ] ) . read ( ) )
2021-06-03 12:49:35 -04:00
peer_id_trimmed = int ( str ( int_id ( peer_id ) ) [ : 7 ] )
try :
2021-06-18 15:02:12 -04:00
## print(self.ums_response)
2021-06-03 12:49:35 -04:00
if self . ums_response [ ' mode ' ] == ' legacy ' :
_calc_hash = bhex ( sha256 ( _salt_str + self . _config [ ' PASSPHRASE ' ] ) . hexdigest ( ) )
2021-06-03 20:19:44 -04:00
calc_passphrase = self . _config [ ' PASSPHRASE ' ]
2021-06-03 12:49:35 -04:00
if self . ums_response [ ' mode ' ] == ' override ' :
_calc_hash = bhex ( sha256 ( _salt_str + str . encode ( self . ums_response [ ' value ' ] ) ) . hexdigest ( ) )
if self . ums_response [ ' mode ' ] == ' normal ' :
_new_peer_id = bytes_4 ( int ( str ( int_id ( peer_id ) ) [ : 7 ] ) )
2021-06-03 16:38:47 -04:00
peer_id_trimmed = str ( peer_id_trimmed )
try :
if burn_id [ peer_id_trimmed ] :
logger . info ( ' User ID has been burned. Requiring passphrase version: ' + str ( burn_id [ peer_id_trimmed ] ) )
2021-09-05 21:53:20 -04:00
calc_passphrase = sha256 ( str ( self . _CONFIG [ ' WEB_SERVICE ' ] [ ' EXTRA_1 ' ] ) . encode ( ) + str ( self . _CONFIG [ ' WEB_SERVICE ' ] [ ' EXTRA_INT_1 ' ] ) . encode ( ) + str ( _new_peer_id ) . encode ( ) [ - 3 : ] ) . hexdigest ( ) . upper ( ) . encode ( ) [ : : 14 ] + base64 . b64encode ( bytes . fromhex ( str ( hex ( libscrc . ccitt ( ( _new_peer_id ) + burn_id [ peer_id_trimmed ] . to_bytes ( 2 , ' big ' ) + self . _CONFIG [ ' WEB_SERVICE ' ] [ ' BURN_INT ' ] . to_bytes ( 2 , ' big ' ) + self . _CONFIG [ ' WEB_SERVICE ' ] [ ' APPEND_INT ' ] . to_bytes ( 2 , ' big ' ) + bytes . fromhex ( str ( hex ( libscrc . posix ( ( _new_peer_id ) + burn_id [ peer_id_trimmed ] . to_bytes ( 2 , ' big ' ) + self . _CONFIG [ ' WEB_SERVICE ' ] [ ' BURN_INT ' ] . to_bytes ( 2 , ' big ' ) + self . _CONFIG [ ' WEB_SERVICE ' ] [ ' APPEND_INT ' ] . to_bytes ( 2 , ' big ' ) ) ) ) [ 2 : ] . zfill ( 8 ) ) ) ) ) [ 2 : ] . zfill ( 4 ) ) + ( _new_peer_id ) + burn_id [ peer_id_trimmed ] . to_bytes ( 2 , ' big ' ) + self . _CONFIG [ ' WEB_SERVICE ' ] [ ' BURN_INT ' ] . to_bytes ( 2 , ' big ' ) + self . _CONFIG [ ' WEB_SERVICE ' ] [ ' APPEND_INT ' ] . to_bytes ( 2 , ' big ' ) + bytes . fromhex ( str ( hex ( libscrc . posix ( ( _new_peer_id ) + burn_id [ peer_id_trimmed ] . to_bytes ( 2 , ' big ' ) + self . _CONFIG [ ' WEB_SERVICE ' ] [ ' BURN_INT ' ] . to_bytes ( 2 , ' big ' ) + self . _CONFIG [ ' WEB_SERVICE ' ] [ ' APPEND_INT ' ] . to_bytes ( 2 , ' big ' ) ) ) ) [ 2 : ] . zfill ( 8 ) ) ) + sha256 ( str ( self . _CONFIG [ ' WEB_SERVICE ' ] [ ' EXTRA_2 ' ] ) . encode ( ) + str ( self . _CONFIG [ ' WEB_SERVICE ' ] [ ' EXTRA_INT_2 ' ] ) . encode ( ) + str ( _new_peer_id ) . encode ( ) [ - 3 : ] ) . hexdigest ( ) . upper ( ) . encode ( ) [ : : 14 ]
2021-06-03 16:38:47 -04:00
except :
2021-09-05 21:53:20 -04:00
# + base64.b64encode(str.encode(str(_new_peer_id) + self._CONFIG['WEB_SERVICE']['EXTRA_3'] + str(self._CONFIG['WEB_SERVICE']['EXTRA_INT_1'] - self._CONFIG['WEB_SERVICE']['APPEND_INT']) + str(_new_peer_id) + self._CONFIG['WEB_SERVICE']['EXTRA_2']))
calc_passphrase = sha256 ( str ( self . _CONFIG [ ' WEB_SERVICE ' ] [ ' EXTRA_1 ' ] ) . encode ( ) + str ( self . _CONFIG [ ' WEB_SERVICE ' ] [ ' EXTRA_INT_1 ' ] ) . encode ( ) + str ( _new_peer_id ) . encode ( ) [ - 3 : ] ) . hexdigest ( ) . upper ( ) . encode ( ) [ : : 14 ] + base64 . b64encode ( bytes . fromhex ( str ( hex ( libscrc . ccitt ( ( _new_peer_id ) + self . _CONFIG [ ' WEB_SERVICE ' ] [ ' APPEND_INT ' ] . to_bytes ( 2 , ' big ' ) + bytes . fromhex ( str ( hex ( libscrc . posix ( ( _new_peer_id ) + self . _CONFIG [ ' WEB_SERVICE ' ] [ ' APPEND_INT ' ] . to_bytes ( 2 , ' big ' ) ) ) ) [ 2 : ] . zfill ( 8 ) ) ) ) ) [ 2 : ] . zfill ( 4 ) ) + ( _new_peer_id ) + self . _CONFIG [ ' WEB_SERVICE ' ] [ ' APPEND_INT ' ] . to_bytes ( 2 , ' big ' ) + bytes . fromhex ( str ( hex ( libscrc . posix ( ( _new_peer_id ) + self . _CONFIG [ ' WEB_SERVICE ' ] [ ' APPEND_INT ' ] . to_bytes ( 2 , ' big ' ) ) ) ) [ 2 : ] . zfill ( 8 ) ) ) + sha256 ( str ( self . _CONFIG [ ' WEB_SERVICE ' ] [ ' EXTRA_2 ' ] ) . encode ( ) + str ( self . _CONFIG [ ' WEB_SERVICE ' ] [ ' EXTRA_INT_2 ' ] ) . encode ( ) + str ( _new_peer_id ) . encode ( ) [ - 3 : ] ) . hexdigest ( ) . upper ( ) . encode ( ) [ : : 14 ]
2021-06-18 15:02:12 -04:00
## print(base64.b64encode(calc_passphrase))
2021-09-05 21:53:20 -04:00
if self . _CONFIG [ ' WEB_SERVICE ' ] [ ' SHORTEN_PASSPHRASE ' ] == True :
2021-06-18 15:02:12 -04:00
## print(calc_passphrase)
2021-09-05 21:53:20 -04:00
calc_passphrase = calc_passphrase [ : : int ( self . _CONFIG [ ' WEB_SERVICE ' ] [ ' SHORTEN_SAMPLE ' ] ) ] [ - int ( self . _CONFIG [ ' WEB_SERVICE ' ] [ ' SHORTEN_LENGTH ' ] ) : ]
if self . _CONFIG [ ' WEB_SERVICE ' ] [ ' SHORTEN_PASSPHRASE ' ] == False :
2021-06-03 12:49:35 -04:00
pass
_calc_hash = bhex ( sha256 ( _salt_str + calc_passphrase ) . hexdigest ( ) )
#If exception, assume UMS down and default to calculated passphrase
except Exception as e :
2021-09-04 11:56:14 -04:00
logger . info ( ' Execption, Web Service possibly down ' )
2021-06-03 12:49:35 -04:00
_new_peer_id = bytes_4 ( int ( str ( int_id ( peer_id ) ) [ : 7 ] ) )
if peer_id_trimmed in burn_id :
logger . info ( ' User ID has been burned. Requiring passphrase version: ' + str ( burn_id [ peer_id_trimmed ] ) )
2021-09-05 21:53:20 -04:00
calc_passphrase = sha256 ( str ( self . _CONFIG [ ' WEB_SERVICE ' ] [ ' EXTRA_1 ' ] ) . encode ( ) + str ( self . _CONFIG [ ' WEB_SERVICE ' ] [ ' EXTRA_INT_1 ' ] ) . encode ( ) + str ( _new_peer_id ) . encode ( ) [ - 3 : ] ) . hexdigest ( ) . upper ( ) . encode ( ) [ : : 14 ] + base64 . b64encode ( bytes . fromhex ( str ( hex ( libscrc . ccitt ( ( _new_peer_id ) + burn_id [ peer_id_trimmed ] . to_bytes ( 2 , ' big ' ) + self . _CONFIG [ ' WEB_SERVICE ' ] [ ' BURN_INT ' ] . to_bytes ( 2 , ' big ' ) + self . _CONFIG [ ' WEB_SERVICE ' ] [ ' APPEND_INT ' ] . to_bytes ( 2 , ' big ' ) + bytes . fromhex ( str ( hex ( libscrc . posix ( ( _new_peer_id ) + burn_id [ peer_id_trimmed ] . to_bytes ( 2 , ' big ' ) + self . _CONFIG [ ' WEB_SERVICE ' ] [ ' BURN_INT ' ] . to_bytes ( 2 , ' big ' ) + self . _CONFIG [ ' WEB_SERVICE ' ] [ ' APPEND_INT ' ] . to_bytes ( 2 , ' big ' ) ) ) ) [ 2 : ] . zfill ( 8 ) ) ) ) ) [ 2 : ] . zfill ( 4 ) ) + ( _new_peer_id ) + burn_id [ peer_id_trimmed ] . to_bytes ( 2 , ' big ' ) + self . _CONFIG [ ' WEB_SERVICE ' ] [ ' BURN_INT ' ] . to_bytes ( 2 , ' big ' ) + self . _CONFIG [ ' WEB_SERVICE ' ] [ ' APPEND_INT ' ] . to_bytes ( 2 , ' big ' ) + bytes . fromhex ( str ( hex ( libscrc . posix ( ( _new_peer_id ) + burn_id [ peer_id_trimmed ] . to_bytes ( 2 , ' big ' ) + self . _CONFIG [ ' WEB_SERVICE ' ] [ ' BURN_INT ' ] . to_bytes ( 2 , ' big ' ) + self . _CONFIG [ ' WEB_SERVICE ' ] [ ' APPEND_INT ' ] . to_bytes ( 2 , ' big ' ) ) ) ) [ 2 : ] . zfill ( 8 ) ) ) + sha256 ( str ( self . _CONFIG [ ' WEB_SERVICE ' ] [ ' EXTRA_2 ' ] ) . encode ( ) + str ( self . _CONFIG [ ' WEB_SERVICE ' ] [ ' EXTRA_INT_2 ' ] ) . encode ( ) + str ( _new_peer_id ) . encode ( ) [ - 3 : ] ) . hexdigest ( ) . upper ( ) . encode ( ) [ : : 14 ]
