2022-04-07 21:03:53 +02:00
import RNS
import LXMF
import threading
import plyer
import os . path
import time
2023-10-20 23:38:28 +02:00
import struct
2022-04-07 21:03:53 +02:00
import sqlite3
2022-12-20 20:39:30 +01:00
import random
2022-04-07 21:03:53 +02:00
import RNS . vendor . umsgpack as msgpack
2022-10-16 00:25:07 +02:00
import RNS . Interfaces . Interface as Interface
2022-04-07 21:03:53 +02:00
2023-10-22 20:16:41 +02:00
import multiprocessing . connection
2023-11-04 19:42:06 +01:00
from threading import Lock
2022-10-29 16:39:54 +02:00
from . res import sideband_fb_data
2023-10-30 00:32:52 +01:00
from . sense import Telemeter , Commands
2022-10-29 16:39:54 +02:00
2022-10-02 01:14:29 +02:00
if RNS . vendor . platformutils . get_platform ( ) == " android " :
from jnius import autoclass , cast
2023-10-26 13:21:49 +02:00
# Squelch excessive method signature logging
2023-10-26 12:53:18 +02:00
import jnius . reflect
class redirect_log ( ) :
def isEnabledFor ( self , arg ) :
return False
def debug ( self , arg ) :
pass
2023-10-26 13:21:49 +02:00
def mod ( method , name , signature ) :
pass
jnius . reflect . log_method = mod
2023-10-26 12:53:18 +02:00
jnius . reflect . log = redirect_log ( )
2023-10-26 13:21:49 +02:00
############################################
2023-10-26 12:53:18 +02:00
2022-10-02 01:14:29 +02:00
2022-04-07 21:03:53 +02:00
class PropagationNodeDetector ( ) :
EMITTED_DELTA_GRACE = 300
EMITTED_DELTA_IGNORE = 10
aspect_filter = " lxmf.propagation "
def received_announce ( self , destination_hash , announced_identity , app_data ) :
try :
2022-12-23 23:23:17 +01:00
if app_data != None and len ( app_data ) > 0 :
2022-11-23 18:57:53 +01:00
unpacked = msgpack . unpackb ( app_data )
node_active = unpacked [ 0 ]
emitted = unpacked [ 1 ]
hops = RNS . Transport . hops_to ( destination_hash )
age = time . time ( ) - emitted
if age < 0 :
RNS . log ( " Warning, propagation node announce emitted in the future, possible timing inconsistency or tampering attempt. " )
if age < - 1 * PropagationNodeDetector . EMITTED_DELTA_GRACE :
raise ValueError ( " Announce timestamp too far in the future, discarding it " )
if age > - 1 * PropagationNodeDetector . EMITTED_DELTA_IGNORE :
# age = 0
pass
RNS . log ( " Detected active propagation node " + RNS . prettyhexrep ( destination_hash ) + " emission " + str ( age ) + " seconds ago, " + str ( hops ) + " hops away " )
self . owner . log_announce ( destination_hash , RNS . prettyhexrep ( destination_hash ) . encode ( " utf-8 " ) , dest_type = PropagationNodeDetector . aspect_filter )
if self . owner . config [ " lxmf_propagation_node " ] == None :
if self . owner . active_propagation_node == None :
2022-04-07 21:03:53 +02:00
self . owner . set_active_propagation_node ( destination_hash )
else :
2022-11-23 18:57:53 +01:00
prev_hops = RNS . Transport . hops_to ( self . owner . active_propagation_node )
if hops < = prev_hops :
self . owner . set_active_propagation_node ( destination_hash )
else :
pass
else :
pass
2022-04-07 21:03:53 +02:00
except Exception as e :
RNS . log ( " Error while processing received propagation node announce: " + str ( e ) )
def __init__ ( self , owner ) :
self . owner = owner
self . owner_app = owner . owner_app
class SidebandCore ( ) :
CONV_P2P = 0x01
CONV_GROUP = 0x02
CONV_BROADCAST = 0x03
2022-10-07 17:58:54 +02:00
MAX_ANNOUNCES = 24
2022-04-07 21:03:53 +02:00
2022-10-08 22:47:08 +02:00
SERVICE_JOB_INTERVAL = 1
PERIODIC_JOBS_INTERVAL = 60
PERIODIC_SYNC_RETRY = 360
2023-10-22 01:12:55 +02:00
TELEMETRY_INTERVAL = 60
2022-10-02 01:14:29 +02:00
2022-12-22 14:53:24 +01:00
IF_CHANGE_ANNOUNCE_MIN_INTERVAL = 6 # In seconds
2022-12-20 20:39:30 +01:00
AUTO_ANNOUNCE_RANDOM_MIN = 90 # In minutes
AUTO_ANNOUNCE_RANDOM_MAX = 480 # In minutes
2023-10-22 23:13:51 +02:00
DEFAULT_APPEARANCE = [ " account " , [ 0 , 0 , 0 , 1 ] , [ 1 , 1 , 1 , 1 ] ]
2023-10-22 01:12:55 +02:00
2022-04-07 21:03:53 +02:00
aspect_filter = " lxmf.delivery "
def received_announce ( self , destination_hash , announced_identity , app_data ) :
# Add the announce to the directory announce
# stream logger
2022-07-06 17:02:29 +02:00
self . log_announce ( destination_hash , app_data , dest_type = SidebandCore . aspect_filter )
2022-04-07 21:03:53 +02:00
2022-10-03 18:29:54 +02:00
def __init__ ( self , owner_app , is_service = False , is_client = False , android_app_dir = None , verbose = False ) :
2022-10-01 11:18:14 +02:00
self . is_service = is_service
self . is_client = is_client
2022-11-23 18:57:53 +01:00
self . db = None
2022-10-01 11:18:14 +02:00
if not self . is_service and not self . is_client :
self . is_standalone = True
else :
self . is_standalone = False
2022-10-03 18:29:54 +02:00
self . log_verbose = verbose
2022-04-07 21:03:53 +02:00
self . owner_app = owner_app
self . reticulum = None
2023-09-20 20:12:47 +02:00
self . webshare_server = None
2023-10-20 02:41:05 +02:00
self . telemeter = None
2023-10-20 15:09:48 +02:00
self . telemetry_running = False
self . latest_telemetry = None
2023-11-01 16:34:24 +01:00
self . latest_packed_telemetry = None
2023-10-20 17:27:15 +02:00
self . telemetry_changes = 0
2023-10-29 23:03:51 +01:00
self . pending_telemetry_send = False
self . pending_telemetry_send_try = 0
self . pending_telemetry_send_maxtries = 2
self . telemetry_send_blocked_until = 0
self . pending_telemetry_request = False
2023-10-30 03:19:41 +01:00
self . telemetry_request_max_history = 7 * 24 * 60 * 60
2023-10-22 20:16:41 +02:00
self . state_db = { }
2023-11-04 19:42:06 +01:00
self . state_lock = Lock ( )
2023-10-22 20:16:41 +02:00
self . rpc_connection = None
2023-11-04 19:42:06 +01:00
self . service_stopped = False
2022-04-07 21:03:53 +02:00
2022-10-01 11:18:14 +02:00
self . app_dir = plyer . storagepath . get_home_dir ( ) + " /.config/sideband "
2023-10-26 19:59:30 +02:00
self . cache_dir = self . app_dir + " /cache "
2022-10-03 21:09:05 +02:00
if self . app_dir . startswith ( " file:// " ) :
self . app_dir = self . app_dir . replace ( " file:// " , " " )
2022-04-07 21:03:53 +02:00
self . rns_configdir = None
2022-10-03 21:09:05 +02:00
if RNS . vendor . platformutils . is_android ( ) :
2022-10-01 11:18:14 +02:00
self . app_dir = android_app_dir + " /io.unsigned.sideband/files/ "
2023-10-26 19:59:30 +02:00
self . cache_dir = self . app_dir + " /cache "
2022-04-07 21:03:53 +02:00
self . rns_configdir = self . app_dir + " /app_storage/reticulum "
2022-10-02 01:14:29 +02:00
self . asset_dir = self . app_dir + " /app/assets "
2022-10-03 21:09:05 +02:00
elif RNS . vendor . platformutils . is_darwin ( ) :
2022-10-03 19:24:46 +02:00
core_path = os . path . abspath ( __file__ )
self . asset_dir = core_path . replace ( " /sideband/core.py " , " /assets " )
2022-10-19 22:25:20 +02:00
elif RNS . vendor . platformutils . get_platform ( ) == " linux " :
core_path = os . path . abspath ( __file__ )
self . asset_dir = core_path . replace ( " /sideband/core.py " , " /assets " )
2022-10-02 01:14:29 +02:00
else :
self . asset_dir = plyer . storagepath . get_application_dir ( ) + " /sbapp/assets "
2023-10-26 19:59:30 +02:00
self . map_cache = self . cache_dir + " /maps "
if not os . path . isdir ( self . map_cache ) :
os . makedirs ( self . map_cache )
2022-10-02 01:14:29 +02:00
self . icon = self . asset_dir + " /icon.png "
2022-10-03 18:49:53 +02:00
self . icon_48 = self . asset_dir + " /icon_48.png "
self . icon_32 = self . asset_dir + " /icon_32.png "
2022-10-03 22:36:44 +02:00
self . icon_macos = self . asset_dir + " /icon_macos.png "
2022-10-02 01:14:29 +02:00
self . notification_icon = self . asset_dir + " /notification_icon.png "
2022-04-07 21:03:53 +02:00
if not os . path . isdir ( self . app_dir + " /app_storage " ) :
os . makedirs ( self . app_dir + " /app_storage " )
self . config_path = self . app_dir + " /app_storage/sideband_config "
self . identity_path = self . app_dir + " /app_storage/primary_identity "
self . db_path = self . app_dir + " /app_storage/sideband.db "
self . lxmf_storage = self . app_dir + " /app_storage/ "
2022-12-19 02:06:41 +01:00
self . log_dir = self . app_dir + " /app_storage/ "
2022-11-22 14:25:56 +01:00
self . tmp_dir = self . app_dir + " /app_storage/tmp "
2022-11-22 19:47:13 +01:00
self . exports_dir = self . app_dir + " /exports "
2023-09-20 20:12:47 +02:00
self . webshare_dir = " ./share/ "
2022-10-02 01:14:29 +02:00
2022-09-17 22:55:27 +02:00
self . first_run = True
2022-11-23 11:28:02 +01:00
self . saving_configuration = False
2022-12-20 20:39:30 +01:00
self . last_lxmf_announce = 0
self . last_if_change_announce = 0
2023-10-22 21:44:57 +02:00
self . interface_local_adding = False
2022-12-20 20:39:30 +01:00
self . next_auto_announce = time . time ( ) + 60 * ( random . random ( ) * ( SidebandCore . AUTO_ANNOUNCE_RANDOM_MAX - SidebandCore . AUTO_ANNOUNCE_RANDOM_MIN ) )
2022-09-17 22:55:27 +02:00
2022-04-07 21:03:53 +02:00
try :
if not os . path . isfile ( self . config_path ) :
self . __init_config ( )
self . __load_config ( )
2023-10-26 18:54:46 +02:00
else :
try :
self . __load_config ( )
except Exception as e :
self . __init_config ( )
self . __load_config ( )
2022-09-17 22:55:27 +02:00
self . first_run = False
2022-11-22 14:25:56 +01:00
2022-12-19 02:06:41 +01:00
if self . config [ " debug " ] :
self . log_verbose = True
2022-11-22 14:25:56 +01:00
if not os . path . isdir ( self . tmp_dir ) :
os . makedirs ( self . tmp_dir )
else :
self . clear_tmp_dir ( )
2022-11-22 19:47:13 +01:00
if os . path . isdir ( self . exports_dir ) :
self . clear_exports_dir ( )
2022-04-07 21:03:53 +02:00
except Exception as e :
RNS . log ( " Error while configuring Sideband: " + str ( e ) , RNS . LOG_ERROR )
# Initialise Reticulum configuration
2022-07-06 12:20:41 +02:00
if RNS . vendor . platformutils . get_platform ( ) == " android " :
2022-04-07 21:03:53 +02:00
try :
self . rns_configdir = self . app_dir + " /app_storage/reticulum "
if not os . path . isdir ( self . rns_configdir ) :
os . makedirs ( self . rns_configdir )
RNS . log ( " Configuring Reticulum instance... " )
2022-10-15 19:12:39 +02:00
if self . config [ " connect_transport " ] :
RNS . log ( " Enabling Reticulum Transport " )
generated_config = rns_config . replace ( " TRANSPORT_IS_ENABLED " , " Yes " )
else :
RNS . log ( " Not enabling Reticulum Transport " )
generated_config = rns_config . replace ( " TRANSPORT_IS_ENABLED " , " No " )
2022-04-07 21:03:53 +02:00
config_file = open ( self . rns_configdir + " /config " , " wb " )
2022-10-15 19:12:39 +02:00
config_file . write ( generated_config . encode ( " utf-8 " ) )
2022-04-07 21:03:53 +02:00
config_file . close ( )
except Exception as e :
RNS . log ( " Error while configuring Reticulum instance: " + str ( e ) , RNS . LOG_ERROR )
else :
pass
self . active_propagation_node = None
self . propagation_detector = PropagationNodeDetector ( self )
RNS . Transport . register_announce_handler ( self )
RNS . Transport . register_announce_handler ( self . propagation_detector )
2022-09-14 22:09:58 +02:00
2022-11-22 14:25:56 +01:00
def clear_tmp_dir ( self ) :
if os . path . isdir ( self . tmp_dir ) :
for file in os . listdir ( self . tmp_dir ) :
fpath = self . tmp_dir + " / " + file
os . unlink ( fpath )
2022-11-22 19:47:13 +01:00
def clear_exports_dir ( self ) :
if os . path . isdir ( self . exports_dir ) :
for file in os . listdir ( self . exports_dir ) :
fpath = self . exports_dir + " / " + file
RNS . log ( " Clearing " + str ( fpath ) )
os . unlink ( fpath )
2022-04-07 21:03:53 +02:00
def __init_config ( self ) :
RNS . log ( " Creating new Sideband configuration... " )
if os . path . isfile ( self . identity_path ) :
self . identity = RNS . Identity . from_file ( self . identity_path )
else :
self . identity = RNS . Identity ( )
self . identity . to_file ( self . identity_path )
self . config = { }
2022-07-06 12:19:05 +02:00
# Settings
2022-12-19 02:06:41 +01:00
self . config [ " debug " ] = False
2022-04-07 21:03:53 +02:00
self . config [ " display_name " ] = " Anonymous Peer "
2022-10-15 20:22:45 +02:00
self . config [ " notifications_on " ] = True
2022-10-03 23:09:02 +02:00
self . config [ " dark_ui " ] = False
2022-12-21 00:55:51 +01:00
self . config [ " start_announce " ] = True
2022-04-07 21:03:53 +02:00
self . config [ " propagation_by_default " ] = False
self . config [ " home_node_as_broadcast_repeater " ] = False
self . config [ " send_telemetry_to_home_node " ] = False
self . config [ " lxmf_propagation_node " ] = None
self . config [ " lxmf_sync_limit " ] = None
self . config [ " lxmf_sync_max " ] = 3
2022-10-08 21:12:36 +02:00
self . config [ " lxmf_periodic_sync " ] = False
2023-09-21 01:59:37 +02:00
self . config [ " lxmf_ignore_unknown " ] = False
2022-10-08 21:12:36 +02:00
self . config [ " lxmf_sync_interval " ] = 43200
2022-04-07 21:03:53 +02:00
self . config [ " last_lxmf_propagation_node " ] = None
self . config [ " nn_home_node " ] = None
2022-11-22 14:25:56 +01:00
self . config [ " print_command " ] = " lp "
2023-10-07 16:54:38 +02:00
self . config [ " eink_mode " ] = False
2022-11-22 14:25:56 +01:00
2022-07-06 12:19:05 +02:00
# Connectivity
2022-10-15 19:12:39 +02:00
self . config [ " connect_transport " ] = False