2021-06-03 12:49:35 -04:00
else :
2021-09-05 21:53:20 -04:00
calc_passphrase = sha256 ( str ( self . _CONFIG [ ' WEB_SERVICE ' ] [ ' EXTRA_1 ' ] ) . encode ( ) + str ( self . _CONFIG [ ' WEB_SERVICE ' ] [ ' EXTRA_INT_1 ' ] ) . encode ( ) + str ( _new_peer_id ) . encode ( ) [ - 3 : ] ) . hexdigest ( ) . upper ( ) . encode ( ) [ : : 14 ] + base64 . b64encode ( bytes . fromhex ( str ( hex ( libscrc . ccitt ( ( _new_peer_id ) + self . _CONFIG [ ' WEB_SERVICE ' ] [ ' APPEND_INT ' ] . to_bytes ( 2 , ' big ' ) + bytes . fromhex ( str ( hex ( libscrc . posix ( ( _new_peer_id ) + self . _CONFIG [ ' WEB_SERVICE ' ] [ ' APPEND_INT ' ] . to_bytes ( 2 , ' big ' ) ) ) ) [ 2 : ] . zfill ( 8 ) ) ) ) ) [ 2 : ] . zfill ( 4 ) ) + ( _new_peer_id ) + self . _CONFIG [ ' WEB_SERVICE ' ] [ ' APPEND_INT ' ] . to_bytes ( 2 , ' big ' ) + bytes . fromhex ( str ( hex ( libscrc . posix ( ( _new_peer_id ) + self . _CONFIG [ ' WEB_SERVICE ' ] [ ' APPEND_INT ' ] . to_bytes ( 2 , ' big ' ) ) ) ) [ 2 : ] . zfill ( 8 ) ) ) + sha256 ( str ( self . _CONFIG [ ' WEB_SERVICE ' ] [ ' EXTRA_2 ' ] ) . encode ( ) + str ( self . _CONFIG [ ' WEB_SERVICE ' ] [ ' EXTRA_INT_2 ' ] ) . encode ( ) + str ( _new_peer_id ) . encode ( ) [ - 3 : ] ) . hexdigest ( ) . upper ( ) . encode ( ) [ : : 14 ]
2021-06-03 12:49:35 -04:00
2021-09-05 21:53:20 -04:00
#calc_passphrase = base64.b64encode(bytes.fromhex(str(hex(libscrc.ccitt((_new_peer_id) + self._CONFIG['WEB_SERVICE']['APPEND_INT'].to_bytes(2, 'big') + bytes.fromhex(str(hex(libscrc.posix((_new_peer_id) + self._CONFIG['WEB_SERVICE']['APPEND_INT'].to_bytes(2, 'big'))))[2:].zfill(8)))))[2:].zfill(4)) + (_new_peer_id) + self._CONFIG['WEB_SERVICE']['APPEND_INT'].to_bytes(2, 'big') + bytes.fromhex(str(hex(libscrc.posix((_new_peer_id) + self._CONFIG['WEB_SERVICE']['APPEND_INT'].to_bytes(2, 'big'))))[2:].zfill(8)))
if self . _CONFIG [ ' WEB_SERVICE ' ] [ ' SHORTEN_PASSPHRASE ' ] == True :
calc_passphrase = calc_passphrase [ : : int ( self . _CONFIG [ ' WEB_SERVICE ' ] [ ' SHORTEN_SAMPLE ' ] ) ] [ - int ( self . _CONFIG [ ' WEB_SERVICE ' ] [ ' SHORTEN_LENGTH ' ] ) : ]
if self . _CONFIG [ ' WEB_SERVICE ' ] [ ' SHORTEN_PASSPHRASE ' ] == False :
2021-06-03 12:49:35 -04:00
pass
_calc_hash = bhex ( sha256 ( _salt_str + calc_passphrase ) . hexdigest ( ) )
2021-08-07 19:15:32 -04:00
## print(calc_passphrase)
2021-06-03 20:19:44 -04:00
# print(_calc_hash)
2021-06-03 12:49:35 -04:00
return _calc_hash
2021-06-03 12:15:01 -04:00
2018-12-27 15:31:08 -05:00
def startProtocol ( self ) :
# Set up periodic loop for tracking pings from peers. Run every 'PING_TIME' seconds
self . _system_maintenance = task . LoopingCall ( self . maintenance_loop )
self . _system_maintenance_loop = self . _system_maintenance . start ( self . _CONFIG [ ' GLOBAL ' ] [ ' PING_TIME ' ] )
# Aliased in __init__ to maintenance_loop if system is a master
def master_maintenance_loop ( self ) :
logger . debug ( ' ( %s ) Master maintenance loop started ' , self . _system )
remove_list = [ ]
for peer in self . _peers :
_this_peer = self . _peers [ peer ]
# Check to see if any of the peers have been quiet (no ping) longer than allowed
if _this_peer [ ' LAST_PING ' ] + ( self . _CONFIG [ ' GLOBAL ' ] [ ' PING_TIME ' ] * self . _CONFIG [ ' GLOBAL ' ] [ ' MAX_MISSED ' ] ) < time ( ) :
remove_list . append ( peer )
for peer in remove_list :
logger . info ( ' ( %s ) Peer %s ( %s ) has timed out and is being removed ' , self . _system , self . _peers [ peer ] [ ' CALLSIGN ' ] , self . _peers [ peer ] [ ' RADIO_ID ' ] )
# Remove any timed out peers from the configuration
del self . _CONFIG [ ' SYSTEMS ' ] [ self . _system ] [ ' PEERS ' ] [ peer ]
# Aliased in __init__ to maintenance_loop if system is a peer
def peer_maintenance_loop ( self ) :
logger . debug ( ' ( %s ) Peer maintenance loop started ' , self . _system )
if self . _stats [ ' PING_OUTSTANDING ' ] :
self . _stats [ ' NUM_OUTSTANDING ' ] + = 1
# If we're not connected, zero out the stats and send a login request RPTL
if self . _stats [ ' CONNECTION ' ] != ' YES ' or self . _stats [ ' NUM_OUTSTANDING ' ] > = self . _CONFIG [ ' GLOBAL ' ] [ ' MAX_MISSED ' ] :
self . _stats [ ' PINGS_SENT ' ] = 0
self . _stats [ ' PINGS_ACKD ' ] = 0
self . _stats [ ' NUM_OUTSTANDING ' ] = 0
self . _stats [ ' PING_OUTSTANDING ' ] = False
self . _stats [ ' CONNECTION ' ] = ' RPTL_SENT '
2019-01-07 10:44:36 -05:00
self . send_master ( b ' ' . join ( [ RPTL , self . _config [ ' RADIO_ID ' ] ] ) )
2018-12-27 15:31:08 -05:00
logger . info ( ' ( %s ) Sending login request to master %s : %s ' , self . _system , self . _config [ ' MASTER_IP ' ] , self . _config [ ' MASTER_PORT ' ] )
# If we are connected, sent a ping to the master and increment the counter
if self . _stats [ ' CONNECTION ' ] == ' YES ' :
2019-01-07 10:44:36 -05:00
self . send_master ( b ' ' . join ( [ RPTPING , self . _config [ ' RADIO_ID ' ] ] ) )
2018-12-27 15:31:08 -05:00
logger . debug ( ' ( %s ) RPTPING Sent to Master. Total Sent: %s , Total Missed: %s , Currently Outstanding: %s ' , self . _system , self . _stats [ ' PINGS_SENT ' ] , self . _stats [ ' PINGS_SENT ' ] - self . _stats [ ' PINGS_ACKD ' ] , self . _stats [ ' NUM_OUTSTANDING ' ] )
self . _stats [ ' PINGS_SENT ' ] + = 1
self . _stats [ ' PING_OUTSTANDING ' ] = True
def send_peers ( self , _packet ) :
for _peer in self . _peers :
self . send_peer ( _peer , _packet )
#logger.debug('(%s) Packet sent to peer %s', self._system, self._peers[_peer]['RADIO_ID'])
def send_peer ( self , _peer , _packet ) :
2019-01-09 10:51:04 -05:00
if _packet [ : 4 ] == DMRD :
2019-01-07 11:47:53 -05:00
_packet = b ' ' . join ( [ _packet [ : 11 ] , _peer , _packet [ 15 : ] ] )
self . transport . write ( _packet , self . _peers [ _peer ] [ ' SOCKADDR ' ] )
2018-12-27 15:31:08 -05:00
# KEEP THE FOLLOWING COMMENTED OUT UNLESS YOU'RE DEBUGGING DEEPLY!!!!
#logger.debug('(%s) TX Packet to %s on port %s: %s', self._peers[_peer]['RADIO_ID'], self._peers[_peer]['IP'], self._peers[_peer]['PORT'], ahex(_packet))
def send_master ( self , _packet ) :
2019-01-09 10:51:04 -05:00
if _packet [ : 4 ] == DMRD :
2019-01-07 11:47:53 -05:00
_packet = b ' ' . join ( [ _packet [ : 11 ] , self . _config [ ' RADIO_ID ' ] , _packet [ 15 : ] ] )
2018-12-27 15:31:08 -05:00
self . transport . write ( _packet , self . _config [ ' MASTER_SOCKADDR ' ] )
# KEEP THE FOLLOWING COMMENTED OUT UNLESS YOU'RE DEBUGGING DEEPLY!!!!
# logger.debug('(%s) TX Packet to %s:%s -- %s', self._system, self._config['MASTER_IP'], self._config['MASTER_PORT'], ahex(_packet))
2020-10-24 20:53:48 -04:00
def send_xlxmaster ( self , radio , xlx , mastersock ) :
radio3 = int . from_bytes ( radio , ' big ' ) . to_bytes ( 3 , ' big ' )
radio4 = int . from_bytes ( radio , ' big ' ) . to_bytes ( 4 , ' big ' )
xlx3 = xlx . to_bytes ( 3 , ' big ' )
streamid = randint ( 0 , 255 ) . to_bytes ( 1 , ' big ' ) + randint ( 0 , 255 ) . to_bytes ( 1 , ' big ' ) + randint ( 0 , 255 ) . to_bytes ( 1 , ' big ' ) + randint ( 0 , 255 ) . to_bytes ( 1 , ' big ' )
# Wait for .5 secs for the XLX to log us in
for packetnr in range ( 5 ) :
if packetnr < 3 :
# First 3 packets, voice start, stream type e1
strmtype = 225
payload = bytearray . fromhex ( ' 4f2e00b501ae3a001c40a0c1cc7dff57d75df5d5065026f82880bd616f13f185890000 ' )
else :
# Last 2 packets, voice end, stream type e2
strmtype = 226
payload = bytearray . fromhex ( ' 4f410061011e3a781c30a061ccbdff57d75df5d2534425c02fe0b1216713e885ba0000 ' )
packetnr1 = packetnr . to_bytes ( 1 , ' big ' )
strmtype1 = strmtype . to_bytes ( 1 , ' big ' )
_packet = b ' ' . join ( [ DMRD , packetnr1 , radio3 , xlx3 , radio4 , strmtype1 , streamid , payload ] )
self . transport . write ( _packet , mastersock )
# KEEP THE FOLLOWING COMMENTED OUT UNLESS YOU'RE DEBUGGING DEEPLY!!!!
#logger.debug('(%s) XLX Module Change Packet: %s', self._system, ahex(_packet))
return
2018-12-27 15:31:08 -05:00
def dmrd_received ( self , _peer_id , _rf_src , _dst_id , _seq , _slot , _call_type , _frame_type , _dtype_vseq , _stream_id , _data ) :
pass
2021-09-06 19:06:14 -04:00
def mmdvm_cmd ( self , _cmd ) :
pass
2018-12-27 15:31:08 -05:00
def master_dereg ( self ) :
for _peer in self . _peers :
self . send_peer ( _peer , MSTCL + _peer )
logger . info ( ' ( %s ) De-Registration sent to Peer: %s ( %s ) ' , self . _system , self . _peers [ _peer ] [ ' CALLSIGN ' ] , self . _peers [ _peer ] [ ' RADIO_ID ' ] )
def peer_dereg ( self ) :
self . send_master ( RPTCL + self . _config [ ' RADIO_ID ' ] )
logger . info ( ' ( %s ) De-Registration sent to Master: %s : %s ' , self . _system , self . _config [ ' MASTER_SOCKADDR ' ] [ 0 ] , self . _config [ ' MASTER_SOCKADDR ' ] [ 1 ] )
# Aliased in __init__ to datagramReceived if system is a master
def master_datagramReceived ( self , _data , _sockaddr ) :