2022-07-06 12:19:05 +02:00
self . config [ " connect_local " ] = True
self . config [ " connect_local_groupid " ] = " "
self . config [ " connect_local_ifac_netname " ] = " "
self . config [ " connect_local_ifac_passphrase " ] = " "
self . config [ " connect_tcp " ] = False
self . config [ " connect_tcp_host " ] = " sideband.connect.reticulum.network "
self . config [ " connect_tcp_port " ] = " 7822 "
self . config [ " connect_tcp_ifac_netname " ] = " "
self . config [ " connect_tcp_ifac_passphrase " ] = " "
self . config [ " connect_i2p " ] = False
2022-11-03 19:52:27 +01:00
self . config [ " connect_i2p_b32 " ] = " pmlm3l5rpympihoy2o5ago43kluei2jjjzsalcuiuylbve3mwi2a.b32.i2p "
2022-07-06 12:19:05 +02:00
self . config [ " connect_i2p_ifac_netname " ] = " "
self . config [ " connect_i2p_ifac_passphrase " ] = " "
2022-10-12 16:38:59 +02:00
self . config [ " connect_rnode " ] = False
self . config [ " connect_rnode_ifac_netname " ] = " "
self . config [ " connect_rnode_ifac_passphrase " ] = " "
2022-10-15 11:11:34 +02:00
self . config [ " connect_serial " ] = False
self . config [ " connect_serial_ifac_netname " ] = " "
self . config [ " connect_serial_ifac_passphrase " ] = " "
self . config [ " connect_modem " ] = False
self . config [ " connect_modem_ifac_netname " ] = " "
self . config [ " connect_modem_ifac_passphrase " ] = " "
2022-10-18 15:06:25 +02:00
self . config [ " connect_ifmode_local " ] = " full "
self . config [ " connect_ifmode_tcp " ] = " full "
self . config [ " connect_ifmode_i2p " ] = " full "
self . config [ " connect_ifmode_rnode " ] = " full "
self . config [ " connect_ifmode_modem " ] = " full "
self . config [ " connect_ifmode_serial " ] = " full "
self . config [ " connect_ifmode_bluetooth " ] = " full "
2023-10-20 02:41:05 +02:00
2022-10-13 18:44:54 +02:00
# Hardware
self . config [ " hw_rnode_frequency " ] = None
self . config [ " hw_rnode_modulation " ] = " LoRa "
self . config [ " hw_rnode_bandwidth " ] = 62500
self . config [ " hw_rnode_spreading_factor " ] = 8
self . config [ " hw_rnode_coding_rate " ] = 6
self . config [ " hw_rnode_tx_power " ] = 0
self . config [ " hw_rnode_beaconinterval " ] = None
self . config [ " hw_rnode_beacondata " ] = None
2022-11-03 20:22:16 +01:00
self . config [ " hw_rnode_bt_device " ] = None
2022-12-15 14:15:23 +01:00
self . config [ " hw_rnode_bluetooth " ] = False
2022-10-15 14:55:47 +02:00
self . config [ " hw_modem_baudrate " ] = 57600
self . config [ " hw_modem_databits " ] = 8
self . config [ " hw_modem_stopbits " ] = 1
self . config [ " hw_modem_parity " ] = " none "
2022-10-13 18:44:54 +02:00
self . config [ " hw_modem_preamble " ] = 150
self . config [ " hw_modem_tail " ] = 20
self . config [ " hw_modem_persistence " ] = 220
self . config [ " hw_modem_slottime " ] = 20
2022-10-15 14:55:47 +02:00
self . config [ " hw_modem_beaconinterval " ] = None
self . config [ " hw_modem_beacondata " ] = None
2022-10-13 18:44:54 +02:00
self . config [ " hw_serial_baudrate " ] = 57600
self . config [ " hw_serial_databits " ] = 8
self . config [ " hw_serial_stopbits " ] = 1
self . config [ " hw_serial_parity " ] = " none "
2022-07-06 12:19:05 +02:00
2023-10-20 02:41:05 +02:00
# Telemetry
self . config [ " telemetry_enabled " ] = False
2023-10-22 01:12:55 +02:00
self . config [ " telemetry_icon " ] = SidebandCore . DEFAULT_APPEARANCE [ 0 ]
2023-10-20 02:41:05 +02:00
self . config [ " telemetry_send_to_trusted " ] = False
self . config [ " telemetry_send_to_collector " ] = False
2022-04-07 21:03:53 +02:00
if not os . path . isfile ( self . db_path ) :
self . __db_init ( )
2022-10-03 00:47:27 +02:00
else :
self . _db_initstate ( )
self . _db_initpersistent ( )
2023-10-20 23:38:28 +02:00
self . _db_inittelemetry ( )
2023-10-22 01:12:55 +02:00
self . _db_upgradetables ( )
2022-10-03 00:47:27 +02:00
self . __save_config ( )
2022-04-07 21:03:53 +02:00
2023-10-26 20:38:19 +02:00
def clear_map_cache ( self ) :
for entry in os . scandir ( self . map_cache ) :
os . unlink ( entry . path )
def get_map_cache_size ( self ) :
total = 0
for entry in os . scandir ( self . map_cache ) :
if entry . is_dir ( follow_symlinks = False ) :
pass
else :
total + = entry . stat ( follow_symlinks = False ) . st_size
return total
2022-09-17 17:12:25 +02:00
def should_persist_data ( self ) :
if self . reticulum != None :
self . reticulum . _should_persist_data ( )
self . save_configuration ( )
2022-04-07 21:03:53 +02:00
def __load_config ( self ) :
2022-10-02 12:45:06 +02:00
RNS . log ( " Loading Sideband identity... " , RNS . LOG_DEBUG )
2022-04-07 21:03:53 +02:00
self . identity = RNS . Identity . from_file ( self . identity_path )
2023-10-22 20:16:41 +02:00
self . rpc_addr = ( " 127.0.0.1 " , 48165 )
self . rpc_key = RNS . Identity . full_hash ( self . identity . get_private_key ( ) )
2022-10-02 12:45:06 +02:00
RNS . log ( " Loading Sideband configuration... " + str ( self . config_path ) , RNS . LOG_DEBUG )
2022-04-07 21:03:53 +02:00
config_file = open ( self . config_path , " rb " )
self . config = msgpack . unpackb ( config_file . read ( ) )
config_file . close ( )
2022-10-02 14:03:56 +02:00
# Migration actions from earlier config formats
2022-12-19 02:06:41 +01:00
if not " debug " in self . config :
self . config [ " debug " ] = False
2022-10-02 14:03:56 +02:00
if not " dark_ui " in self . config :
self . config [ " dark_ui " ] = True
2023-10-22 01:12:55 +02:00
if not " advanced_stats " in self . config :
self . config [ " advanced_stats " ] = False
2022-10-08 21:12:36 +02:00
if not " lxmf_periodic_sync " in self . config :
self . config [ " lxmf_periodic_sync " ] = False
2023-09-20 20:26:19 +02:00
if not " lxmf_ignore_unknown " in self . config :
self . config [ " lxmf_ignore_unknown " ] = False
2022-10-08 21:12:36 +02:00
if not " lxmf_sync_interval " in self . config :
self . config [ " lxmf_sync_interval " ] = 43200
2023-10-26 13:43:28 +02:00
if not " lxmf_try_propagation_on_fail " in self . config :
self . config [ " lxmf_try_propagation_on_fail " ] = True
2022-10-09 00:30:58 +02:00
if not " notifications_on " in self . config :
self . config [ " notifications_on " ] = True
2022-11-22 14:25:56 +01:00
if not " print_command " in self . config :
self . config [ " print_command " ] = " lp "
2023-10-07 16:54:38 +02:00
if not " eink_mode " in self . config :
self . config [ " eink_mode " ] = False
2023-10-30 16:55:55 +01:00
if not " display_style_in_contact_list " in self . config :
self . config [ " display_style_in_contact_list " ] = False
2022-10-18 15:06:25 +02:00
2022-10-15 19:12:39 +02:00
if not " connect_transport " in self . config :
self . config [ " connect_transport " ] = False
2022-10-12 16:38:59 +02:00
if not " connect_rnode " in self . config :
self . config [ " connect_rnode " ] = False
if not " connect_rnode_ifac_netname " in self . config :
self . config [ " connect_rnode_ifac_netname " ] = " "
if not " connect_rnode_ifac_passphrase " in self . config :
self . config [ " connect_rnode_ifac_passphrase " ] = " "
2022-10-15 11:11:34 +02:00
if not " connect_serial " in self . config :
self . config [ " connect_serial " ] = False
if not " connect_serial_ifac_netname " in self . config :
self . config [ " connect_serial_ifac_netname " ] = " "
if not " connect_serial_ifac_passphrase " in self . config :
self . config [ " connect_serial_ifac_passphrase " ] = " "
if not " connect_modem " in self . config :
self . config [ " connect_modem " ] = False
if not " connect_modem_ifac_netname " in self . config :
self . config [ " connect_modem_ifac_netname " ] = " "
if not " connect_modem_ifac_passphrase " in self . config :
self . config [ " connect_modem_ifac_passphrase " ] = " "
2022-10-18 15:06:25 +02:00
if not " connect_ifmode_local " in self . config :
self . config [ " connect_ifmode_local " ] = " full "
if not " connect_ifmode_tcp " in self . config :
self . config [ " connect_ifmode_tcp " ] = " full "
if not " connect_ifmode_i2p " in self . config :
self . config [ " connect_ifmode_i2p " ] = " full "
if not " connect_ifmode_rnode " in self . config :
self . config [ " connect_ifmode_rnode " ] = " full "
if not " connect_ifmode_modem " in self . config :
self . config [ " connect_ifmode_modem " ] = " full "
if not " connect_ifmode_serial " in self . config :
self . config [ " connect_ifmode_serial " ] = " full "
if not " connect_ifmode_bluetooth " in self . config :
self . config [ " connect_ifmode_bluetooth " ] = " full "
2022-10-13 18:44:54 +02:00
if not " hw_rnode_frequency " in self . config :
self . config [ " hw_rnode_frequency " ] = None
if not " hw_rnode_modulation " in self . config :
self . config [ " hw_rnode_modulation " ] = " LoRa "
if not " hw_rnode_bandwidth " in self . config :
self . config [ " hw_rnode_bandwidth " ] = 62500
if not " hw_rnode_spreading_factor " in self . config :
self . config [ " hw_rnode_spreading_factor " ] = 8
if not " hw_rnode_coding_rate " in self . config :
self . config [ " hw_rnode_coding_rate " ] = 6
if not " hw_rnode_tx_power " in self . config :
self . config [ " hw_rnode_tx_power " ] = 0
if not " hw_rnode_beaconinterval " in self . config :
self . config [ " hw_rnode_beaconinterval " ] = None
if not " hw_rnode_beacondata " in self . config :
self . config [ " hw_rnode_beacondata " ] = None
2022-11-02 22:29:13 +01:00
if not " hw_rnode_bluetooth " in self . config :
self . config [ " hw_rnode_bluetooth " ] = False
2023-09-13 21:14:30 +02:00
if not " hw_rnode_enable_framebuffer " in self . config :
self . config [ " hw_rnode_enable_framebuffer " ] = False
2022-11-03 20:22:16 +01:00
if not " hw_rnode_bt_device " in self . config :
self . config [ " hw_rnode_bt_device " ] = None
2023-09-13 21:14:30 +02:00
if not " hw_rnode_atl_short " in self . config :
self . config [ " hw_rnode_atl_short " ] = None
if not " hw_rnode_atl_long " in self . config :
self . config [ " hw_rnode_atl_long " ] = None
2022-10-13 18:44:54 +02:00
2022-10-15 14:55:47 +02:00
if not " hw_modem_baudrate " in self . config :
self . config [ " hw_modem_baudrate " ] = 115200
if not " hw_modem_databits " in self . config :
self . config [ " hw_modem_databits " ] = 8
if not " hw_modem_stopbits " in self . config :
self . config [ " hw_modem_stopbits " ] = 1
if not " hw_modem_parity " in self . config :
self . config [ " hw_modem_parity " ] = " none "
2022-10-13 18:44:54 +02:00
if not " hw_modem_preamble " in self . config :
self . config [ " hw_modem_preamble " ] = 150
if not " hw_modem_tail " in self . config :
self . config [ " hw_modem_tail " ] = 20
if not " hw_modem_persistence " in self . config :
self . config [ " hw_modem_persistence " ] = 220
if not " hw_modem_slottime " in self . config :
self . config [ " hw_modem_slottime " ] = 20
2022-10-15 14:55:47 +02:00
if not " hw_modem_beaconinterval " in self . config :
self . config [ " hw_modem_beaconinterval " ] = None
if not " hw_modem_beacondata " in self . config :
self . config [ " hw_modem_beacondata " ] = None
2022-10-13 18:44:54 +02:00
if not " hw_serial_baudrate " in self . config :
self . config [ " hw_serial_baudrate " ] = 57600
if not " hw_serial_databits " in self . config :
self . config [ " hw_serial_databits " ] = 8
if not " hw_serial_stopbits " in self . config :
self . config [ " hw_serial_stopbits " ] = 1
if not " hw_serial_parity " in self . config :
self . config [ " hw_serial_parity " ] = " none "
2022-10-02 14:03:56 +02:00
2023-10-20 02:41:05 +02:00
if not " telemetry_enabled " in self . config :
self . config [ " telemetry_enabled " ] = False
if not " telemetry_collector " in self . config :
self . config [ " telemetry_collector " ] = None
if not " telemetry_send_to_trusted " in self . config :
self . config [ " telemetry_send_to_trusted " ] = False
if not " telemetry_send_to_collector " in self . config :
self . config [ " telemetry_send_to_collector " ] = False
2023-10-29 16:01:28 +01:00
if not " telemetry_request_from_collector " in self . config :
self . config [ " telemetry_request_from_collector " ] = False
if not " telemetry_send_interval " in self . config :
self . config [ " telemetry_send_interval " ] = 43200
if not " telemetry_request_interval " in self . config :
self . config [ " telemetry_request_interval " ] = 43200
2023-10-30 16:55:55 +01:00
if not " telemetry_collector_enabled " in self . config :
self . config [ " telemetry_collector_enabled " ] = False
2023-10-20 02:41:05 +02:00
if not " telemetry_icon " in self . config :
2023-10-22 01:12:55 +02:00
self . config [ " telemetry_icon " ] = SidebandCore . DEFAULT_APPEARANCE [ 0 ]
2023-10-20 02:41:05 +02:00
if not " telemetry_fg " in self . config :
2023-10-22 01:12:55 +02:00
self . config [ " telemetry_fg " ] = SidebandCore . DEFAULT_APPEARANCE [ 1 ]
2023-10-20 02:41:05 +02:00
if not " telemetry_bg " in self . config :
2023-10-22 01:12:55 +02:00
self . config [ " telemetry_bg " ] = SidebandCore . DEFAULT_APPEARANCE [ 2 ]
2023-10-20 23:38:28 +02:00
if not " telemetry_send_appearance " in self . config :
self . config [ " telemetry_send_appearance " ] = False
2023-10-24 01:14:59 +02:00
if not " telemetry_display_trusted_only " in self . config :