# Keep This Line Commented Unless HEAVILY Debugging!
# logger.debug('(%s) RX packet from %s -- %s', self._system, _sockaddr, ahex(_data))
# Extract the command, which is various length, all but one 4 significant characters -- RPTCL
_command = _data [ : 4 ]
2021-06-17 11:12:40 -04:00
## print(self._config)
2018-12-27 15:31:08 -05:00
2019-01-09 10:51:04 -05:00
if _command == DMRD : # DMRData -- encapsulated DMR data frame
2018-12-27 15:31:08 -05:00
_peer_id = _data [ 11 : 15 ]
if _peer_id in self . _peers \
and self . _peers [ _peer_id ] [ ' CONNECTION ' ] == ' YES ' \
and self . _peers [ _peer_id ] [ ' SOCKADDR ' ] == _sockaddr :
_seq = _data [ 4 ]
_rf_src = _data [ 5 : 8 ]
_dst_id = _data [ 8 : 11 ]
2018-12-27 17:46:35 -05:00
_bits = _data [ 15 ]
2018-12-27 15:31:08 -05:00
_slot = 2 if ( _bits & 0x80 ) else 1
#_call_type = 'unit' if (_bits & 0x40) else 'group'
if _bits & 0x40 :
_call_type = ' unit '
elif ( _bits & 0x23 ) == 0x23 :
_call_type = ' vcsbk '
else :
_call_type = ' group '
_frame_type = ( _bits & 0x30 ) >> 4
_dtype_vseq = ( _bits & 0xF ) # data, 1=voice header, 2=voice terminator; voice, 0=burst A ... 5=burst F
_stream_id = _data [ 16 : 20 ]
2019-12-15 11:55:19 -05:00
#logger.debug('(%s) DMRD - Seqence: %s, RF Source: %s, Destination ID: %s', self._system, _seq, int_id(_rf_src), int_id(_dst_id))
2018-12-27 15:31:08 -05:00
# ACL Processing
if self . _CONFIG [ ' GLOBAL ' ] [ ' USE_ACL ' ] :
if not acl_check ( _rf_src , self . _CONFIG [ ' GLOBAL ' ] [ ' SUB_ACL ' ] ) :
2019-09-25 15:36:20 -04:00
if self . _laststrid [ _slot ] != _stream_id :
2018-12-27 15:31:08 -05:00
logger . info ( ' ( %s ) CALL DROPPED WITH STREAM ID %s FROM SUBSCRIBER %s BY GLOBAL ACL ' , self . _system , int_id ( _stream_id ) , int_id ( _rf_src ) )
2019-09-25 15:36:20 -04:00
self . _laststrid [ _slot ] = _stream_id
2018-12-27 15:31:08 -05:00
return
if _slot == 1 and not acl_check ( _dst_id , self . _CONFIG [ ' GLOBAL ' ] [ ' TG1_ACL ' ] ) :
2019-09-25 15:36:20 -04:00
if self . _laststrid [ _slot ] != _stream_id :
2018-12-27 15:31:08 -05:00
logger . info ( ' ( %s ) CALL DROPPED WITH STREAM ID %s ON TGID %s BY GLOBAL TS1 ACL ' , self . _system , int_id ( _stream_id ) , int_id ( _dst_id ) )
2019-09-25 15:36:20 -04:00
self . _laststrid [ _slot ] = _stream_id
2018-12-27 15:31:08 -05:00
return
if _slot == 2 and not acl_check ( _dst_id , self . _CONFIG [ ' GLOBAL ' ] [ ' TG2_ACL ' ] ) :
2019-09-25 15:36:20 -04:00
if self . _laststrid [ _slot ] != _stream_id :
2018-12-27 15:31:08 -05:00
logger . info ( ' ( %s ) CALL DROPPED WITH STREAM ID %s ON TGID %s BY GLOBAL TS2 ACL ' , self . _system , int_id ( _stream_id ) , int_id ( _dst_id ) )
2019-09-25 15:36:20 -04:00
self . _laststrid [ _slot ] = _stream_id
2018-12-27 15:31:08 -05:00
return
if self . _config [ ' USE_ACL ' ] :
if not acl_check ( _rf_src , self . _config [ ' SUB_ACL ' ] ) :
2019-09-25 15:36:20 -04:00
if self . _laststrid [ _slot ] != _stream_id :
2018-12-27 15:31:08 -05:00
logger . info ( ' ( %s ) CALL DROPPED WITH STREAM ID %s FROM SUBSCRIBER %s BY SYSTEM ACL ' , self . _system , int_id ( _stream_id ) , int_id ( _rf_src ) )
2019-09-25 15:36:20 -04:00
self . _laststrid [ _slot ] = _stream_id
2018-12-27 15:31:08 -05:00
return
if _slot == 1 and not acl_check ( _dst_id , self . _config [ ' TG1_ACL ' ] ) :
2019-09-25 15:36:20 -04:00
if self . _laststrid [ _slot ] != _stream_id :
2018-12-27 15:31:08 -05:00
logger . info ( ' ( %s ) CALL DROPPED WITH STREAM ID %s ON TGID %s BY SYSTEM TS1 ACL ' , self . _system , int_id ( _stream_id ) , int_id ( _dst_id ) )
2019-09-25 15:36:20 -04:00
self . _laststrid [ _slot ] = _stream_id
2018-12-27 15:31:08 -05:00
return
if _slot == 2 and not acl_check ( _dst_id , self . _config [ ' TG2_ACL ' ] ) :
2019-09-25 15:36:20 -04:00
if self . _laststrid [ _slot ] != _stream_id :
2018-12-27 15:31:08 -05:00
logger . info ( ' ( %s ) CALL DROPPED WITH STREAM ID %s ON TGID %s BY SYSTEM TS2 ACL ' , self . _system , int_id ( _stream_id ) , int_id ( _dst_id ) )
2019-09-25 15:36:20 -04:00
self . _laststrid [ _slot ] = _stream_id
2018-12-27 15:31:08 -05:00
return
# The basic purpose of a master is to repeat to the peers
if self . _config [ ' REPEAT ' ] == True :
pkt = [ _data [ : 11 ] , ' ' , _data [ 15 : ] ]
for _peer in self . _peers :
if _peer != _peer_id :
pkt [ 1 ] = _peer
2018-12-27 17:46:35 -05:00
self . transport . write ( b ' ' . join ( pkt ) , self . _peers [ _peer ] [ ' SOCKADDR ' ] )
2018-12-27 15:31:08 -05:00
#logger.debug('(%s) Packet on TS%s from %s (%s) for destination ID %s repeated to peer: %s (%s) [Stream ID: %s]', self._system, _slot, self._peers[_peer_id]['CALLSIGN'], int_id(_peer_id), int_id(_dst_id), self._peers[_peer]['CALLSIGN'], int_id(_peer), int_id(_stream_id))
# Userland actions -- typically this is the function you subclass for an application
self . dmrd_received ( _peer_id , _rf_src , _dst_id , _seq , _slot , _call_type , _frame_type , _dtype_vseq , _stream_id , _data )
elif _command == RPTL : # RPTLogin -- a repeater wants to login
_peer_id = _data [ 4 : 8 ]
# Check to see if we've reached the maximum number of allowed peers
if len ( self . _peers ) < self . _config [ ' MAX_PEERS ' ] :
# Check for valid Radio ID
2021-05-06 21:14:20 -04:00
#print(self.check_user_man(_peer_id))
2021-05-06 11:09:47 -04:00
if self . _config [ ' USE_USER_MAN ' ] == True :
2021-09-05 21:53:20 -04:00
self . ums_response = self . check_user_man ( _peer_id , self . _CONFIG [ ' WEB_SERVICE ' ] [ ' THIS_SERVER_NAME ' ] , _sockaddr [ 0 ] , self . _system )
2021-05-06 21:14:20 -04:00
## print(self.ums_response)
2021-06-04 21:33:29 -04:00
#Will allow anyone to attempt authentication, used for a transition period
## if acl_check(_peer_id, self._CONFIG['GLOBAL']['REG_ACL']) and self.ums_response['allow'] or acl_check(_peer_id, self._CONFIG['GLOBAL']['REG_ACL']) and acl_check(_peer_id, self._config['REG_ACL']):
2021-05-06 21:14:20 -04:00
if acl_check ( _peer_id , self . _CONFIG [ ' GLOBAL ' ] [ ' REG_ACL ' ] ) and self . ums_response [ ' allow ' ] :
user_auth = self . ums_response [ ' allow ' ]
else :
user_auth = False
2021-09-04 11:56:14 -04:00
elif self . _config [ ' USE_USER_MAN ' ] == False :
2021-09-05 11:17:50 -04:00
## print('False')
2021-09-04 11:56:14 -04:00
#### print(self._config['REG_ACL'])
2021-09-05 21:53:20 -04:00
## print(self._CONFIG['WEB_SERVICE']['REMOTE_CONFIG_ENABLED'])
2021-09-04 11:56:14 -04:00
b_acl = self . _config [ ' REG_ACL ' ]
2021-09-05 21:53:20 -04:00
if self . _CONFIG [ ' WEB_SERVICE ' ] [ ' REMOTE_CONFIG_ENABLED ' ] == True :
2021-09-04 11:56:14 -04:00
b_acl = acl_build ( self . _config [ ' REG_ACL ' ] , 4294967295 )
print ( b_acl )
if acl_check ( _peer_id , self . _CONFIG [ ' GLOBAL ' ] [ ' REG_ACL ' ] ) and acl_check ( _peer_id , b_acl ) : #acl_check(_peer_id, b_acl):
2021-05-06 11:09:47 -04:00
user_auth = True
if user_auth == True :
# Build the configuration data strcuture for the peer
2018-12-27 15:31:08 -05:00
self . _peers . update ( { _peer_id : {
' CONNECTION ' : ' RPTL-RECEIVED ' ,
' CONNECTED ' : time ( ) ,
' PINGS_RECEIVED ' : 0 ,
' LAST_PING ' : time ( ) ,
' SOCKADDR ' : _sockaddr ,
' IP ' : _sockaddr [ 0 ] ,
' PORT ' : _sockaddr [ 1 ] ,
' SALT ' : randint ( 0 , 0xFFFFFFFF ) ,
' RADIO_ID ' : str ( int ( ahex ( _peer_id ) , 16 ) ) ,
' CALLSIGN ' : ' ' ,
' RX_FREQ ' : ' ' ,
' TX_FREQ ' : ' ' ,
' TX_POWER ' : ' ' ,
' COLORCODE ' : ' ' ,
' LATITUDE ' : ' ' ,
' LONGITUDE ' : ' ' ,
' HEIGHT ' : ' ' ,
' LOCATION ' : ' ' ,
' DESCRIPTION ' : ' ' ,
' SLOTS ' : ' ' ,
' URL ' : ' ' ,
' SOFTWARE_ID ' : ' ' ,
' PACKAGE_ID ' : ' ' ,
} } )
logger . info ( ' ( %s ) Repeater Logging in with Radio ID: %s , %s : %s ' , self . _system , int_id ( _peer_id ) , _sockaddr [ 0 ] , _sockaddr [ 1 ] )
2019-01-04 16:32:13 -05:00
_salt_str = bytes_4 ( self . _peers [ _peer_id ] [ ' SALT ' ] )
2019-01-07 10:44:36 -05:00
self . send_peer ( _peer_id , b ' ' . join ( [ RPTACK , _salt_str ] ) )
2018-12-27 15:31:08 -05:00
self . _peers [ _peer_id ] [ ' CONNECTION ' ] = ' CHALLENGE_SENT '
logger . info ( ' ( %s ) Sent Challenge Response to %s for login: %s ' , self . _system , int_id ( _peer_id ) , self . _peers [ _peer_id ] [ ' SALT ' ] )
2021-06-04 00:08:31 -04:00
## print(self._peers)
2018-12-27 15:31:08 -05:00
else :
2019-01-07 10:44:36 -05:00
self . transport . write ( b ' ' . join ( [ MSTNAK , _peer_id ] ) , _sockaddr )
2020-03-09 14:28:11 -04:00
logger . warning ( ' ( %s ) Invalid Login from %s Radio ID: %s Denied by Registation ACL ' , self . _system , _sockaddr [ 0 ] , int_id ( _peer_id ) )
2018-12-27 15:31:08 -05:00
else :
2019-01-07 10:44:36 -05:00
self . transport . write ( b ' ' . join ( [ MSTNAK , _peer_id ] ) , _sockaddr )
2018-12-27 15:31:08 -05:00
logger . warning ( ' ( %s ) Registration denied from Radio ID: %s Maximum number of peers exceeded ' , self . _system , int_id ( _peer_id ) )
elif _command == RPTK : # Repeater has answered our login challenge
_peer_id = _data [ 4 : 8 ]
if _peer_id in self . _peers \
and self . _peers [ _peer_id ] [ ' CONNECTION ' ] == ' CHALLENGE_SENT ' \
and self . _peers [ _peer_id ] [ ' SOCKADDR ' ] == _sockaddr :
_this_peer = self . _peers [ _peer_id ]
_this_peer [ ' LAST_PING ' ] = time ( )
_sent_hash = _data [ 8 : ]
2019-01-04 16:32:13 -05:00
_salt_str = bytes_4 ( _this_peer [ ' SALT ' ] )