self . config [ " telemetry_display_trusted_only " ] = False
2023-10-29 16:54:12 +01:00
if not " telemetry_receive_trusted_only " in self . config :
self . config [ " telemetry_receive_trusted_only " ] = False
2023-10-30 13:45:58 +01:00
2023-10-29 17:55:42 +01:00
if not " telemetry_send_all_to_collector " in self . config :
self . config [ " telemetry_send_all_to_collector " ] = False
2023-10-29 20:59:27 +01:00
if not " telemetry_use_propagation_only " in self . config :
self . config [ " telemetry_use_propagation_only " ] = False
if not " telemetry_try_propagation_on_fail " in self . config :
self . config [ " telemetry_try_propagation_on_fail " ] = True
2023-10-30 03:09:57 +01:00
if not " telemetry_requests_only_send_latest " in self . config :
self . config [ " telemetry_requests_only_send_latest " ] = True
2023-10-30 13:45:58 +01:00
if not " telemetry_allow_requests_from_trusted " in self . config :
self . config [ " telemetry_allow_requests_from_trusted " ] = False
if not " telemetry_allow_requests_from_anyone " in self . config :
self . config [ " telemetry_allow_requests_from_anyone " ] = False
2023-10-20 02:41:05 +02:00
if not " telemetry_s_location " in self . config :
self . config [ " telemetry_s_location " ] = False
if not " telemetry_s_battery " in self . config :
self . config [ " telemetry_s_battery " ] = False
2023-10-22 13:16:43 +02:00
if not " telemetry_s_pressure " in self . config :
self . config [ " telemetry_s_pressure " ] = False
2023-10-20 02:41:05 +02:00
if not " telemetry_s_temperature " in self . config :
self . config [ " telemetry_s_temperature " ] = False
if not " telemetry_s_humidity " in self . config :
self . config [ " telemetry_s_humidity " ] = False
2023-10-22 13:16:43 +02:00
if not " telemetry_s_magnetic_field " in self . config :
self . config [ " telemetry_s_magnetic_field " ] = False
if not " telemetry_s_ambient_light " in self . config :
self . config [ " telemetry_s_ambient_light " ] = False
2023-10-20 02:41:05 +02:00
if not " telemetry_s_gravity " in self . config :
self . config [ " telemetry_s_gravity " ] = False
2023-10-22 13:16:43 +02:00
if not " telemetry_s_angular_velocity " in self . config :
self . config [ " telemetry_s_angular_velocity " ] = False
if not " telemetry_s_acceleration " in self . config :
self . config [ " telemetry_s_acceleration " ] = False
2023-10-20 02:41:05 +02:00
if not " telemetry_s_proximity " in self . config :
self . config [ " telemetry_s_proximity " ] = False
2023-10-24 01:14:59 +02:00
if not " telemetry_s_fixed_location " in self . config :
self . config [ " telemetry_s_fixed_location " ] = False
if not " telemetry_s_fixed_latlon " in self . config :
self . config [ " telemetry_s_fixed_latlon " ] = [ 0.0 , 0.0 ]
if not " telemetry_s_fixed_altitude " in self . config :
self . config [ " telemetry_s_fixed_altitude " ] = 0.0
2023-10-25 23:21:06 +02:00
if not " telemetry_s_information " in self . config :
self . config [ " telemetry_s_information " ] = False
if not " telemetry_s_information_text " in self . config :
self . config [ " telemetry_s_information_text " ] = " "
2023-10-20 02:41:05 +02:00
2023-10-20 23:38:28 +02:00
if not " map_history_limit " in self . config :
self . config [ " map_history_limit " ] = 7 * 24 * 60 * 60
if not " map_lat " in self . config :
self . config [ " map_lat " ] = 0.0
if not " map_lon " in self . config :
self . config [ " map_lon " ] = 0.0
if not " map_zoom " in self . config :
self . config [ " map_zoom " ] = 3
2023-10-26 02:28:41 +02:00
if not " map_storage_external " in self . config :
self . config [ " map_storage_external " ] = False
2023-10-26 18:54:46 +02:00
if not " map_use_offline " in self . config :
self . config [ " map_use_offline " ] = False
if not " map_use_online " in self . config :
self . config [ " map_use_online " ] = True
if not " map_layer " in self . config :
self . config [ " map_layer " ] = None
2023-10-26 02:28:41 +02:00
if not " map_storage_path " in self . config :
self . config [ " map_storage_path " ] = None
if not " map_storage_file " in self . config :
self . config [ " map_storage_file " ] = None
2023-10-20 23:38:28 +02:00
2022-10-02 14:03:56 +02:00
# Make sure we have a database
2022-04-07 21:03:53 +02:00
if not os . path . isfile ( self . db_path ) :
self . __db_init ( )
2022-10-02 01:14:29 +02:00
else :
self . _db_initstate ( )
self . _db_initpersistent ( )
2023-10-20 23:38:28 +02:00
self . _db_inittelemetry ( )
2023-10-22 01:12:55 +02:00
self . _db_upgradetables ( )
2022-11-23 18:57:53 +01:00
self . __db_indices ( )
2022-04-07 21:03:53 +02:00
2022-10-02 12:45:06 +02:00
def __reload_config ( self ) :
2023-11-01 02:40:16 +01:00
RNS . log ( " Reloading Sideband configuration... " , RNS . LOG_DEBUG )
2023-11-01 02:38:23 +01:00
with open ( self . config_path , " rb " ) as config_file :
config_data = config_file . read ( )
2022-10-02 12:45:06 +02:00
2023-11-01 02:38:23 +01:00
try :
unpacked_config = msgpack . unpackb ( config_data )
if unpacked_config != None and len ( unpacked_config ) != 0 :
self . config = unpacked_config
self . update_active_lxmf_propagation_node ( )
except Exception as e :
RNS . log ( " Error while reloading configuration: " + str ( e ) , RNS . LOG_ERROR )
2022-10-02 12:45:06 +02:00
2022-04-07 21:03:53 +02:00
def __save_config ( self ) :
2022-10-02 12:45:06 +02:00
RNS . log ( " Saving Sideband configuration... " , RNS . LOG_DEBUG )
2022-11-23 11:28:02 +01:00
def save_function ( ) :
while self . saving_configuration :
time . sleep ( 0.15 )
try :
self . saving_configuration = True
config_file = open ( self . config_path , " wb " )
config_file . write ( msgpack . packb ( self . config ) )
config_file . close ( )
self . saving_configuration = False
except Exception as e :
self . saving_configuration = False
RNS . log ( " Error while saving Sideband configuration: " + str ( e ) , RNS . LOG_ERROR )
threading . Thread ( target = save_function , daemon = True ) . start ( )
2022-04-07 21:03:53 +02:00
2022-10-02 12:45:06 +02:00
if self . is_client :
self . setstate ( " wants.settings_reload " , True )
def reload_configuration ( self ) :
self . __reload_config ( )
2022-04-07 21:03:53 +02:00
def save_configuration ( self ) :
self . __save_config ( )
def set_active_propagation_node ( self , dest ) :
if dest == None :
RNS . log ( " No active propagation node configured " )
else :
try :
self . active_propagation_node = dest
self . config [ " last_lxmf_propagation_node " ] = dest
self . message_router . set_outbound_propagation_node ( dest )
2022-10-29 16:39:54 +02:00
2022-04-07 21:03:53 +02:00
RNS . log ( " Active propagation node set to: " + RNS . prettyhexrep ( dest ) )
self . __save_config ( )
except Exception as e :
RNS . log ( " Error while setting LXMF propagation node: " + str ( e ) , RNS . LOG_ERROR )
2022-10-02 01:14:29 +02:00
def notify ( self , title , content , group = None , context_id = None ) :
2022-10-09 00:30:58 +02:00
if self . config [ " notifications_on " ] :
2022-10-02 01:14:29 +02:00
if RNS . vendor . platformutils . get_platform ( ) == " android " :
if self . getpersistent ( " permissions.notifications " ) :
notifications_permitted = True
else :
notifications_permitted = False
else :
notifications_permitted = True
if notifications_permitted :
if RNS . vendor . platformutils . get_platform ( ) == " android " :
if self . is_service :
self . owner_service . android_notification ( title , content , group = group , context_id = context_id )
else :
plyer . notification . notify ( title , content , notification_icon = self . notification_icon , context_override = None )
else :
plyer . notification . notify ( title , content , app_icon = self . icon_32 )
2022-07-06 17:02:29 +02:00
def log_announce ( self , dest , app_data , dest_type ) :
2022-04-07 21:03:53 +02:00
try :
2023-10-27 20:28:33 +02:00
if app_data == None :
app_data = b " "
2023-10-31 22:29:07 +01:00
RNS . log ( " Received " + str ( dest_type ) + " announce for " + RNS . prettyhexrep ( dest ) + " with data: " + app_data . decode ( " utf-8 " ) , RNS . LOG_DEBUG )
2022-07-06 17:02:29 +02:00
self . _db_save_announce ( dest , app_data , dest_type )
2022-10-02 01:14:29 +02:00
self . setstate ( " app.flags.new_announces " , True )
2022-04-07 21:03:53 +02:00
except Exception as e :
RNS . log ( " Exception while decoding LXMF destination announce data: " + str ( e ) )
def list_conversations ( self ) :
result = self . _db_conversations ( )
if result != None :
return result
else :
return [ ]
def list_announces ( self ) :
result = self . _db_announces ( )
if result != None :
return result
else :
return [ ]
def has_conversation ( self , context_dest ) :
existing_conv = self . _db_conversation ( context_dest )
if existing_conv != None :
return True
else :
return False
2023-10-22 13:16:43 +02:00
def is_trusted ( self , context_dest , conv_data = None ) :
2022-04-07 21:03:53 +02:00
try :
2023-10-22 13:16:43 +02:00
if conv_data == None :
existing_conv = self . _db_conversation ( context_dest )
else :
existing_conv = conv_data
2022-04-07 21:03:53 +02:00
if existing_conv != None :
if existing_conv [ " trust " ] == 1 :
return True
else :
return False
else :
return False
except Exception as e :
RNS . log ( " Error while checking trust for " + RNS . prettyhexrep ( context_dest ) + " : " + str ( e ) , RNS . LOG_ERROR )
return False
2023-10-20 02:41:05 +02:00
def should_send_telemetry ( self , context_dest ) :
try :
2023-11-01 16:34:24 +01:00
if self . config [ " telemetry_enabled " ] :
existing_conv = self . _db_conversation ( context_dest )
if existing_conv != None :
cd = existing_conv [ " data " ]
if cd != None and " telemetry " in cd and cd [ " telemetry " ] == True :
2023-10-22 13:16:43 +02:00
return True
else :
2023-11-01 16:34:24 +01:00
if self . is_trusted ( context_dest , conv_data = existing_conv ) and self . config [ " telemetry_send_to_trusted " ] :
return True
else :
return False
else :
return False
2023-10-20 02:41:05 +02:00
else :
return False
except Exception as e :
RNS . log ( " Error while checking telemetry sending for " + RNS . prettyhexrep ( context_dest ) + " : " + str ( e ) , RNS . LOG_ERROR )
return False
2023-10-30 22:26:20 +01:00
def allow_request_from ( self , context_dest ) :
2023-10-29 16:01:28 +01:00
try :
2023-10-30 13:45:58 +01:00
if self . config [ " telemetry_allow_requests_from_anyone " ] == True :
return True
2023-10-30 22:26:20 +01:00
if self . config [ " telemetry_allow_requests_from_trusted " ] == True :
existing_conv = self . _db_conversation ( context_dest )
return existing_conv [ " trust " ] == 1
2023-10-30 13:45:58 +01:00
2023-10-30 22:26:20 +01:00
return self . requests_allowed_from ( context_dest )
except Exception as e :
RNS . log ( " Error while checking request permissions for " + RNS . prettyhexrep ( context_dest ) + " : " + str ( e ) , RNS . LOG_ERROR )
return False
2023-10-30 13:45:58 +01:00
2023-10-30 22:26:20 +01:00
def requests_allowed_from ( self , context_dest ) :
try :
existing_conv = self . _db_conversation ( context_dest )
if existing_conv != None :
2023-10-29 16:01:28 +01:00
cd = existing_conv [ " data " ]
if cd != None and " allow_requests " in cd and cd [ " allow_requests " ] == True :
return True
else :
return False
else :
return False
except Exception as e :
RNS . log ( " Error while checking request permissions for " + RNS . prettyhexrep ( context_dest ) + " : " + str ( e ) , RNS . LOG_ERROR )
return False
2022-04-07 21:03:53 +02:00
def raw_display_name ( self , context_dest ) :
try :
existing_conv = self . _db_conversation ( context_dest )
if existing_conv != None :
if existing_conv [ " name " ] != None and existing_conv [ " name " ] != " " :
return existing_conv [ " name " ]
else :
return " "
else :
return " "
except Exception as e :
RNS . log ( " Error while getting peer name: " + str ( e ) , RNS . LOG_ERROR )
return " "
2023-10-30 16:55:55 +01:00
def peer_appearance ( self , context_dest , conv = None ) :
appearance = self . _db_get_appearance ( context_dest , conv = conv )
2023-10-24 01:28:49 +02:00
if appearance == None :
return SidebandCore . DEFAULT_APPEARANCE
for e in appearance :
if e == None :
return SidebandCore . DEFAULT_APPEARANCE
return appearance
2023-10-22 01:12:55 +02:00
2022-04-07 21:03:53 +02:00
def peer_display_name ( self , context_dest ) :
2023-10-24 01:14:59 +02:00
if context_dest == self . lxmf_destination . hash :
return self . config [ " display_name " ]
2022-04-07 21:03:53 +02:00
try :
existing_conv = self . _db_conversation ( context_dest )
if existing_conv != None :
if existing_conv [ " name " ] != None and existing_conv [ " name " ] != " " :
if existing_conv [ " trust " ] == 1 :
return existing_conv [ " name " ]
else :
return existing_conv [ " name " ] + " " + RNS . prettyhexrep ( context_dest )
else :
app_data = RNS . Identity . recall_app_data ( context_dest )
if app_data != None :
if existing_conv [ " trust " ] == 1 :
return app_data . decode ( " utf-8 " )
else :
return app_data . decode ( " utf-8 " ) + " " + RNS . prettyhexrep ( context_dest )
else :
return RNS . prettyhexrep ( context_dest )
else :
app_data = RNS . Identity . recall_app_data ( context_dest )
if app_data != None :