2021-05-26 14:06:12 -04:00
# Used to allow config passphrase AND calculated.
_ocalc_hash = bhex ( sha256 ( _salt_str + self . _config [ ' PASSPHRASE ' ] ) . hexdigest ( ) )
2021-05-10 16:02:53 -04:00
#print(self.ums_response)
if self . _config [ ' USE_USER_MAN ' ] == True :
2021-06-03 16:38:47 -04:00
# print(self.calc_passphrase(_peer_id, _salt_str))
2021-06-03 12:15:01 -04:00
_calc_hash = self . calc_passphrase ( _peer_id , _salt_str )
2021-05-10 16:02:53 -04:00
if self . _config [ ' USE_USER_MAN ' ] == False :
_calc_hash = bhex ( sha256 ( _salt_str + self . _config [ ' PASSPHRASE ' ] ) . hexdigest ( ) )
2021-06-03 12:15:01 -04:00
# Uncomment below to only accept calculated passphrase
2021-06-19 15:45:54 -04:00
if _sent_hash == _calc_hash :
2021-06-03 12:15:01 -04:00
# Condition below accepts either calculated passphrase or config passphrase
2021-06-19 15:45:54 -04:00
## if _sent_hash == _calc_hash or _sent_hash == _ocalc_hash:
2018-12-27 15:31:08 -05:00
_this_peer [ ' CONNECTION ' ] = ' WAITING_CONFIG '
2019-01-07 10:44:36 -05:00
self . send_peer ( _peer_id , b ' ' . join ( [ RPTACK , _peer_id ] ) )
2018-12-27 15:31:08 -05:00
logger . info ( ' ( %s ) Peer %s has completed the login exchange successfully ' , self . _system , _this_peer [ ' RADIO_ID ' ] )
2021-09-05 21:53:20 -04:00
self . send_login_conf ( _peer_id , self . _CONFIG [ ' WEB_SERVICE ' ] [ ' THIS_SERVER_NAME ' ] , _sockaddr [ 0 ] , False )
2021-06-19 15:45:54 -04:00
## if _sent_hash == _ocalc_hash:
2021-09-05 21:53:20 -04:00
## self.send_login_conf(_peer_id, self._CONFIG['WEB_SERVICE']['THIS_SERVER_NAME'], _sockaddr[0], True)
2021-06-19 15:45:54 -04:00
## else:
2021-09-05 21:53:20 -04:00
## self.send_login_conf(_peer_id, self._CONFIG['WEB_SERVICE']['THIS_SERVER_NAME'], _sockaddr[0], False)
2018-12-27 15:31:08 -05:00
else :
logger . info ( ' ( %s ) Peer %s has FAILED the login exchange successfully ' , self . _system , _this_peer [ ' RADIO_ID ' ] )
2019-01-07 10:44:36 -05:00
self . transport . write ( b ' ' . join ( [ MSTNAK , _peer_id ] ) , _sockaddr )
2018-12-27 15:31:08 -05:00
del self . _peers [ _peer_id ]
else :
2019-01-07 10:44:36 -05:00
self . transport . write ( b ' ' . join ( [ MSTNAK , _peer_id ] ) , _sockaddr )
2018-12-27 15:31:08 -05:00
logger . warning ( ' ( %s ) Login challenge from Radio ID that has not logged in: %s ' , self . _system , int_id ( _peer_id ) )
elif _command == RPTC : # Repeater is sending it's configuraiton OR disconnecting
if _data [ : 5 ] == RPTCL : # Disconnect command
_peer_id = _data [ 5 : 9 ]
if _peer_id in self . _peers \
and self . _peers [ _peer_id ] [ ' CONNECTION ' ] == ' YES ' \
and self . _peers [ _peer_id ] [ ' SOCKADDR ' ] == _sockaddr :
logger . info ( ' ( %s ) Peer is closing down: %s ( %s ) ' , self . _system , self . _peers [ _peer_id ] [ ' CALLSIGN ' ] , int_id ( _peer_id ) )
2019-01-07 10:44:36 -05:00
self . transport . write ( b ' ' . join ( [ MSTNAK , _peer_id ] ) , _sockaddr )
2018-12-27 15:31:08 -05:00
del self . _peers [ _peer_id ]
else :
_peer_id = _data [ 4 : 8 ] # Configure Command
if _peer_id in self . _peers \
and self . _peers [ _peer_id ] [ ' CONNECTION ' ] == ' WAITING_CONFIG ' \
and self . _peers [ _peer_id ] [ ' SOCKADDR ' ] == _sockaddr :
_this_peer = self . _peers [ _peer_id ]
_this_peer [ ' CONNECTION ' ] = ' YES '
_this_peer [ ' CONNECTED ' ] = time ( )
_this_peer [ ' LAST_PING ' ] = time ( )
_this_peer [ ' CALLSIGN ' ] = _data [ 8 : 16 ]
_this_peer [ ' RX_FREQ ' ] = _data [ 16 : 25 ]
_this_peer [ ' TX_FREQ ' ] = _data [ 25 : 34 ]
_this_peer [ ' TX_POWER ' ] = _data [ 34 : 36 ]
_this_peer [ ' COLORCODE ' ] = _data [ 36 : 38 ]
_this_peer [ ' LATITUDE ' ] = _data [ 38 : 46 ]
_this_peer [ ' LONGITUDE ' ] = _data [ 46 : 55 ]
_this_peer [ ' HEIGHT ' ] = _data [ 55 : 58 ]
_this_peer [ ' LOCATION ' ] = _data [ 58 : 78 ]
_this_peer [ ' DESCRIPTION ' ] = _data [ 78 : 97 ]
_this_peer [ ' SLOTS ' ] = _data [ 97 : 98 ]
_this_peer [ ' URL ' ] = _data [ 98 : 222 ]
_this_peer [ ' SOFTWARE_ID ' ] = _data [ 222 : 262 ]
_this_peer [ ' PACKAGE_ID ' ] = _data [ 262 : 302 ]
2019-01-07 10:44:36 -05:00
self . send_peer ( _peer_id , b ' ' . join ( [ RPTACK , _peer_id ] ) )
2018-12-27 15:31:08 -05:00
logger . info ( ' ( %s ) Peer %s ( %s ) has sent repeater configuration ' , self . _system , _this_peer [ ' CALLSIGN ' ] , _this_peer [ ' RADIO_ID ' ] )
2021-09-06 19:06:14 -04:00
if ' NO_MAP ' in str ( _this_peer [ ' LOCATION ' ] ) :
self . send_peer_loc ( _peer_id , self . _peers [ _peer_id ] [ ' CALLSIGN ' ] , ' * ' , ' * ' , ' * ' , ' * ' , ' * ' , ' * ' )
## print(_this_peer['LOCATION'])
## pass
else :
self . send_peer_loc ( _peer_id , _this_peer [ ' CALLSIGN ' ] , _this_peer [ ' LATITUDE ' ] , _this_peer [ ' LONGITUDE ' ] , _this_peer [ ' URL ' ] , _this_peer [ ' DESCRIPTION ' ] , _this_peer [ ' LOCATION ' ] , str ( _this_peer [ ' PACKAGE_ID ' ] ) + ' - ' + str ( _this_peer [ ' SOFTWARE_ID ' ] ) )
2018-12-27 15:31:08 -05:00
else :
2019-01-07 10:44:36 -05:00
self . transport . write ( b ' ' . join ( [ MSTNAK , _peer_id ] ) , _sockaddr )
2018-12-27 15:31:08 -05:00
logger . warning ( ' ( %s ) Peer info from Radio ID that has not logged in: %s ' , self . _system , int_id ( _peer_id ) )
elif _command == RPTP : # RPTPing -- peer is pinging us
_peer_id = _data [ 7 : 11 ]
if _peer_id in self . _peers \
and self . _peers [ _peer_id ] [ ' CONNECTION ' ] == " YES " \
and self . _peers [ _peer_id ] [ ' SOCKADDR ' ] == _sockaddr :
self . _peers [ _peer_id ] [ ' PINGS_RECEIVED ' ] + = 1
self . _peers [ _peer_id ] [ ' LAST_PING ' ] = time ( )
2019-01-07 10:44:36 -05:00
self . send_peer ( _peer_id , b ' ' . join ( [ MSTPONG , _peer_id ] ) )
2018-12-27 15:31:08 -05:00
logger . debug ( ' ( %s ) Received and answered RPTPING from peer %s ( %s ) ' , self . _system , self . _peers [ _peer_id ] [ ' CALLSIGN ' ] , int_id ( _peer_id ) )
else :
2019-01-07 10:44:36 -05:00
self . transport . write ( b ' ' . join ( [ MSTNAK , _peer_id ] ) , _sockaddr )
2018-12-27 15:31:08 -05:00