return app_data . decode ( " utf-8 " ) + " " + RNS . prettyhexrep ( context_dest )
else :
return RNS . prettyhexrep ( context_dest )
except Exception as e :
2022-07-06 17:02:29 +02:00
RNS . log ( " Could not decode a valid peer name from data: " + str ( e ) , RNS . LOG_DEBUG )
2022-04-07 21:03:53 +02:00
return RNS . prettyhexrep ( context_dest )
def clear_conversation ( self , context_dest ) :
self . _db_clear_conversation ( context_dest )
2023-10-21 01:02:43 +02:00
def clear_telemetry ( self , context_dest ) :
self . _db_clear_telemetry ( context_dest )
2022-10-08 19:55:46 +02:00
def delete_announce ( self , context_dest ) :
self . _db_delete_announce ( context_dest )
2022-04-07 21:03:53 +02:00
def delete_conversation ( self , context_dest ) :
self . _db_clear_conversation ( context_dest )
2023-10-21 01:02:43 +02:00
self . _db_clear_telemetry ( context_dest )
2022-04-07 21:03:53 +02:00
self . _db_delete_conversation ( context_dest )
def delete_message ( self , message_hash ) :
self . _db_delete_message ( message_hash )
def read_conversation ( self , context_dest ) :
self . _db_conversation_set_unread ( context_dest , False )
2023-09-20 21:41:26 +02:00
def unread_conversation ( self , context_dest , tx = False ) :
self . _db_conversation_set_unread ( context_dest , True , tx = tx )
def txtime_conversation ( self , context_dest ) :
self . _db_conversation_update_txtime ( context_dest )
2022-04-07 21:03:53 +02:00
def trusted_conversation ( self , context_dest ) :
self . _db_conversation_set_trusted ( context_dest , True )
def untrusted_conversation ( self , context_dest ) :
self . _db_conversation_set_trusted ( context_dest , False )
2023-10-20 02:41:05 +02:00
def send_telemetry_in_conversation ( self , context_dest ) :
self . _db_conversation_set_telemetry ( context_dest , True )
def no_telemetry_in_conversation ( self , context_dest ) :
self . _db_conversation_set_telemetry ( context_dest , False )
2023-10-29 16:01:28 +01:00
def allow_requests_from ( self , context_dest ) :
self . _db_conversation_set_requests ( context_dest , True )
def disallow_requests_from ( self , context_dest ) :
self . _db_conversation_set_requests ( context_dest , False )
2022-04-07 21:03:53 +02:00
def named_conversation ( self , name , context_dest ) :
self . _db_conversation_set_name ( context_dest , name )
2022-11-23 13:28:26 +01:00
def count_messages ( self , context_dest ) :
result = self . _db_message_count ( context_dest )
if result != None :
return result
else :
return None
2023-10-29 20:59:27 +01:00
def outbound_telemetry_finished ( self , message ) :
if message . state == LXMF . LXMessage . FAILED and hasattr ( message , " try_propagation_on_fail " ) and message . try_propagation_on_fail :
RNS . log ( " Direct delivery of telemetry update " + str ( message ) + " failed. Retrying as propagated message. " , RNS . LOG_VERBOSE )
message . try_propagation_on_fail = None
message . delivery_attempts = 0
del message . next_delivery_attempt
message . packed = None
message . desired_method = LXMF . LXMessage . PROPAGATED
self . message_router . handle_outbound ( message )
else :
if message . state == LXMF . LXMessage . DELIVERED :
2023-10-29 23:03:51 +01:00
self . setpersistent ( f " telemetry. { RNS . hexrep ( message . destination_hash , delimit = False ) } .last_send_success_timebase " , message . telemetry_timebase )
self . setstate ( f " telemetry. { RNS . hexrep ( message . destination_hash , delimit = False ) } .update_sending " , False )
if message . destination_hash == self . config [ " telemetry_collector " ] :
self . pending_telemetry_send = False
self . pending_telemetry_send_try = 0
self . telemetry_send_blocked_until = 0
2023-10-29 20:59:27 +01:00
else :
2023-10-29 23:03:51 +01:00
self . setstate ( f " telemetry. { RNS . hexrep ( message . destination_hash , delimit = False ) } .update_sending " , False )
2023-10-29 20:59:27 +01:00
2023-10-30 00:32:52 +01:00
def telemetry_request_finished ( self , message ) :
if message . state == LXMF . LXMessage . FAILED and hasattr ( message , " try_propagation_on_fail " ) and message . try_propagation_on_fail :
RNS . log ( " Direct delivery of telemetry request " + str ( message ) + " failed. Retrying as propagated message. " , RNS . LOG_VERBOSE )
message . try_propagation_on_fail = None
message . delivery_attempts = 0
del message . next_delivery_attempt
message . packed = None
message . desired_method = LXMF . LXMessage . PROPAGATED
self . message_router . handle_outbound ( message )
else :
if message . state == LXMF . LXMessage . DELIVERED :
self . setpersistent ( f " telemetry. { RNS . hexrep ( message . destination_hash , delimit = False ) } .last_request_success_timebase " , message . request_timebase )
self . setstate ( f " telemetry. { RNS . hexrep ( message . destination_hash , delimit = False ) } .request_sending " , False )
if message . destination_hash == self . config [ " telemetry_collector " ] :
self . pending_telemetry_request = False
self . pending_telemetry_request_try = 0
self . telemetry_request_blocked_until = 0
else :
self . setstate ( f " telemetry. { RNS . hexrep ( message . destination_hash , delimit = False ) } .request_sending " , False )
2023-10-29 20:59:27 +01:00
def request_latest_telemetry ( self , from_addr = None ) :
2023-10-30 16:55:55 +01:00
if from_addr == None or from_addr == self . lxmf_destination . hash :
2023-10-30 13:45:58 +01:00
return " no_address "
else :
if self . getstate ( f " telemetry. { RNS . hexrep ( from_addr , delimit = False ) } .request_sending " ) == True :
RNS . log ( " Not sending new telemetry request, since an earlier transfer is already in progress " , RNS . LOG_DEBUG )
return " in_progress "
2023-10-30 00:32:52 +01:00
2023-10-30 13:45:58 +01:00
if from_addr != None :
dest_identity = RNS . Identity . recall ( from_addr )
2023-10-30 00:32:52 +01:00
2023-10-30 13:45:58 +01:00
if dest_identity == None :
RNS . log ( " The identity for " + RNS . prettyhexrep ( from_addr ) + " could not be recalled. Requesting identity from network... " , RNS . LOG_DEBUG )
RNS . Transport . request_path ( from_addr )
return " destination_unknown "
2023-10-30 00:32:52 +01:00
else :
2023-10-30 13:45:58 +01:00
now = time . time ( )
dest = RNS . Destination ( dest_identity , RNS . Destination . OUT , RNS . Destination . SINGLE , " lxmf " , " delivery " )
source = self . lxmf_destination
if self . config [ " telemetry_use_propagation_only " ] == True :
desired_method = LXMF . LXMessage . PROPAGATED
else :
desired_method = LXMF . LXMessage . DIRECT
2023-10-30 00:32:52 +01:00
2023-10-30 13:45:58 +01:00
request_timebase = self . getpersistent ( f " telemetry. { RNS . hexrep ( from_addr , delimit = False ) } .timebase " ) or now - self . telemetry_request_max_history
lxm_fields = { LXMF . FIELD_COMMANDS : [
{ Commands . TELEMETRY_REQUEST : request_timebase } ,
] }
2023-10-30 00:32:52 +01:00
2023-10-30 13:45:58 +01:00
lxm = LXMF . LXMessage ( dest , source , " " , desired_method = desired_method , fields = lxm_fields )
lxm . request_timebase = request_timebase
lxm . register_delivery_callback ( self . telemetry_request_finished )
lxm . register_failed_callback ( self . telemetry_request_finished )
2023-10-30 00:32:52 +01:00
2023-10-30 13:45:58 +01:00
if self . message_router . get_outbound_propagation_node ( ) != None :
if self . config [ " telemetry_try_propagation_on_fail " ] :
lxm . try_propagation_on_fail = True
2023-10-30 00:32:52 +01:00
2023-10-30 13:45:58 +01:00
RNS . log ( f " Sending telemetry request with timebase { request_timebase } " , RNS . LOG_DEBUG )
self . setpersistent ( f " telemetry. { RNS . hexrep ( from_addr , delimit = False ) } .last_request_attempt " , time . time ( ) )
self . setstate ( f " telemetry. { RNS . hexrep ( from_addr , delimit = False ) } .request_sending " , True )
self . message_router . handle_outbound ( lxm )
return " sent "
2023-10-30 00:32:52 +01:00
2023-10-30 13:45:58 +01:00
else :
return " not_sent "
2023-10-30 00:32:52 +01:00
2023-10-29 20:59:27 +01:00
2023-10-30 22:26:20 +01:00
def send_latest_telemetry ( self , to_addr = None , stream = None , is_authorized_telemetry_request = False ) :
2023-10-30 16:55:55 +01:00
if to_addr == None or to_addr == self . lxmf_destination . hash :
2023-10-30 13:45:58 +01:00
return " no_address "
else :
2023-10-30 22:26:20 +01:00
if to_addr == self . config [ " telemetry_collector " ] :
is_authorized_telemetry_request = True
2023-10-30 13:45:58 +01:00
if self . getstate ( f " telemetry. { RNS . hexrep ( to_addr , delimit = False ) } .update_sending " ) == True :
RNS . log ( " Not sending new telemetry update, since an earlier transfer is already in progress " , RNS . LOG_DEBUG )
return " in_progress "
2023-10-29 20:59:27 +01:00
2023-10-30 22:26:20 +01:00
if ( self . latest_packed_telemetry != None and self . latest_telemetry != None ) or stream != None :
2023-10-30 13:45:58 +01:00
dest_identity = RNS . Identity . recall ( to_addr )
2023-10-29 20:59:27 +01:00
2023-10-30 13:45:58 +01:00
if dest_identity == None :
RNS . log ( " The identity for " + RNS . prettyhexrep ( to_addr ) + " could not be recalled. Requesting identity from network... " , RNS . LOG_DEBUG )
RNS . Transport . request_path ( to_addr )
return " destination_unknown "
2023-10-29 20:59:27 +01:00
else :
2023-10-30 13:45:58 +01:00
dest = RNS . Destination ( dest_identity , RNS . Destination . OUT , RNS . Destination . SINGLE , " lxmf " , " delivery " )
source = self . lxmf_destination
2023-10-29 20:59:27 +01:00
2023-10-30 13:45:58 +01:00
if self . config [ " telemetry_use_propagation_only " ] == True :
desired_method = LXMF . LXMessage . PROPAGATED
2023-10-29 20:59:27 +01:00
else :
2023-10-30 13:45:58 +01:00
desired_method = LXMF . LXMessage . DIRECT
2023-10-30 22:49:29 +01:00
lxm_fields = self . get_message_fields ( to_addr , is_authorized_telemetry_request = is_authorized_telemetry_request , signal_already_sent = True )
2023-11-01 16:34:24 +01:00
if lxm_fields == False and stream == None :
2023-10-30 22:49:29 +01:00
return " already_sent "
2023-10-30 13:45:58 +01:00
if stream != None and len ( stream ) > 0 :
2023-11-01 16:34:24 +01:00
if lxm_fields == False :
lxm_fields = { }
2023-10-30 13:45:58 +01:00
lxm_fields [ LXMF . FIELD_TELEMETRY_STREAM ] = stream
2023-11-01 16:34:24 +01:00
if lxm_fields != None and lxm_fields != False and ( LXMF . FIELD_TELEMETRY in lxm_fields or LXMF . FIELD_TELEMETRY_STREAM in lxm_fields ) :
2023-10-30 13:45:58 +01:00
if LXMF . FIELD_TELEMETRY in lxm_fields :
telemeter = Telemeter . from_packed ( lxm_fields [ LXMF . FIELD_TELEMETRY ] )
telemetry_timebase = telemeter . read_all ( ) [ " time " ] [ " utc " ]
elif LXMF . FIELD_TELEMETRY_STREAM in lxm_fields :
telemetry_timebase = 0
for te in lxm_fields [ LXMF . FIELD_TELEMETRY_STREAM ] :
ts = te [ 1 ]
telemetry_timebase = max ( telemetry_timebase , ts )
if telemetry_timebase > ( self . getpersistent ( f " telemetry. { RNS . hexrep ( to_addr , delimit = False ) } .last_send_success_timebase " ) or 0 ) :
lxm = LXMF . LXMessage ( dest , source , " " , desired_method = desired_method , fields = lxm_fields )
lxm . telemetry_timebase = telemetry_timebase
lxm . register_delivery_callback ( self . outbound_telemetry_finished )
lxm . register_failed_callback ( self . outbound_telemetry_finished )
if self . message_router . get_outbound_propagation_node ( ) != None :
if self . config [ " telemetry_try_propagation_on_fail " ] :
lxm . try_propagation_on_fail = True
RNS . log ( f " Sending telemetry update with timebase { telemetry_timebase } " , RNS . LOG_DEBUG )
self . setpersistent ( f " telemetry. { RNS . hexrep ( to_addr , delimit = False ) } .last_send_attempt " , time . time ( ) )
self . setstate ( f " telemetry. { RNS . hexrep ( to_addr , delimit = False ) } .update_sending " , True )
self . message_router . handle_outbound ( lxm )
return " sent "
else :
RNS . log ( f " Telemetry update with timebase { telemetry_timebase } was already successfully sent " , RNS . LOG_DEBUG )
return " already_sent "
else :
2023-10-30 22:49:29 +01:00
return " nothing_to_send "
2023-10-29 20:59:27 +01:00
2023-10-30 13:45:58 +01:00
else :
RNS . log ( " A telemetry update was requested, but there was nothing to send. " , RNS . LOG_WARNING )
2023-10-30 22:26:20 +01:00
return " nothing_to_send "
2023-10-29 20:59:27 +01:00
2023-10-20 23:38:28 +02:00
def list_telemetry ( self , context_dest = None , after = None , before = None , limit = None ) :
2023-10-21 01:02:43 +02:00
return self . _db_telemetry ( context_dest = context_dest , after = after , before = before , limit = limit ) or [ ]
2023-10-20 23:38:28 +02:00
2023-10-22 01:12:55 +02:00
def peer_telemetry ( self , context_dest , after = None , before = None , limit = None ) :
2023-10-24 01:14:59 +02:00
if context_dest == self . lxmf_destination . hash and limit == 1 :
try :
2023-10-26 11:53:42 +02:00
if self . latest_telemetry != None and self . latest_packed_telemetry != None :
return [ [ self . latest_telemetry [ " time " ] [ " utc " ] , self . latest_packed_telemetry ] ]
else :
return [ ]
2023-10-25 02:58:36 +02:00
except Exception as e :
2023-10-24 01:14:59 +02:00