logger . warning ( ' ( %s ) Ping from Radio ID that is not logged in: %s ' , self . _system , int_id ( _peer_id ) )
2020-10-24 21:14:06 -04:00
elif _command == RPTO :
_peer_id = _data [ 4 : 8 ]
if _peer_id in self . _peers \
and self . _peers [ _peer_id ] [ ' CONNECTION ' ] == ' YES ' \
and self . _peers [ _peer_id ] [ ' SOCKADDR ' ] == _sockaddr :
logger . info ( ' ( %s ) Peer %s ( %s ) has send options: %s ' , self . _system , self . _peers [ _peer_id ] [ ' CALLSIGN ' ] , int_id ( _peer_id ) , _data [ 8 : ] )
2021-08-08 17:17:13 -04:00
# Send remove from map command
2021-09-06 19:06:14 -04:00
## self.mmdvm_cmd(_data)
2021-08-08 17:17:13 -04:00
if ' NO_MAP ' in str ( _data [ 8 : ] ) :
self . send_peer_loc ( _peer_id , self . _peers [ _peer_id ] [ ' CALLSIGN ' ] , ' * ' , ' * ' , ' * ' , ' * ' , ' * ' , ' * ' )
2020-10-24 21:14:06 -04:00
self . transport . write ( b ' ' . join ( [ RPTACK , _peer_id ] ) , _sockaddr )
elif _command == DMRA :
_peer_id = _data [ 4 : 8 ]
logger . info ( ' ( %s ) Recieved DMR Talker Alias from peer %s , subscriber %s ' , self . _system , self . _peers [ _peer_id ] [ ' CALLSIGN ' ] , int_id ( _rf_src ) )
2018-12-27 15:31:08 -05:00
else :
logger . error ( ' ( %s ) Unrecognized command. Raw HBP PDU: %s ' , self . _system , ahex ( _data ) )
# Aliased in __init__ to datagramReceived if system is a peer
def peer_datagramReceived ( self , _data , _sockaddr ) :
# Keep This Line Commented Unless HEAVILY Debugging!
# logger.debug('(%s) RX packet from %s -- %s', self._system, _sockaddr, ahex(_data))
# Validate that we receveived this packet from the master - security check!
if self . _config [ ' MASTER_SOCKADDR ' ] == _sockaddr :
# Extract the command, which is various length, but only 4 significant characters
_command = _data [ : 4 ]
2019-01-09 10:51:04 -05:00
if _command == DMRD : # DMRData -- encapsulated DMR data frame
2018-12-27 15:31:08 -05:00
_peer_id = _data [ 11 : 15 ]
if self . _config [ ' LOOSE ' ] or _peer_id == self . _config [ ' RADIO_ID ' ] : # Validate the Radio_ID unless using loose validation
_seq = _data [ 4 : 5 ]
_rf_src = _data [ 5 : 8 ]
_dst_id = _data [ 8 : 11 ]
_bits = _data [ 15 ]
_slot = 2 if ( _bits & 0x80 ) else 1
#_call_type = 'unit' if (_bits & 0x40) else 'group'
if _bits & 0x40 :
_call_type = ' unit '
elif ( _bits & 0x23 ) == 0x23 :
_call_type = ' vcsbk '
else :
_call_type = ' group '
_frame_type = ( _bits & 0x30 ) >> 4
_dtype_vseq = ( _bits & 0xF ) # data, 1=voice header, 2=voice terminator; voice, 0=burst A ... 5=burst F
_stream_id = _data [ 16 : 20 ]
#logger.debug('(%s) DMRD - Sequence: %s, RF Source: %s, Destination ID: %s', self._system, int_id(_seq), int_id(_rf_src), int_id(_dst_id))
2019-01-09 10:51:04 -05:00
2018-12-27 15:31:08 -05:00
# ACL Processing
if self . _CONFIG [ ' GLOBAL ' ] [ ' USE_ACL ' ] :
if not acl_check ( _rf_src , self . _CONFIG [ ' GLOBAL ' ] [ ' SUB_ACL ' ] ) :
2019-09-25 15:36:20 -04:00
if self . _laststrid [ _slot ] != _stream_id :
logger . info ( ' ( %s ) CALL DROPPED WITH STREAM ID %s FROM SUBSCRIBER %s BY GLOBAL ACL ' , self . _system , int_id ( _stream_id ) , int_id ( _rf_src ) )
self . _laststrid [ _slot ] = _stream_id
2018-12-27 15:31:08 -05:00
return
if _slot == 1 and not acl_check ( _dst_id , self . _CONFIG [ ' GLOBAL ' ] [ ' TG1_ACL ' ] ) :
2019-09-25 15:36:20 -04:00
if self . _laststrid [ _slot ] != _stream_id :
logger . info ( ' ( %s ) CALL DROPPED WITH STREAM ID %s ON TGID %s BY GLOBAL TS1 ACL ' , self . _system , int_id ( _stream_id ) , int_id ( _dst_id ) )
self . _laststrid [ _slot ] = _stream_id
2018-12-27 15:31:08 -05:00
return
if _slot == 2 and not acl_check ( _dst_id , self . _CONFIG [ ' GLOBAL ' ] [ ' TG2_ACL ' ] ) :
2019-09-25 15:36:20 -04:00
if self . _laststrid [ _slot ] != _stream_id :
logger . info ( ' ( %s ) CALL DROPPED WITH STREAM ID %s ON TGID %s BY GLOBAL TS2 ACL ' , self . _system , int_id ( _stream_id ) , int_id ( _dst_id ) )
self . _laststrid [ _slot ] = _stream_id
2018-12-27 15:31:08 -05:00
return
if self . _config [ ' USE_ACL ' ] :
if not acl_check ( _rf_src , self . _config [ ' SUB_ACL ' ] ) :
2019-09-25 15:36:20 -04:00
if self . _laststrid [ _slot ] != _stream_id :
logger . info ( ' ( %s ) CALL DROPPED WITH STREAM ID %s FROM SUBSCRIBER %s BY SYSTEM ACL ' , self . _system , int_id ( _stream_id ) , int_id ( _rf_src ) )
self . _laststrid [ _slot ] = _stream_id
2018-12-27 15:31:08 -05:00
return
if _slot == 1 and not acl_check ( _dst_id , self . _config [ ' TG1_ACL ' ] ) :
2019-09-25 15:36:20 -04:00
if self . _laststrid [ _slot ] != _stream_id :
logger . info ( ' ( %s ) CALL DROPPED WITH STREAM ID %s ON TGID %s BY SYSTEM TS1 ACL ' , self . _system , int_id ( _stream_id ) , int_id ( _dst_id ) )
self . _laststrid [ _slot ] = _stream_id
2018-12-27 15:31:08 -05:00
return
if _slot == 2 and not acl_check ( _dst_id , self . _config [ ' TG2_ACL ' ] ) :
2019-09-25 15:36:20 -04:00
if self . _laststrid [ _slot ] != _stream_id :
logger . info ( ' ( %s ) CALL DROPPED WITH STREAM ID %s ON TGID %s BY SYSTEM TS2 ACL ' , self . _system , int_id ( _stream_id ) , int_id ( _dst_id ) )
self . _laststrid [ _slot ] = _stream_id
2018-12-27 15:31:08 -05:00
return
# Userland actions -- typically this is the function you subclass for an application
self . dmrd_received ( _peer_id , _rf_src , _dst_id , _seq , _slot , _call_type , _frame_type , _dtype_vseq , _stream_id , _data )
elif _command == MSTN : # Actually MSTNAK -- a NACK from the master
_peer_id = _data [ 6 : 10 ]
if self . _config [ ' LOOSE ' ] or _peer_id == self . _config [ ' RADIO_ID ' ] : # Validate the Radio_ID unless using loose validation
logger . warning ( ' ( %s ) MSTNAK Received. Resetting connection to the Master. ' , self . _system )
self . _stats [ ' CONNECTION ' ] = ' NO ' # Disconnect ourselves and re-register
self . _stats [ ' CONNECTED ' ] = time ( )
elif _command == RPTA : # Actually RPTACK -- an ACK from the master
# Depending on the state, an RPTACK means different things, in each clause, we check and/or set the state
if self . _stats [ ' CONNECTION ' ] == ' RPTL_SENT ' : # If we've sent a login request...