RNS . log ( " An error occurred while retrieving telemetry from the database: " + str ( e ) , RNS . LOG_ERROR )
return [ ]
try :
pts = self . _db_telemetry ( context_dest , after = after , before = before , limit = limit )
if pts != None :
if context_dest in pts :
return pts [ context_dest ]
except Exception as e :
RNS . log ( " An error occurred while retrieving telemetry from the database: " + str ( e ) , RNS . LOG_ERROR )
2023-10-22 01:12:55 +02:00
return [ ]
2023-10-28 22:27:56 +02:00
def owm_location ( self ) :
return self . peer_location ( self . lxmf_destination . hash )
2023-10-22 01:12:55 +02:00
def peer_location ( self , context_dest ) :
2023-10-28 22:27:56 +02:00
if context_dest == None :
return None
if context_dest == self . lxmf_destination . hash :
try :
if self . latest_telemetry != None :
lt = self . latest_telemetry
if " location " in lt and lt [ " location " ] != None :
l = lt [ " location " ]
if " latitude " in l and " longtitude " in l :
if l [ " latitude " ] != None and l [ " longtitude " ] != None :
return l
return None
except Exception as e :
RNS . log ( " Error while getting own location: " + str ( e ) , RNS . LOG_ERROR )
2023-10-26 18:54:46 +02:00
after_time = time . time ( ) - 3 * 30 * 24 * 60 * 60
2023-10-22 01:12:55 +02:00
pts = self . peer_telemetry ( context_dest , after = after_time )
for pt in pts :
try :
t = Telemeter . from_packed ( pt [ 1 ] ) . read_all ( )
2023-10-22 21:18:37 +02:00
if " location " in t and t [ " location " ] != None :
2023-10-22 01:12:55 +02:00
l = t [ " location " ]
if " latitude " in l and " longtitude " in l :
if l [ " latitude " ] != None and l [ " longtitude " ] != None :
return l
except :
pass
return None
2022-11-23 13:28:26 +01:00
def list_messages ( self , context_dest , after = None , before = None , limit = None ) :
result = self . _db_messages ( context_dest , after , before , limit )
2022-04-07 21:03:53 +02:00
if result != None :
return result
else :
return [ ]
2022-10-02 01:31:47 +02:00
def service_available ( self ) :
2023-11-01 17:29:16 +01:00
now = time . time ( )
2022-10-02 01:31:47 +02:00
service_heartbeat = self . getstate ( " service.heartbeat " )
if not service_heartbeat :
2023-11-01 17:29:16 +01:00
RNS . log ( " No service heartbeat available at " + str ( now ) , RNS . LOG_DEBUG )
2022-10-02 01:31:47 +02:00
return False
else :
try :
2023-11-01 17:29:16 +01:00
if now - service_heartbeat > 4.0 :
RNS . log ( " Stale service heartbeat at " + str ( now ) , RNS . LOG_DEBUG )
2022-10-02 01:31:47 +02:00
return False
else :
return True
2023-11-01 17:29:16 +01:00
except Exception as e :
RNS . log ( " Error while getting service heartbeat: " + str ( e ) , RNS . LOG_ERROR )
2023-11-04 19:42:06 +01:00
RNS . log ( " Response was: " + str ( service_heartbeat ) , RNS . LOG_ERROR )
2022-10-02 01:31:47 +02:00
return False
2022-10-02 01:14:29 +02:00
def gui_foreground ( self ) :
2023-10-22 20:47:14 +02:00
return self . getstate ( " app.foreground " )
2022-10-02 01:14:29 +02:00
def gui_display ( self ) :
2023-10-22 20:47:14 +02:00
return self . getstate ( " app.displaying " )
2022-10-02 01:14:29 +02:00
def gui_conversation ( self ) :
2023-10-22 20:47:14 +02:00
return self . getstate ( " app.active_conversation " )
2022-10-02 01:14:29 +02:00
def setstate ( self , prop , val ) :
2023-11-04 19:42:06 +01:00
with self . state_lock :
if not self . service_stopped :
if not RNS . vendor . platformutils . is_android ( ) :
self . state_db [ prop ] = val
return True
else :
if self . is_service :
self . state_db [ prop ] = val
return True
else :
def set ( ) :
if self . rpc_connection == None :
self . rpc_connection = multiprocessing . connection . Client ( self . rpc_addr , authkey = self . rpc_key )
self . rpc_connection . send ( { " setstate " : ( prop , val ) } )
response = self . rpc_connection . recv ( )
return response
2023-11-02 18:39:42 +01:00
2023-11-04 19:42:06 +01:00
try :
set ( )
except Exception as e :
RNS . log ( " Error while setting state over RPC: " + str ( e ) + " . Retrying once. " , RNS . LOG_DEBUG )
try :
set ( )
except Exception as e :
RNS . log ( " Error on retry as well: " + str ( e ) + " . Giving up. " , RNS . LOG_DEBUG )
return False
2022-11-23 18:57:53 +01:00
2023-10-26 11:53:42 +02:00
def service_set_latest_telemetry ( self , latest_telemetry , latest_packed_telemetry ) :
if not RNS . vendor . platformutils . is_android ( ) :
pass
else :
if self . is_service :
self . latest_telemetry = latest_telemetry
self . latest_packed_telemetry = latest_packed_telemetry
return True
else :
try :
if self . rpc_connection == None :
self . rpc_connection = multiprocessing . connection . Client ( self . rpc_addr , authkey = self . rpc_key )
self . rpc_connection . send ( { " latest_telemetry " : ( latest_telemetry , latest_packed_telemetry ) } )
response = self . rpc_connection . recv ( )
return response
except Exception as e :
RNS . log ( " Error while setting telemetry over RPC: " + str ( e ) , RNS . LOG_DEBUG )
return False
2023-10-26 13:21:49 +02:00
def service_rpc_set_debug ( self , debug ) :
if not RNS . vendor . platformutils . is_android ( ) :
pass
else :
if self . is_service :
if debug :
2023-11-07 00:11:37 +01:00
RNS . loglevel = 6
2023-10-26 13:21:49 +02:00
else :
2023-10-26 13:43:28 +02:00
RNS . loglevel = 2
2023-10-26 13:21:49 +02:00
return True
else :
try :
if self . rpc_connection == None :
self . rpc_connection = multiprocessing . connection . Client ( self . rpc_addr , authkey = self . rpc_key )
self . rpc_connection . send ( { " set_debug " : debug } )
response = self . rpc_connection . recv ( )
return response
except Exception as e :
RNS . log ( " Error while setting log level over RPC: " + str ( e ) , RNS . LOG_DEBUG )
return False
2022-11-23 18:57:53 +01:00
def getstate ( self , prop , allow_cache = False ) :
2023-11-04 19:42:06 +01:00
with self . state_lock :
if not self . service_stopped :
# TODO: remove
# us = time.time()
if not RNS . vendor . platformutils . is_android ( ) :
if prop in self . state_db :
return self . state_db [ prop ]
else :
return None
2023-10-22 20:16:41 +02:00
else :
2023-11-04 19:42:06 +01:00
if self . is_service :
if prop in self . state_db :
return self . state_db [ prop ]
else :
return None
else :
try :
if self . rpc_connection == None :
self . rpc_connection = multiprocessing . connection . Client ( self . rpc_addr , authkey = self . rpc_key )
self . rpc_connection . send ( { " getstate " : prop } )
response = self . rpc_connection . recv ( )
# TODO: Remove
# RNS.log("RPC getstate result for "+str(prop)+"="+str(response)+" in "+RNS.prettytime(time.time()-us), RNS.LOG_WARNING)
return response
2022-11-23 18:57:53 +01:00
2023-11-04 19:42:06 +01:00
except Exception as e :
RNS . log ( " Error while retrieving state " + str ( prop ) + " over RPC: " + str ( e ) , RNS . LOG_DEBUG )
self . rpc_connection = None
return None
2023-10-22 20:16:41 +02:00
def __start_rpc_listener ( self ) :
try :
RNS . log ( " Starting RPC listener " , RNS . LOG_DEBUG )
self . rpc_listener = multiprocessing . connection . Listener ( self . rpc_addr , authkey = self . rpc_key )
thread = threading . Thread ( target = self . __rpc_loop )
thread . daemon = True
thread . start ( )
except Exception as e :
RNS . log ( " Could not start RPC listener on " + str ( self . rpc_addr ) + " . Terminating now. Clear up anything using the port and try again. " , RNS . LOG_ERROR )
RNS . panic ( )
2022-11-23 18:57:53 +01:00
2023-10-22 20:16:41 +02:00
def __rpc_loop ( self ) :
while True :
try :
RNS . log ( " Ready for next RPC client " , RNS . LOG_DEBUG )
rpc_connection = self . rpc_listener . accept ( )
RNS . log ( " Accepted RPC client " , RNS . LOG_DEBUG )
def job_factory ( connection ) :
def rpc_client_job ( ) :
try :
while connection :
call = connection . recv ( )
if " getstate " in call :
prop = call [ " getstate " ]
connection . send ( self . getstate ( prop ) )
elif " setstate " in call :
prop , val = call [ " setstate " ]
connection . send ( self . setstate ( prop , val ) )
2023-10-26 11:53:42 +02:00
elif " latest_telemetry " in call :
t , p = call [ " latest_telemetry " ]
self . latest_telemetry = t
self . latest_packed_telemetry = p
connection . send ( True )
2023-10-26 13:21:49 +02:00
elif " set_debug " in call :
self . service_rpc_set_debug ( call [ " set_debug " ] )
connection . send ( True )
2023-10-22 20:16:41 +02:00
except Exception as e :
RNS . log ( " Error on client RPC connection: " + str ( e ) , RNS . LOG_ERROR )
2023-11-04 19:42:06 +01:00
try :
connection . close ( )
except :
pass
2023-10-22 20:16:41 +02:00
return rpc_client_job
threading . Thread ( target = job_factory ( rpc_connection ) , daemon = True ) . start ( )
2022-11-23 18:57:53 +01:00
2023-10-22 20:16:41 +02:00
except Exception as e :
RNS . log ( " An error ocurred while handling RPC call from local client: " + str ( e ) , RNS . LOG_ERROR )
2022-10-02 01:14:29 +02:00
def setpersistent ( self , prop , val ) :
self . _db_setpersistent ( prop , val )
2022-11-23 18:57:53 +01:00
# def cb():
# self._db_setpersistent(prop, val)
# threading.Thread(target=cb, daemon=True).start()
2022-10-02 01:14:29 +02:00
def getpersistent ( self , prop ) :
return self . _db_getpersistent ( prop )
2022-04-07 21:03:53 +02:00
def __event_conversations_changed ( self ) :
pass
def __event_conversation_changed ( self , context_dest ) :
pass
2022-11-23 18:57:53 +01:00
def __db_connect ( self ) :
if self . db == None :
self . db = sqlite3 . connect ( self . db_path , check_same_thread = False )
return self . db
2022-04-07 21:03:53 +02:00
def __db_init ( self ) :
2022-11-23 18:57:53 +01:00
db = self . __db_connect ( )
2022-04-07 21:03:53 +02:00
dbc = db . cursor ( )
dbc . execute ( " DROP TABLE IF EXISTS lxm " )
2023-10-22 01:12:55 +02:00
dbc . execute ( " CREATE TABLE lxm (lxm_hash BLOB PRIMARY KEY, dest BLOB, source BLOB, title BLOB, tx_ts INTEGER, rx_ts INTEGER, state INTEGER, method INTEGER, t_encrypted INTEGER, t_encryption INTEGER, data BLOB, extra BLOB) " )
2022-04-07 21:03:53 +02:00
dbc . execute ( " DROP TABLE IF EXISTS conv " )
dbc . execute ( " CREATE TABLE conv (dest_context BLOB PRIMARY KEY, last_tx INTEGER, last_rx INTEGER, unread INTEGER, type INTEGER, trust INTEGER, name BLOB, data BLOB) " )
dbc . execute ( " DROP TABLE IF EXISTS announce " )
2022-07-06 17:02:29 +02:00
dbc . execute ( " CREATE TABLE announce (id PRIMARY KEY, received INTEGER, source BLOB, data BLOB, dest_type BLOB) " )
2022-04-07 21:03:53 +02:00
2023-10-22 01:12:55 +02:00
dbc . execute ( " DROP TABLE IF EXISTS telemetry " )
dbc . execute ( " CREATE TABLE IF NOT EXISTS telemetry (id INTEGER PRIMARY KEY, dest_context BLOB, ts INTEGER, data BLOB) " )
2022-10-02 01:14:29 +02:00
dbc . execute ( " DROP TABLE IF EXISTS state " )
dbc . execute ( " CREATE TABLE state (property BLOB PRIMARY KEY, value BLOB) " )
dbc . execute ( " DROP TABLE IF EXISTS persistent " )
dbc . execute ( " CREATE TABLE persistent (property BLOB PRIMARY KEY, value BLOB) " )
db . commit ( )
2022-11-23 18:57:53 +01:00
def __db_indices ( self ) :
db = self . __db_connect ( )
dbc = db . cursor ( )
dbc . execute ( " CREATE UNIQUE INDEX IF NOT EXISTS idx_persistent_property ON persistent(property) " )
dbc . execute ( " CREATE UNIQUE INDEX IF NOT EXISTS idx_state_property ON state(property) " )
dbc . execute ( " CREATE UNIQUE INDEX IF NOT EXISTS idx_conv_dest_context ON conv(dest_context) " )
db . commit ( )
2022-10-02 01:14:29 +02:00
2023-10-22 01:12:55 +02:00
def _db_inittelemetry ( self ) :
db = self . __db_connect ( )
dbc = db . cursor ( )
dbc . execute ( " CREATE TABLE IF NOT EXISTS telemetry (id INTEGER PRIMARY KEY, dest_context BLOB, ts INTEGER, data BLOB) " )
db . commit ( )
def _db_upgradetables ( self ) :
# TODO: Remove this again at some point in the future
db = self . __db_connect ( )
dbc = db . cursor ( )
dbc . execute ( " SELECT sql FROM sqlite_master WHERE type = ' table ' AND name = ' lxm ' AND sql LIKE ' %e xtra % ' " )
result = dbc . fetchall ( )
if len ( result ) == 0 :
dbc . execute ( " ALTER TABLE lxm ADD COLUMN extra BLOB " )
db . commit ( )
2022-10-02 01:14:29 +02:00
def _db_initstate ( self ) :
2023-11-04 19:42:06 +01:00
# db = self.__db_connect()
# dbc = db.cursor()
2022-10-02 01:14:29 +02:00
2023-11-04 19:42:06 +01:00
# dbc.execute("DROP TABLE IF EXISTS state")
# dbc.execute("CREATE TABLE state (property BLOB PRIMARY KEY, value BLOB)")
# db.commit()
self . setstate ( " database_ready " , True )
2022-10-02 01:14:29 +02:00
2023-11-04 19:42:06 +01:00
# def _db_getstate(self, prop):
# try:
# db = self.__db_connect()
# dbc = db.cursor()
2022-10-02 01:14:29 +02:00
2023-11-04 19:42:06 +01:00
# query = "select * from state where property=:uprop"
# dbc.execute(query, {"uprop": prop.encode("utf-8")})
2022-11-23 18:57:53 +01:00
2023-11-04 19:42:06 +01:00
# result = dbc.fetchall()
# if len(result) < 1:
# return None
# else:
# try:
# entry = result[0]
# val = msgpack.unpackb(entry[1])
2022-11-23 18:57:53 +01:00
2023-11-04 19:42:06 +01:00
# return val
# except Exception as e:
# RNS.log("Could not unpack state value from database for property \""+str(prop)+"\". The contained exception was: "+str(e), RNS.LOG_ERROR)