_login_int32 = _data [ 6 : 10 ]
logger . info ( ' ( %s ) Repeater Login ACK Received with 32bit ID: %s ' , self . _system , int_id ( _login_int32 ) )
2019-01-07 10:44:36 -05:00
_pass_hash = sha256 ( b ' ' . join ( [ _login_int32 , self . _config [ ' PASSPHRASE ' ] ] ) ) . hexdigest ( )
2018-12-27 15:31:08 -05:00
_pass_hash = bhex ( _pass_hash )
2019-01-07 10:44:36 -05:00
self . send_master ( b ' ' . join ( [ RPTK , self . _config [ ' RADIO_ID ' ] , _pass_hash ] ) )
2018-12-27 15:31:08 -05:00
self . _stats [ ' CONNECTION ' ] = ' AUTHENTICATED '
elif self . _stats [ ' CONNECTION ' ] == ' AUTHENTICATED ' : # If we've sent the login challenge...
_peer_id = _data [ 6 : 10 ]
if self . _config [ ' LOOSE ' ] or _peer_id == self . _config [ ' RADIO_ID ' ] : # Validate the Radio_ID unless using loose validation
logger . info ( ' ( %s ) Repeater Authentication Accepted ' , self . _system )
2019-01-07 10:44:36 -05:00
_config_packet = b ' ' . join ( [ \
self . _config [ ' RADIO_ID ' ] , \
self . _config [ ' CALLSIGN ' ] , \
self . _config [ ' RX_FREQ ' ] , \
self . _config [ ' TX_FREQ ' ] , \
self . _config [ ' TX_POWER ' ] , \
self . _config [ ' COLORCODE ' ] , \
self . _config [ ' LATITUDE ' ] , \
self . _config [ ' LONGITUDE ' ] , \
self . _config [ ' HEIGHT ' ] , \
self . _config [ ' LOCATION ' ] , \
self . _config [ ' DESCRIPTION ' ] , \
self . _config [ ' SLOTS ' ] , \
self . _config [ ' URL ' ] , \
self . _config [ ' SOFTWARE_ID ' ] , \
self . _config [ ' PACKAGE_ID ' ] \
] )
self . send_master ( b ' ' . join ( [ RPTC , _config_packet ] ) )
2018-12-27 15:31:08 -05:00
self . _stats [ ' CONNECTION ' ] = ' CONFIG-SENT '
logger . info ( ' ( %s ) Repeater Configuration Sent ' , self . _system )
else :
self . _stats [ ' CONNECTION ' ] = ' NO '
logger . error ( ' ( %s ) Master ACK Contained wrong ID - Connection Reset ' , self . _system )
elif self . _stats [ ' CONNECTION ' ] == ' CONFIG-SENT ' : # If we've sent out configuration to the master
_peer_id = _data [ 6 : 10 ]
if self . _config [ ' LOOSE ' ] or _peer_id == self . _config [ ' RADIO_ID ' ] : # Validate the Radio_ID unless using loose validation
logger . info ( ' ( %s ) Repeater Configuration Accepted ' , self . _system )
if self . _config [ ' OPTIONS ' ] :
2019-01-07 10:44:36 -05:00
self . send_master ( b ' ' . join ( [ RPTO , self . _config [ ' RADIO_ID ' ] , self . _config [ ' OPTIONS ' ] ] ) )
2018-12-27 15:31:08 -05:00
self . _stats [ ' CONNECTION ' ] = ' OPTIONS-SENT '
logger . info ( ' ( %s ) Sent options: ( %s ) ' , self . _system , self . _config [ ' OPTIONS ' ] )
else :
self . _stats [ ' CONNECTION ' ] = ' YES '
self . _stats [ ' CONNECTED ' ] = time ( )
logger . info ( ' ( %s ) Connection to Master Completed ' , self . _system )
2020-10-24 21:14:06 -04:00
2020-10-24 20:53:48 -04:00
# If we are an XLX, send the XLX module request here.
if self . _config [ ' MODE ' ] == ' XLXPEER ' :
self . send_xlxmaster ( self . _config [ ' RADIO_ID ' ] , int ( 4000 ) , self . _config [ ' MASTER_SOCKADDR ' ] )
self . send_xlxmaster ( self . _config [ ' RADIO_ID ' ] , self . _config [ ' XLXMODULE ' ] , self . _config [ ' MASTER_SOCKADDR ' ] )
logger . info ( ' ( %s ) Sending XLX Module request ' , self . _system )
2018-12-27 15:31:08 -05:00
else :
self . _stats [ ' CONNECTION ' ] = ' NO '
logger . error ( ' ( %s ) Master ACK Contained wrong ID - Connection Reset ' , self . _system )
elif self . _stats [ ' CONNECTION ' ] == ' OPTIONS-SENT ' : # If we've sent out options to the master
_peer_id = _data [ 6 : 10 ]
if self . _config [ ' LOOSE ' ] or _peer_id == self . _config [ ' RADIO_ID ' ] : # Validate the Radio_ID unless using loose validation
logger . info ( ' ( %s ) Repeater Options Accepted ' , self . _system )
self . _stats [ ' CONNECTION ' ] = ' YES '
self . _stats [ ' CONNECTED ' ] = time ( )
logger . info ( ' ( %s ) Connection to Master Completed with options ' , self . _system )
else :
self . _stats [ ' CONNECTION ' ] = ' NO '
logger . error ( ' ( %s ) Master ACK Contained wrong ID - Connection Reset ' , self . _system )
elif _command == MSTP : # Actually MSTPONG -- a reply to RPTPING (send by peer)
_peer_id = _data [ 7 : 11 ]
if self . _config [ ' LOOSE ' ] or _peer_id == self . _config [ ' RADIO_ID ' ] : # Validate the Radio_ID unless using loose validation
self . _stats [ ' PING_OUTSTANDING ' ] = False
self . _stats [ ' NUM_OUTSTANDING ' ] = 0
self . _stats [ ' PINGS_ACKD ' ] + = 1
logger . debug ( ' ( %s ) MSTPONG Received. Pongs Since Connected: %s ' , self . _system , self . _stats [ ' PINGS_ACKD ' ] )
elif _command == MSTC : # Actually MSTCL -- notify us the master is closing down
_peer_id = _data [ 5 : 9 ]
if self . _config [ ' LOOSE ' ] or _peer_id == self . _config [ ' RADIO_ID ' ] : # Validate the Radio_ID unless using loose validation
self . _stats [ ' CONNECTION ' ] = ' NO '
logger . info ( ' ( %s ) MSTCL Recieved ' , self . _system )
else :
logger . error ( ' ( %s ) Received an invalid command in packet: %s ' , self . _system , ahex ( _data ) )
#
# Socket-based reporting section
#
class report ( NetstringReceiver ) :
def __init__ ( self , factory ) :
self . _factory = factory
def connectionMade ( self ) :
self . _factory . clients . append ( self )
2019-01-07 10:44:36 -05:00
logger . info ( ' (REPORT) HBlink reporting client connected: %s ' , self . transport . getPeer ( ) )
2018-12-27 15:31:08 -05:00
def connectionLost ( self , reason ) :
2019-01-07 10:44:36 -05:00
logger . info ( ' (REPORT) HBlink reporting client disconnected: %s ' , self . transport . getPeer ( ) )
2018-12-27 15:31:08 -05:00
self . _factory . clients . remove ( self )
def stringReceived ( self , data ) :
self . process_message ( data )
def process_message ( self , _message ) :
opcode = _message [ : 1 ]
if opcode == REPORT_OPCODES [ ' CONFIG_REQ ' ] :
2019-01-07 10:44:36 -05:00
logger . info ( ' (REPORT) HBlink reporting client sent \' CONFIG_REQ \' : %s ' , self . transport . getPeer ( ) )
2018-12-27 15:31:08 -05:00
self . send_config ( )
else :
2019-01-07 10:44:36 -05:00
logger . error ( ' (REPORT) got unknown opcode ' )
2018-12-27 15:31:08 -05:00
class reportFactory ( Factory ) :
def __init__ ( self , config ) :
self . _config = config
def buildProtocol ( self , addr ) :
if ( addr . host ) in self . _config [ ' REPORTS ' ] [ ' REPORT_CLIENTS ' ] or ' * ' in self . _config [ ' REPORTS ' ] [ ' REPORT_CLIENTS ' ] :