# return None
# except Exception as e:
# RNS.log("An error occurred during getstate database operation: "+str(e), RNS.LOG_ERROR)
# self.db = None
# def _db_setstate(self, prop, val):
# try:
# uprop = prop.encode("utf-8")
# bval = msgpack.packb(val)
# if self._db_getstate(prop) == None:
# try:
# db = self.__db_connect()
# dbc = db.cursor()
# query = "INSERT INTO state (property, value) values (?, ?)"
# data = (uprop, bval)
# dbc.execute(query, data)
# db.commit()
# except Exception as e:
# RNS.log("Error while setting state property "+str(prop)+" in DB: "+str(e), RNS.LOG_ERROR)
# RNS.log("Retrying as update query...", RNS.LOG_ERROR)
# db = self.__db_connect()
# dbc = db.cursor()
# query = "UPDATE state set value=:bval where property=:uprop;"
# dbc.execute(query, {"bval": bval, "uprop": uprop})
# db.commit()
# else:
# db = self.__db_connect()
# dbc = db.cursor()
# query = "UPDATE state set value=:bval where property=:uprop;"
# dbc.execute(query, {"bval": bval, "uprop": uprop})
# db.commit()
# except Exception as e:
# RNS.log("An error occurred during setstate database operation: "+str(e), RNS.LOG_ERROR)
# self.db = None
2022-10-02 01:14:29 +02:00
def _db_initpersistent ( self ) :
2022-11-23 18:57:53 +01:00
db = self . __db_connect ( )
2022-10-02 01:14:29 +02:00
dbc = db . cursor ( )
dbc . execute ( " CREATE TABLE IF NOT EXISTS persistent (property BLOB PRIMARY KEY, value BLOB) " )
2022-11-23 18:57:53 +01:00
db . commit ( )
2022-10-02 01:14:29 +02:00
def _db_getpersistent ( self , prop ) :
2022-11-23 18:57:53 +01:00
try :
db = self . __db_connect ( )
dbc = db . cursor ( )
query = " select * from persistent where property=:uprop "
dbc . execute ( query , { " uprop " : prop . encode ( " utf-8 " ) } )
result = dbc . fetchall ( )
if len ( result ) < 1 :
2022-10-02 01:14:29 +02:00
return None
2022-11-23 18:57:53 +01:00
else :
try :
entry = result [ 0 ]
val = msgpack . unpackb ( entry [ 1 ] )
if val == None :
query = " delete from persistent where (property=:uprop); "
dbc . execute ( query , { " uprop " : prop . encode ( " utf-8 " ) } )
db . commit ( )
return val
except Exception as e :
RNS . log ( " Could not unpack persistent value from database for property \" " + str ( prop ) + " \" . The contained exception was: " + str ( e ) , RNS . LOG_ERROR )
return None
except Exception as e :
RNS . log ( " An error occurred during persistent getstate database operation: " + str ( e ) , RNS . LOG_ERROR )
self . db = None
2022-10-02 01:14:29 +02:00
def _db_setpersistent ( self , prop , val ) :
2022-11-23 18:57:53 +01:00
try :
db = self . __db_connect ( )
dbc = db . cursor ( )
uprop = prop . encode ( " utf-8 " )
bval = msgpack . packb ( val )
2022-10-02 01:14:29 +02:00
2022-11-23 18:57:53 +01:00
if self . _db_getpersistent ( prop ) == None :
try :
query = " INSERT INTO persistent (property, value) values (?, ?) "
data = ( uprop , bval )
dbc . execute ( query , data )
db . commit ( )
except Exception as e :
RNS . log ( " Error while setting persistent state property " + str ( prop ) + " in DB: " + str ( e ) , RNS . LOG_ERROR )
RNS . log ( " Retrying as update query... " )
query = " UPDATE state set value=:bval where property=:uprop; "
dbc . execute ( query , { " bval " : bval , " uprop " : uprop } )
db . commit ( )
2022-10-02 01:14:29 +02:00
2022-11-23 18:57:53 +01:00
else :
query = " UPDATE persistent set value=:bval where property=:uprop; "
dbc . execute ( query , { " bval " : bval , " uprop " : uprop } )
db . commit ( )
except Exception as e :
RNS . log ( " An error occurred during persistent setstate database operation: " + str ( e ) , RNS . LOG_ERROR )
self . db = None
2022-04-07 21:03:53 +02:00
2023-09-20 21:41:26 +02:00
def _db_conversation_update_txtime ( self , context_dest ) :
db = self . __db_connect ( )
dbc = db . cursor ( )
query = " UPDATE conv set last_tx = ? where dest_context = ? "
data = ( time . time ( ) , context_dest )
dbc . execute ( query , data )
result = dbc . fetchall ( )
db . commit ( )
def _db_conversation_set_unread ( self , context_dest , unread , tx = False ) :
2022-11-23 18:57:53 +01:00
db = self . __db_connect ( )
2022-04-07 21:03:53 +02:00
dbc = db . cursor ( )
2023-09-20 21:41:26 +02:00
if unread :
if tx :
query = " UPDATE conv set unread = ?, last_tx = ? where dest_context = ? "
data = ( unread , time . time ( ) , context_dest )
else :
query = " UPDATE conv set unread = ?, last_rx = ? where dest_context = ? "
data = ( unread , time . time ( ) , context_dest )
else :
query = " UPDATE conv set unread = ? where dest_context = ? "
data = ( unread , context_dest )
2022-04-07 21:03:53 +02:00
dbc . execute ( query , data )
result = dbc . fetchall ( )
db . commit ( )
2023-10-20 23:38:28 +02:00
def _db_telemetry ( self , context_dest = None , after = None , before = None , limit = None ) :
db = self . __db_connect ( )
dbc = db . cursor ( )
2023-10-24 01:14:59 +02:00
limit_part = " "
if limit :
limit_part = " LIMIT " + str ( int ( limit ) )
order_part = " order by ts DESC " + limit_part
2023-10-20 23:38:28 +02:00
if context_dest == None :
if after != None and before == None :
query = " select * from telemetry where ts>:after_ts " + order_part
dbc . execute ( query , { " after_ts " : after } )
elif after == None and before != None :
query = " select * from telemetry where ts<:before_ts " + order_part
dbc . execute ( query , { " before_ts " : before } )
elif after != None and before != None :
query = " select * from telemetry where ts<:before_ts and ts>:after_ts " + order_part
dbc . execute ( query , { " before_ts " : before , " after_ts " : after } )
else :
query = query = " select * from telemetry "
dbc . execute ( query , { } )
else :
if after != None and before == None :
query = " select * from telemetry where dest_context=:context_dest and ts>:after_ts " + order_part
dbc . execute ( query , { " context_dest " : context_dest , " after_ts " : after } )
elif after == None and before != None :
query = " select * from telemetry where dest_context=:context_dest and ts<:before_ts " + order_part
dbc . execute ( query , { " context_dest " : context_dest , " before_ts " : before } )
elif after != None and before != None :
query = " select * from telemetry where dest_context=:context_dest and ts<:before_ts and ts>:after_ts " + order_part
dbc . execute ( query , { " context_dest " : context_dest , " before_ts " : before , " after_ts " : after } )
else :
query = query = " select * from telemetry where dest_context=:context_dest " + order_part
dbc . execute ( query , { " context_dest " : context_dest } )
result = dbc . fetchall ( )
if len ( result ) < 1 :
return None
else :
results = { }
for entry in result :
telemetry_source = entry [ 1 ]
telemetry_timestamp = entry [ 2 ]
telemetry_data = entry [ 3 ]
if not telemetry_source in results :
results [ telemetry_source ] = [ ]
results [ telemetry_source ] . append ( [ telemetry_timestamp , telemetry_data ] )
return results
2023-10-30 22:26:20 +01:00
def _db_save_telemetry ( self , context_dest , telemetry , physical_link = None , source_dest = None , via = None ) :
2023-10-20 23:38:28 +02:00
try :
remote_telemeter = Telemeter . from_packed ( telemetry )
2023-10-30 22:26:20 +01:00
read_telemetry = remote_telemeter . read_all ( )
telemetry_timestamp = read_telemetry [ " time " ] [ " utc " ]
2023-10-20 23:38:28 +02:00
db = self . __db_connect ( )
dbc = db . cursor ( )
query = " select * from telemetry where dest_context=:ctx and ts=:tts "
dbc . execute ( query , { " ctx " : context_dest , " tts " : telemetry_timestamp } )
result = dbc . fetchall ( )
if len ( result ) != 0 :
2023-10-30 22:26:20 +01:00
RNS . log ( " Telemetry entry with source " + RNS . prettyhexrep ( context_dest ) + " and timestamp " + str ( telemetry_timestamp ) + " already exists, skipping save " , RNS . LOG_DEBUG )
return None
2023-10-22 01:12:55 +02:00
if physical_link != None and len ( physical_link ) != 0 :
remote_telemeter . synthesize ( " physical_link " )
if " rssi " in physical_link : remote_telemeter . sensors [ " physical_link " ] . rssi = physical_link [ " rssi " ]
if " snr " in physical_link : remote_telemeter . sensors [ " physical_link " ] . snr = physical_link [ " snr " ]
if " q " in physical_link : remote_telemeter . sensors [ " physical_link " ] . q = physical_link [ " q " ]
remote_telemeter . sensors [ " physical_link " ] . update_data ( )
2023-10-24 01:14:59 +02:00
telemetry = remote_telemeter . packed ( )
2023-10-25 23:21:06 +02:00
if source_dest != None :
remote_telemeter . synthesize ( " received " )
remote_telemeter . sensors [ " received " ] . by = self . lxmf_destination . hash
remote_telemeter . sensors [ " received " ] . via = source_dest
rl = remote_telemeter . read ( " location " )
if rl and " latitude " in rl and " longtitude " in rl and " altitude " in rl :
if self . latest_telemetry != None and " location " in self . latest_telemetry :
ol = self . latest_telemetry [ " location " ]
if " latitude " in ol and " longtitude " in ol and " altitude " in ol :
olat = ol [ " latitude " ] ; olon = ol [ " longtitude " ] ; oalt = ol [ " altitude " ]
rlat = rl [ " latitude " ] ; rlon = rl [ " longtitude " ] ; ralt = rl [ " altitude " ]
if olat != None and olon != None and oalt != None :
if rlat != None and rlon != None and ralt != None :
remote_telemeter . sensors [ " received " ] . set_distance (
( olat , olon , oalt ) , ( rlat , rlon , ralt )
)
remote_telemeter . sensors [ " received " ] . update_data ( )
telemetry = remote_telemeter . packed ( )
2023-10-30 22:26:20 +01:00
if via != None :
if not " received " in remote_telemeter . sensors :
remote_telemeter . synthesize ( " received " )
if " by " in remote_telemeter . sensors [ " received " ] . data :
remote_telemeter . sensors [ " received " ] . by = remote_telemeter . sensors [ " received " ] . data [ " by " ]
if " distance " in remote_telemeter . sensors [ " received " ] . data :
remote_telemeter . sensors [ " received " ] . geodesic_distance = remote_telemeter . sensors [ " received " ] . data [ " distance " ] [ " geodesic " ]
remote_telemeter . sensors [ " received " ] . euclidian_distance = remote_telemeter . sensors [ " received " ] . data [ " distance " ] [ " euclidian " ]
remote_telemeter . sensors [ " received " ] . via = via
remote_telemeter . sensors [ " received " ] . update_data ( )
telemetry = remote_telemeter . packed ( )
2023-10-25 23:21:06 +02:00
2023-10-20 23:38:28 +02:00
query = " INSERT INTO telemetry (dest_context, ts, data) values (?, ?, ?) "
data = ( context_dest , telemetry_timestamp , telemetry )
dbc . execute ( query , data )
db . commit ( )
self . setstate ( " app.flags.last_telemetry " , time . time ( ) )
2023-10-25 23:21:06 +02:00
return telemetry
2023-10-20 23:38:28 +02:00
except Exception as e :
RNS . log ( " An error occurred while saving telemetry to database: " + str ( e ) , RNS . LOG_ERROR )
self . db = None
2023-10-30 23:24:10 +01:00
def _db_update_appearance ( self , context_dest , timestamp , appearance , from_bulk_telemetry = False ) :
2023-10-20 23:38:28 +02:00
conv = self . _db_conversation ( context_dest )
2023-10-30 22:26:20 +01:00
if conv == None :
ae = [ appearance , int ( time . time ( ) ) ]
# TODO: Clean out these temporary values at some interval.
# Probably expire after 14 days or so.
self . setpersistent ( " temp.peer_appearance. " + RNS . hexrep ( context_dest , delimit = False ) , ae )
2023-11-01 16:34:24 +01:00
2023-10-30 22:26:20 +01:00
else :
2023-11-01 16:34:24 +01:00
data_dict = conv [ " data " ]
if data_dict == None :
data_dict = { }
2023-10-22 23:13:51 +02:00
2023-11-01 16:34:24 +01:00
if not " appearance " in data_dict :
data_dict [ " appearance " ] = None
2023-10-30 22:26:20 +01:00
2023-11-01 16:34:24 +01:00
if from_bulk_telemetry and data_dict [ " appearance " ] != SidebandCore . DEFAULT_APPEARANCE :
RNS . log ( " Aborting appearance update from bulk transfer, since conversation already has appearance set: " + str ( appearance ) + " / " + str ( data_dict [ " appearance " ] ) , RNS . LOG_DEBUG )
return
if data_dict [ " appearance " ] != appearance :
data_dict [ " appearance " ] = appearance
packed_dict = msgpack . packb ( data_dict )
db = self . __db_connect ( )
dbc = db . cursor ( )
query = " UPDATE conv set data = ? where dest_context = ? "
data = ( packed_dict , context_dest )
dbc . execute ( query , data )
result = dbc . fetchall ( )
db . commit ( )
2023-10-22 01:12:55 +02:00
2023-10-30 23:24:10 +01:00
def _db_get_appearance ( self , context_dest , conv = None , raw = False ) :
2023-10-24 01:14:59 +02:00
if context_dest == self . lxmf_destination . hash :
return [ self . config [ " telemetry_icon " ] , self . config [ " telemetry_fg " ] , self . config [ " telemetry_bg " ] ]
else :
2023-10-30 22:26:20 +01:00
data_dict = None
if conv != None :
data_dict = conv [ " data " ]
else :
2023-10-30 16:55:55 +01:00
conv = self . _db_conversation ( context_dest )
2023-10-30 22:26:20 +01:00
if conv != None :
data_dict = conv [ " data " ]
else :
data_dict = { }
2023-11-01 16:34:24 +01:00
if data_dict != None :
if not " appearance " in data_dict or data_dict [ " appearance " ] == None :
2023-10-30 22:26:20 +01:00
apd = self . getpersistent ( " temp.peer_appearance. " + RNS . hexrep ( context_dest , delimit = False ) )
if apd != None :
2023-10-30 23:24:10 +01:00
try :
data_dict [ " appearance " ] = apd [ 0 ]
except Exception as e :
RNS . log ( " Could not get appearance data from database: " + str ( e ) , RNS . LOG_ERROR )
data_dict = None
2023-10-30 16:55:55 +01:00
2023-10-24 01:14:59 +02:00
try :
if data_dict != None and " appearance " in data_dict :
def htf ( cbytes ) :
d = 1.0 / 255.0
r = round ( struct . unpack ( " !B " , bytes ( [ cbytes [ 0 ] ] ) ) [ 0 ] * d , 4 )
g = round ( struct . unpack ( " !B " , bytes ( [ cbytes [ 1 ] ] ) ) [ 0 ] * d , 4 )
b = round ( struct . unpack ( " !B " , bytes ( [ cbytes [ 2 ] ] ) ) [ 0 ] * d , 4 )
return [ r , g , b ]
2023-10-30 23:24:10 +01:00
if raw :
appearance = data_dict [ " appearance " ]
else :
appearance = [ data_dict [ " appearance " ] [ 0 ] , htf ( data_dict [ " appearance " ] [ 1 ] ) , htf ( data_dict [ " appearance " ] [ 2 ] ) ]
2023-10-24 01:14:59 +02:00
return appearance
except Exception as e :
RNS . log ( " Could not retrieve appearance for " + RNS . prettyhexrep ( context_dest ) + " : " + str ( e ) , RNS . LOG_ERROR )
2023-10-22 01:12:55 +02:00
return None
2023-10-20 23:38:28 +02:00
2023-10-20 02:41:05 +02:00
def _db_conversation_set_telemetry ( self , context_dest , send_telemetry = False ) :
conv = self . _db_conversation ( context_dest )
data_dict = conv [ " data " ]
if data_dict == None :
data_dict = { }
data_dict [ " telemetry " ] = send_telemetry
packed_dict = msgpack . packb ( data_dict )
db = self . __db_connect ( )
dbc = db . cursor ( )
query = " UPDATE conv set data = ? where dest_context = ? "
data = ( packed_dict , context_dest )
dbc . execute ( query , data )
result = dbc . fetchall ( )
db . commit ( )
2023-10-29 16:01:28 +01:00
def _db_conversation_set_requests ( self , context_dest , allow_requests = False ) :
conv = self . _db_conversation ( context_dest )
data_dict = conv [ " data " ]
if data_dict == None :
data_dict = { }
data_dict [ " allow_requests " ] = allow_requests
packed_dict = msgpack . packb ( data_dict )
db = self . __db_connect ( )
dbc = db . cursor ( )
query = " UPDATE conv set data = ? where dest_context = ? "
data = ( packed_dict , context_dest )
dbc . execute ( query , data )
result = dbc . fetchall ( )
db . commit ( )
2022-04-07 21:03:53 +02:00
def _db_conversation_set_trusted ( self , context_dest , trusted ) :
2022-11-23 18:57:53 +01:00
db = self . __db_connect ( )
2022-04-07 21:03:53 +02:00
dbc = db . cursor ( )
query = " UPDATE conv set trust = ? where dest_context = ? "
data = ( trusted , context_dest )
dbc . execute ( query , data )
result = dbc . fetchall ( )
db . commit ( )
def _db_conversation_set_name ( self , context_dest , name ) :
2022-11-23 18:57:53 +01:00
db = self . __db_connect ( )
2022-04-07 21:03:53 +02:00
dbc = db . cursor ( )
query = " UPDATE conv set name=:name_data where dest_context=:ctx; "
dbc . execute ( query , { " ctx " : context_dest , " name_data " : name . encode ( " utf-8 " ) } )
result = dbc . fetchall ( )
db . commit ( )
def _db_conversations ( self ) :
2022-11-23 18:57:53 +01:00
db = self . __db_connect ( )
2022-04-07 21:03:53 +02:00
dbc = db . cursor ( )
dbc . execute ( " select * from conv " )
result = dbc . fetchall ( )
if len ( result ) < 1 :
return None
else :
convs = [ ]
for entry in result :
2023-09-20 21:41:26 +02:00
last_rx = entry [ 1 ]
last_tx = entry [ 2 ]
last_activity = max ( last_rx , last_tx )
2023-10-30 16:55:55 +01:00
data = None
try :
data = msgpack . unpackb ( entry [ 7 ] )
except :
pass
2023-09-20 21:41:26 +02:00
2022-04-07 21:03:53 +02:00
conv = {
" dest " : entry [ 0 ] ,
" unread " : entry [ 3 ] ,
2023-09-20 21:41:26 +02:00
" last_rx " : last_rx ,
" last_tx " : last_tx ,
" last_activity " : last_activity ,
2023-10-30 16:55:55 +01:00
" trust " : entry [ 5 ] ,
" data " : data ,
2022-04-07 21:03:53 +02:00
}
convs . append ( conv )
2023-09-20 21:41:26 +02:00
return sorted ( convs , key = lambda c : c [ " last_activity " ] , reverse = True )
2022-04-07 21:03:53 +02:00
def _db_announces ( self ) :
2022-11-23 18:57:53 +01:00
db = self . __db_connect ( )
2022-04-07 21:03:53 +02:00
dbc = db . cursor ( )
dbc . execute ( " select * from announce order by received desc " )
result = dbc . fetchall ( )
if len ( result ) < 1 :
return None
else :
announces = [ ]
2022-10-06 16:07:03 +02:00
added_dests = [ ]
2022-04-07 21:03:53 +02:00
for entry in result :
try :
2022-10-06 16:07:03 +02:00
if not entry [ 2 ] in added_dests :
announce = {
" dest " : entry [ 2 ] ,
" data " : entry [ 3 ] . decode ( " utf-8 " ) ,
" time " : entry [ 1 ] ,
" type " : entry [ 4 ]
}
added_dests . append ( entry [ 2 ] )
announces . append ( announce )
2022-04-07 21:03:53 +02:00
except Exception as e :
RNS . log ( " Exception while fetching announce from DB: " + str ( e ) , RNS . LOG_ERROR )
2022-10-06 16:07:03 +02:00
announces . reverse ( )
2022-04-07 21:03:53 +02:00
return announces
def _db_conversation ( self , context_dest ) :
2022-11-23 18:57:53 +01:00
db = self . __db_connect ( )
2022-04-07 21:03:53 +02:00
dbc = db . cursor ( )
query = " select * from conv where dest_context=:ctx "
dbc . execute ( query , { " ctx " : context_dest } )
result = dbc . fetchall ( )
if len ( result ) < 1 :
return None
else :
c = result [ 0 ]
conv = { }
conv [ " dest " ] = c [ 0 ]
conv [ " last_tx " ] = c [ 1 ]
conv [ " last_rx " ] = c [ 2 ]
conv [ " unread " ] = c [ 3 ]
conv [ " type " ] = c [ 4 ]
conv [ " trust " ] = c [ 5 ]
conv [ " name " ] = c [ 6 ] . decode ( " utf-8 " )
conv [ " data " ] = msgpack . unpackb ( c [ 7 ] )
2023-09-20 21:41:26 +02:00
conv [ " last_activity " ] = max ( c [ 1 ] , c [ 2 ] )
2022-04-07 21:03:53 +02:00
return conv
def _db_clear_conversation ( self , context_dest ) :
2022-10-08 19:55:46 +02:00
RNS . log ( " Clearing conversation with " + RNS . prettyhexrep ( context_dest ) , RNS . LOG_DEBUG )
2022-11-23 18:57:53 +01:00
db = self . __db_connect ( )
2022-04-07 21:03:53 +02:00
dbc = db . cursor ( )
query = " delete from lxm where (dest=:ctx_dst or source=:ctx_dst); "
dbc . execute ( query , { " ctx_dst " : context_dest } )
db . commit ( )
2023-10-21 01:02:43 +02:00
def _db_clear_telemetry ( self , context_dest ) :
RNS . log ( " Clearing telemetry for " + RNS . prettyhexrep ( context_dest ) , RNS . LOG_DEBUG )
db = self . __db_connect ( )
dbc = db . cursor ( )
query = " delete from telemetry where dest_context=:ctx_dst; "
dbc . execute ( query , { " ctx_dst " : context_dest } )
db . commit ( )
self . setstate ( " app.flags.last_telemetry " , time . time ( ) )
2022-04-07 21:03:53 +02:00
def _db_delete_conversation ( self , context_dest ) :
2022-10-08 19:55:46 +02:00
RNS . log ( " Deleting conversation with " + RNS . prettyhexrep ( context_dest ) , RNS . LOG_DEBUG )
2022-11-23 18:57:53 +01:00
db = self . __db_connect ( )
2022-04-07 21:03:53 +02:00
dbc = db . cursor ( )
query = " delete from conv where (dest_context=:ctx_dst); "
dbc . execute ( query , { " ctx_dst " : context_dest } )
db . commit ( )
2022-10-08 19:55:46 +02:00
def _db_delete_announce ( self , context_dest ) :
RNS . log ( " Deleting announce with " + RNS . prettyhexrep ( context_dest ) , RNS . LOG_DEBUG )
2022-11-23 18:57:53 +01:00
db = self . __db_connect ( )
2022-10-08 19:55:46 +02:00
dbc = db . cursor ( )
query = " delete from announce where (source=:ctx_dst); "
dbc . execute ( query , { " ctx_dst " : context_dest } )
db . commit ( )
2022-04-07 21:03:53 +02:00
def _db_create_conversation ( self , context_dest , name = None , trust = False ) :
2022-10-08 19:55:46 +02:00
RNS . log ( " Creating conversation for " + RNS . prettyhexrep ( context_dest ) , RNS . LOG_DEBUG )
2022-11-23 18:57:53 +01:00
db = self . __db_connect ( )
2022-04-07 21:03:53 +02:00
dbc = db . cursor ( )
def_name = " " . encode ( " utf-8 " )
query = " INSERT INTO conv (dest_context, last_tx, last_rx, unread, type, trust, name, data) values (?, ?, ?, ?, ?, ?, ?, ?) "
2023-09-20 21:41:26 +02:00
data = ( context_dest , 0 , time . time ( ) , 0 , SidebandCore . CONV_P2P , 0 , def_name , msgpack . packb ( None ) )
2022-04-07 21:03:53 +02:00
dbc . execute ( query , data )
db . commit ( )
if trust :
self . _db_conversation_set_trusted ( context_dest , True )
if name != None and name != " " :
self . _db_conversation_set_name ( context_dest , name )
self . __event_conversations_changed ( )
def _db_delete_message ( self , msg_hash ) :
RNS . log ( " Deleting message " + RNS . prettyhexrep ( msg_hash ) )
2022-11-23 18:57:53 +01:00
db = self . __db_connect ( )
2022-04-07 21:03:53 +02:00
dbc = db . cursor ( )
query = " delete from lxm where (lxm_hash=:mhash); "
dbc . execute ( query , { " mhash " : msg_hash } )
db . commit ( )
def _db_clean_messages ( self ) :
RNS . log ( " Purging stale messages... " + str ( self . db_path ) )
2022-11-23 18:57:53 +01:00
db = self . __db_connect ( )
2022-04-07 21:03:53 +02:00
dbc = db . cursor ( )
query = " delete from lxm where (state=:outbound_state or state=:sending_state); "
dbc . execute ( query , { " outbound_state " : LXMF . LXMessage . OUTBOUND , " sending_state " : LXMF . LXMessage . SENDING } )
db . commit ( )
def _db_message_set_state ( self , lxm_hash , state ) :
2022-11-23 18:57:53 +01:00
db = self . __db_connect ( )
2022-04-07 21:03:53 +02:00
dbc = db . cursor ( )
query = " UPDATE lxm set state = ? where lxm_hash = ? "
data = ( state , lxm_hash )
dbc . execute ( query , data )
db . commit ( )
result = dbc . fetchall ( )
def _db_message_set_method ( self , lxm_hash , method ) :
2022-11-23 18:57:53 +01:00
db = self . __db_connect ( )
2022-04-07 21:03:53 +02:00
dbc = db . cursor ( )
query = " UPDATE lxm set method = ? where lxm_hash = ? "
data = ( method , lxm_hash )
dbc . execute ( query , data )
db . commit ( )
result = dbc . fetchall ( )
def message ( self , msg_hash ) :
return self . _db_message ( msg_hash )
def _db_message ( self , msg_hash ) :
2022-11-23 18:57:53 +01:00
db = self . __db_connect ( )
2022-04-07 21:03:53 +02:00
dbc = db . cursor ( )
query = " select * from lxm where lxm_hash=:mhash "
dbc . execute ( query , { " mhash " : msg_hash } )
result = dbc . fetchall ( )
if len ( result ) < 1 :
return None
else :
entry = result [ 0 ]
2022-11-22 14:25:56 +01:00
lxm_method = entry [ 7 ]
if lxm_method == LXMF . LXMessage . PAPER :
lxm_data = msgpack . unpackb ( entry [ 10 ] )
packed_lxm = lxm_data [ 0 ]
paper_packed_lxm = lxm_data [ 1 ]
else :
packed_lxm = entry [ 10 ]
lxm = LXMF . LXMessage . unpack_from_bytes ( packed_lxm , original_method = lxm_method )
if lxm . desired_method == LXMF . LXMessage . PAPER :
lxm . paper_packed = paper_packed_lxm
2022-04-07 21:03:53 +02:00
message = {
" hash " : lxm . hash ,
" dest " : lxm . destination_hash ,
" source " : lxm . source_hash ,
" title " : lxm . title ,
" content " : lxm . content ,
" received " : entry [ 5 ] ,
" sent " : lxm . timestamp ,
" state " : entry [ 6 ] ,
" method " : entry [ 7 ] ,
" lxm " : lxm
}
return message
2022-11-23 13:28:26 +01:00
def _db_message_count ( self , context_dest ) :
2022-11-23 18:57:53 +01:00
db = self . __db_connect ( )
2022-04-07 21:03:53 +02:00
dbc = db . cursor ( )
2022-11-23 13:28:26 +01:00