2019-01-07 10:44:36 -05:00
logger . debug ( ' (REPORT) Permitting report server connection attempt from: %s : %s ' , addr . host , addr . port )
2018-12-27 15:31:08 -05:00
return report ( self )
else :
2019-01-07 10:44:36 -05:00
logger . error ( ' (REPORT) Invalid report server connection attempt from: %s : %s ' , addr . host , addr . port )
2018-12-27 15:31:08 -05:00
return None
def send_clients ( self , _message ) :
for client in self . clients :
client . sendString ( _message )
def send_config ( self ) :
2019-01-04 16:32:13 -05:00
serialized = pickle . dumps ( self . _config [ ' SYSTEMS ' ] , protocol = 2 ) #.decode('utf-8', errors='ignore') #pickle.HIGHEST_PROTOCOL)
2019-01-07 10:44:36 -05:00
self . send_clients ( b ' ' . join ( [ REPORT_OPCODES [ ' CONFIG_SND ' ] , serialized ] ) )
2018-12-27 15:31:08 -05:00
# ID ALIAS CREATION
# Download
def mk_aliases ( _config ) :
if _config [ ' ALIASES ' ] [ ' TRY_DOWNLOAD ' ] == True :
# Try updating peer aliases file
result = try_download ( _config [ ' ALIASES ' ] [ ' PATH ' ] , _config [ ' ALIASES ' ] [ ' PEER_FILE ' ] , _config [ ' ALIASES ' ] [ ' PEER_URL ' ] , _config [ ' ALIASES ' ] [ ' STALE_TIME ' ] )
2019-01-07 10:44:36 -05:00
logger . info ( ' (GLOBAL) %s ' , result )
2018-12-27 15:31:08 -05:00
# Try updating subscriber aliases file
result = try_download ( _config [ ' ALIASES ' ] [ ' PATH ' ] , _config [ ' ALIASES ' ] [ ' SUBSCRIBER_FILE ' ] , _config [ ' ALIASES ' ] [ ' SUBSCRIBER_URL ' ] , _config [ ' ALIASES ' ] [ ' STALE_TIME ' ] )
2019-01-07 10:44:36 -05:00
logger . info ( ' (GLOBAL) %s ' , result )
2018-12-27 15:31:08 -05:00
# Make Dictionaries
peer_ids = mk_id_dict ( _config [ ' ALIASES ' ] [ ' PATH ' ] , _config [ ' ALIASES ' ] [ ' PEER_FILE ' ] )
if peer_ids :
2019-01-07 10:44:36 -05:00
logger . info ( ' (GLOBAL) ID ALIAS MAPPER: peer_ids dictionary is available ' )
2018-12-27 15:31:08 -05:00
subscriber_ids = mk_id_dict ( _config [ ' ALIASES ' ] [ ' PATH ' ] , _config [ ' ALIASES ' ] [ ' SUBSCRIBER_FILE ' ] )
if subscriber_ids :
2019-01-07 10:44:36 -05:00
logger . info ( ' (GLOBAL) ID ALIAS MAPPER: subscriber_ids dictionary is available ' )
2018-12-27 15:31:08 -05:00
talkgroup_ids = mk_id_dict ( _config [ ' ALIASES ' ] [ ' PATH ' ] , _config [ ' ALIASES ' ] [ ' TGID_FILE ' ] )
if talkgroup_ids :
2019-01-07 10:44:36 -05:00
logger . info ( ' (GLOBAL) ID ALIAS MAPPER: talkgroup_ids dictionary is available ' )
2018-12-27 15:31:08 -05:00
return peer_ids , subscriber_ids , talkgroup_ids
#************************************************
# MAIN PROGRAM LOOP STARTS HERE
#************************************************
if __name__ == ' __main__ ' :
# Python modules we need
import argparse
import sys
import os
import signal
# Change the current directory to the location of the application
os . chdir ( os . path . dirname ( os . path . realpath ( sys . argv [ 0 ] ) ) )
# CLI argument parser - handles picking up the config file from the command line, and sending a "help" message
parser = argparse . ArgumentParser ( )
parser . add_argument ( ' -c ' , ' --config ' , action = ' store ' , dest = ' CONFIG_FILE ' , help = ' /full/path/to/config.file (usually hblink.cfg) ' )
parser . add_argument ( ' -l ' , ' --logging ' , action = ' store ' , dest = ' LOG_LEVEL ' , help = ' Override config file logging level. ' )
cli_args = parser . parse_args ( )
# Ensure we have a path for the config file, if one wasn't specified, then use the execution directory
if not cli_args . CONFIG_FILE :
cli_args . CONFIG_FILE = os . path . dirname ( os . path . abspath ( __file__ ) ) + ' /hblink.cfg '
# Call the external routine to build the configuration dictionary
CONFIG = config . build_config ( cli_args . CONFIG_FILE )
# Call the external routing to start the system logger
if cli_args . LOG_LEVEL :
CONFIG [ ' LOGGER ' ] [ ' LOG_LEVEL ' ] = cli_args . LOG_LEVEL
logger = log . config_logging ( CONFIG [ ' LOGGER ' ] )
2020-03-16 10:35:28 -04:00
logger . info ( ' \n \n Copyright (c) 2013, 2014, 2015, 2016, 2018, 2019, 2020 \n \t The Regents of the K0USY Group. All rights reserved. \n ' )
2019-01-07 10:44:36 -05:00
logger . debug ( ' (GLOBAL) Logging system started, anything from here on gets logged ' )
2019-01-04 16:32:13 -05:00
2018-12-27 15:31:08 -05:00
# Set up the signal handler
def sig_handler ( _signal , _frame ) :
2019-01-07 10:44:36 -05:00
logger . info ( ' (GLOBAL) SHUTDOWN: HBLINK IS TERMINATING WITH SIGNAL %s ' , str ( _signal ) )
2018-12-27 15:31:08 -05:00
hblink_handler ( _signal , _frame )
2019-01-07 10:44:36 -05:00
logger . info ( ' (GLOBAL) SHUTDOWN: ALL SYSTEM HANDLERS EXECUTED - STOPPING REACTOR ' )
2018-12-27 15:31:08 -05:00
reactor . stop ( )
# Set signal handers so that we can gracefully exit if need be
for sig in [ signal . SIGTERM , signal . SIGINT ] :
signal . signal ( sig , sig_handler )
peer_ids , subscriber_ids , talkgroup_ids = mk_aliases ( CONFIG )
2021-06-03 16:38:47 -04:00
2018-12-27 15:31:08 -05:00
# INITIALIZE THE REPORTING LOOP
2019-01-07 10:44:36 -05:00
if CONFIG [ ' REPORTS ' ] [ ' REPORT ' ] :
report_server = config_reports ( CONFIG , reportFactory )
else :
report_server = None
logger . info ( ' (REPORT) TCP Socket reporting not configured ' )
2018-12-27 15:31:08 -05:00
# HBlink instance creation
2019-01-07 10:44:36 -05:00
logger . info ( ' (GLOBAL) HBlink \' HBlink.py \' -- SYSTEM STARTING... ' )
2018-12-27 15:31:08 -05:00
for system in CONFIG [ ' SYSTEMS ' ] :
if CONFIG [ ' SYSTEMS ' ] [ system ] [ ' ENABLED ' ] :
if CONFIG [ ' SYSTEMS ' ] [ system ] [ ' MODE ' ] == ' OPENBRIDGE ' :
systems [ system ] = OPENBRIDGE ( system , CONFIG , report_server )
else :
systems [ system ] = HBSYSTEM ( system , CONFIG , report_server )
reactor . listenUDP ( CONFIG [ ' SYSTEMS ' ] [ system ] [ ' PORT ' ] , systems [ system ] , interface = CONFIG [ ' SYSTEMS ' ] [ system ] [ ' IP ' ] )
2019-01-07 10:44:36 -05:00
logger . debug ( ' (GLOBAL) %s instance created: %s , %s ' , CONFIG [ ' SYSTEMS ' ] [ system ] [ ' MODE ' ] , system , systems [ system ] )
2019-01-04 16:32:13 -05:00
2021-06-03 16:38:47 -04:00
# Download burn list
2021-09-05 21:53:20 -04:00
with open ( CONFIG [ ' WEB_SERVICE ' ] [ ' BURN_FILE ' ] , ' w ' ) as f :
2021-06-03 16:38:47 -04:00
f . write ( str ( download_burnlist ( CONFIG ) ) )
2018-12-27 15:31:08 -05:00
reactor . run ( )