query = " select count(*) from lxm where dest=:context_dest or source=:context_dest "
dbc . execute ( query , { " context_dest " : context_dest } )
result = dbc . fetchall ( )
if len ( result ) < 1 :
return None
2022-04-07 21:03:53 +02:00
else :
2022-11-23 13:28:26 +01:00
return result [ 0 ] [ 0 ]
def _db_messages ( self , context_dest , after = None , before = None , limit = None ) :
2022-11-23 18:57:53 +01:00
db = self . __db_connect ( )
2022-11-23 13:28:26 +01:00
dbc = db . cursor ( )
if after != None and before == None :
2022-04-07 21:03:53 +02:00
query = " select * from lxm where (dest=:context_dest or source=:context_dest) and rx_ts>:after_ts "
dbc . execute ( query , { " context_dest " : context_dest , " after_ts " : after } )
2022-11-23 13:28:26 +01:00
elif after == None and before != None :
query = " select * from lxm where (dest=:context_dest or source=:context_dest) and rx_ts<:before_ts "
dbc . execute ( query , { " context_dest " : context_dest , " before_ts " : before } )
elif after != None and before != None :
query = " select * from lxm where (dest=:context_dest or source=:context_dest) and rx_ts<:before_ts and rx_ts>:after_ts "
dbc . execute ( query , { " context_dest " : context_dest , " before_ts " : before , " after_ts " : after } )
else :
query = " select * from lxm where dest=:context_dest or source=:context_dest "
dbc . execute ( query , { " context_dest " : context_dest } )
2022-04-07 21:03:53 +02:00
result = dbc . fetchall ( )
if len ( result ) < 1 :
return None
else :
messages = [ ]
for entry in result :
2022-11-22 14:25:56 +01:00
lxm_method = entry [ 7 ]
if lxm_method == LXMF . LXMessage . PAPER :
lxm_data = msgpack . unpackb ( entry [ 10 ] )
packed_lxm = lxm_data [ 0 ]
paper_packed_lxm = lxm_data [ 1 ]
else :
packed_lxm = entry [ 10 ]
lxm = LXMF . LXMessage . unpack_from_bytes ( packed_lxm , original_method = lxm_method )
if lxm . desired_method == LXMF . LXMessage . PAPER :
lxm . paper_packed = paper_packed_lxm
2023-10-22 01:12:55 +02:00
extras = None
try :
extras = msgpack . unpackb ( entry [ 11 ] )
except :
pass
2022-11-22 14:25:56 +01:00
2022-04-07 21:03:53 +02:00
message = {
" hash " : lxm . hash ,
" dest " : lxm . destination_hash ,
" source " : lxm . source_hash ,
" title " : lxm . title ,
" content " : lxm . content ,
" received " : entry [ 5 ] ,
" sent " : lxm . timestamp ,
" state " : entry [ 6 ] ,
" method " : entry [ 7 ] ,
2023-10-22 01:12:55 +02:00
" lxm " : lxm ,
" extras " : extras ,
2022-04-07 21:03:53 +02:00
}
2022-11-23 13:28:26 +01:00
messages . append ( message )
if len ( messages ) > limit :
messages = messages [ - limit : ]
2022-04-07 21:03:53 +02:00
return messages
2023-10-30 02:28:35 +01:00
def _db_save_lxm ( self , lxm , context_dest , originator = False , own_command = False ) :
2022-04-07 21:03:53 +02:00
state = lxm . state
2023-10-25 23:21:06 +02:00
packed_telemetry = None
if not originator and lxm . fields != None :
2023-10-29 16:54:12 +01:00
if self . config [ " telemetry_receive_trusted_only " ] == False or ( self . config [ " telemetry_receive_trusted_only " ] == True and self . is_trusted ( context_dest ) ) :
if LXMF . FIELD_ICON_APPEARANCE in lxm . fields :
2023-10-30 22:26:20 +01:00
peer_appearance = lxm . fields [ LXMF . FIELD_ICON_APPEARANCE ]
if peer_appearance != None and len ( peer_appearance ) > 0 and len ( peer_appearance ) < 96 :
self . _db_update_appearance ( context_dest , lxm . timestamp , peer_appearance )
2023-10-29 16:54:12 +01:00
if LXMF . FIELD_TELEMETRY in lxm . fields :
physical_link = { }
if lxm . rssi or lxm . snr or lxm . q :
physical_link [ " rssi " ] = lxm . rssi
physical_link [ " snr " ] = lxm . snr
physical_link [ " q " ] = lxm . q
packed_telemetry = self . _db_save_telemetry ( context_dest , lxm . fields [ LXMF . FIELD_TELEMETRY ] , physical_link = physical_link , source_dest = context_dest )
2023-10-25 23:21:06 +02:00
2023-10-29 20:59:27 +01:00
if LXMF . FIELD_TELEMETRY_STREAM in lxm . fields :
2023-11-01 16:34:24 +01:00
max_timebase = self . getpersistent ( f " telemetry. { RNS . hexrep ( context_dest , delimit = False ) } .timebase " ) or 0
2023-10-30 22:26:20 +01:00
if lxm . fields [ LXMF . FIELD_TELEMETRY_STREAM ] != None and len ( lxm . fields [ LXMF . FIELD_TELEMETRY_STREAM ] ) > 0 :
for telemetry_entry in lxm . fields [ LXMF . FIELD_TELEMETRY_STREAM ] :
tsource = telemetry_entry [ 0 ]
2023-10-30 23:24:10 +01:00
ttstamp = telemetry_entry [ 1 ]
2023-10-30 22:26:20 +01:00
tpacked = telemetry_entry [ 2 ]
2023-10-30 23:24:10 +01:00
appearance = telemetry_entry [ 3 ]
2023-11-01 16:34:24 +01:00
max_timebase = max ( max_timebase , ttstamp )
2023-10-30 22:26:20 +01:00
if self . _db_save_telemetry ( tsource , tpacked , via = context_dest ) :
2023-11-01 16:34:24 +01:00
RNS . log ( " Saved telemetry stream entry from " + RNS . prettyhexrep ( tsource ) , RNS . LOG_DEBUG )
2023-10-30 23:24:10 +01:00
if appearance != None :
self . _db_update_appearance ( tsource , ttstamp , appearance , from_bulk_telemetry = True )
2023-11-01 16:34:24 +01:00
RNS . log ( " Updated appearance entry from " + RNS . prettyhexrep ( tsource ) , RNS . LOG_DEBUG )
self . setpersistent ( f " telemetry. { RNS . hexrep ( context_dest , delimit = False ) } .timebase " , max_timebase )
2023-10-30 22:26:20 +01:00
else :
RNS . log ( " Received telemetry stream field with no data: " + str ( lxm . fields [ LXMF . FIELD_TELEMETRY_STREAM ] ) , RNS . LOG_DEBUG )
2023-10-25 23:21:06 +02:00
2023-10-30 02:28:35 +01:00
if own_command or len ( lxm . content ) != 0 or len ( lxm . title ) != 0 :
2023-10-29 20:59:27 +01:00
db = self . __db_connect ( )
dbc = db . cursor ( )
2023-10-26 02:28:41 +02:00
2023-10-29 20:59:27 +01:00
if not lxm . packed :
lxm . pack ( )
2023-10-22 01:12:55 +02:00
2023-10-29 20:59:27 +01:00
if lxm . method == LXMF . LXMessage . PAPER :
packed_lxm = msgpack . packb ( [ lxm . packed , lxm . paper_packed ] )
else :
packed_lxm = lxm . packed
extras = { }
if lxm . rssi or lxm . snr or lxm . q :
extras [ " rssi " ] = lxm . rssi
extras [ " snr " ] = lxm . snr
extras [ " q " ] = lxm . q
if packed_telemetry != None :
extras [ " packed_telemetry " ] = packed_telemetry
extras = msgpack . packb ( extras )
query = " INSERT INTO lxm (lxm_hash, dest, source, title, tx_ts, rx_ts, state, method, t_encrypted, t_encryption, data, extra) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?) "
data = (
lxm . hash ,
lxm . destination_hash ,
lxm . source_hash ,
lxm . title ,
lxm . timestamp ,
time . time ( ) ,
state ,
lxm . method ,
lxm . transport_encrypted ,
lxm . transport_encryption ,
packed_lxm ,
extras
)
2022-04-07 21:03:53 +02:00
2023-10-29 20:59:27 +01:00
dbc . execute ( query , data )
db . commit ( )
2022-04-07 21:03:53 +02:00
2023-10-29 20:59:27 +01:00
self . __event_conversation_changed ( context_dest )
2022-04-07 21:03:53 +02:00
2022-07-06 17:02:29 +02:00
def _db_save_announce ( self , destination_hash , app_data , dest_type = " lxmf.delivery " ) :
2022-11-23 18:57:53 +01:00
db = self . __db_connect ( )
2022-04-07 21:03:53 +02:00
dbc = db . cursor ( )
2022-10-08 23:34:24 +02:00
query = " delete from announce where id is NULL or id not in (select id from announce order by received desc limit " + str ( self . MAX_ANNOUNCES ) + " ) "
dbc . execute ( query )
2022-10-06 16:07:03 +02:00
query = " delete from announce where (source=:source); "
dbc . execute ( query , { " source " : destination_hash } )
2022-10-08 23:34:24 +02:00
now = time . time ( )
hash_material = str ( time ) . encode ( " utf-8 " ) + destination_hash + app_data + dest_type . encode ( " utf-8 " )
announce_hash = RNS . Identity . full_hash ( hash_material )
query = " INSERT INTO announce (id, received, source, data, dest_type) values (?, ?, ?, ?, ?) "
2022-04-07 21:03:53 +02:00
data = (
2022-10-08 23:34:24 +02:00
announce_hash ,
now ,
2022-04-07 21:03:53 +02:00
destination_hash ,
app_data ,
2022-07-06 17:02:29 +02:00
dest_type ,
2022-04-07 21:03:53 +02:00
)
dbc . execute ( query , data )
2022-10-08 23:34:24 +02:00
db . commit ( )
2022-04-07 21:03:53 +02:00
2022-12-22 14:53:24 +01:00
def lxmf_announce ( self , attached_interface = None ) :
2022-10-02 01:14:29 +02:00
if self . is_standalone or self . is_service :
2022-12-22 14:53:24 +01:00
self . lxmf_destination . announce ( attached_interface = attached_interface )
2022-12-20 20:39:30 +01:00
self . last_lxmf_announce = time . time ( )
self . next_auto_announce = time . time ( ) + 60 * ( random . random ( ) * ( SidebandCore . AUTO_ANNOUNCE_RANDOM_MAX - SidebandCore . AUTO_ANNOUNCE_RANDOM_MIN ) )
RNS . log ( " Next auto announce in " + RNS . prettytime ( self . next_auto_announce - time . time ( ) ) , RNS . LOG_DEBUG )
2022-10-02 01:14:29 +02:00
self . setstate ( " wants.announce " , False )
else :
self . setstate ( " wants.announce " , True )
2022-04-07 21:03:53 +02:00
2023-10-20 15:09:48 +02:00
def run_telemetry ( self ) :
if not self . telemetry_running :
self . telemetry_running = True
def telemetry_job ( ) :
while self . telemetry_running :
self . update_telemetry ( )
time . sleep ( SidebandCore . TELEMETRY_INTERVAL )
threading . Thread ( target = telemetry_job , daemon = True ) . start ( )
def stop_telemetry ( self ) :
self . telemetry_running = False
self . telemeter . stop_all ( )
2023-10-26 11:53:42 +02:00
self . update_telemeter_config ( )
2023-10-22 23:13:51 +02:00
self . setstate ( " app.flags.last_telemetry " , time . time ( ) )
2023-10-20 15:09:48 +02:00
2023-10-20 13:00:54 +02:00
def update_telemetry ( self ) :
2023-10-22 13:16:43 +02:00
try :
telemetry = self . get_telemetry ( )
packed_telemetry = self . get_packed_telemetry ( )
telemetry_changed = False
if telemetry != None and packed_telemetry != None :
if self . latest_telemetry == None or len ( telemetry ) != len ( self . latest_telemetry ) :
telemetry_changed = True
for sn in telemetry :
if telemetry_changed :
break
if sn != " time " :
if sn in self . latest_telemetry :
if telemetry [ sn ] != self . latest_telemetry [ sn ] :
telemetry_changed = True
else :
2023-10-20 17:27:15 +02:00
telemetry_changed = True
2023-10-26 11:53:42 +02:00
if self . latest_telemetry != None :
for sn in self . latest_telemetry :
if telemetry_changed :
break
if sn != " time " :
if not sn in telemetry :
telemetry_changed = True
2023-10-22 13:16:43 +02:00
if telemetry_changed :
self . telemetry_changes + = 1
self . latest_telemetry = telemetry
self . latest_packed_telemetry = packed_telemetry
2023-10-22 23:13:51 +02:00
self . setstate ( " app.flags.last_telemetry " , time . time ( ) )
2023-10-26 11:53:42 +02:00
if self . is_client :
try :
self . service_set_latest_telemetry ( self . latest_telemetry , self . latest_packed_telemetry )
except Exception as e :
RNS . log ( " Error while sending latest telemetry to service: " + str ( e ) , RNS . LOG_ERROR )
2023-10-22 13:16:43 +02:00
except Exception as e :
RNS . log ( " Error while updating telemetry: " + str ( e ) , RNS . LOG_ERROR )
2023-10-20 15:09:48 +02:00
def update_telemeter_config ( self ) :
2023-10-20 13:00:54 +02:00
if self . config [ " telemetry_enabled " ] == True :
if self . telemeter == None :
self . telemeter = Telemeter ( )
2023-10-26 11:53:42 +02:00
sensors = [ " location " , " information " , " battery " , " pressure " , " temperature " , " humidity " , " magnetic_field " , " ambient_light " , " gravity " , " angular_velocity " , " acceleration " , " proximity " ]
2023-10-20 13:00:54 +02:00
for sensor in sensors :
if self . config [ " telemetry_s_ " + sensor ] :
self . telemeter . enable ( sensor )
else :
2023-10-26 11:53:42 +02:00
if sensor == " location " :
if " location " in self . telemeter . sensors :
if self . telemeter . sensors [ " location " ] . active :
if self . telemeter . sensors [ " location " ] . synthesized :
if not self . config [ " telemetry_s_fixed_location " ] :
self . telemeter . disable ( sensor )
else :
self . telemeter . disable ( sensor )
else :
self . telemeter . disable ( sensor )
2023-10-24 01:14:59 +02:00
if self . config [ " telemetry_s_fixed_location " ] :
self . telemeter . synthesize ( " location " )
self . telemeter . sensors [ " location " ] . latitude = self . config [ " telemetry_s_fixed_latlon " ] [ 0 ]
self . telemeter . sensors [ " location " ] . longtitude = self . config [ " telemetry_s_fixed_latlon " ] [ 1 ]
self . telemeter . sensors [ " location " ] . altitude = self . config [ " telemetry_s_fixed_altitude " ]
2023-10-26 11:53:42 +02:00
self . telemeter . sensors [ " location " ] . stale_time = 30
2023-10-24 01:14:59 +02:00
2023-10-25 23:21:06 +02:00
if self . config [ " telemetry_s_information " ] :
self . telemeter . synthesize ( " information " )
self . telemeter . sensors [ " information " ] . contents = self . config [ " telemetry_s_information_text " ]
2023-10-20 13:00:54 +02:00
2023-10-26 11:53:42 +02:00
else :
self . telemeter = None
self . latest_telemetry = None
self . latest_packed_telemetry = None
2023-10-20 13:00:54 +02:00
def get_telemetry ( self ) :
2023-10-21 11:59:18 +02:00
if self . config [ " telemetry_enabled " ] == True :
self . update_telemeter_config ( )
2023-10-26 11:53:42 +02:00
if self . telemeter != None :
return self . telemeter . read_all ( )
else :
return { }
2023-10-21 11:59:18 +02:00
else :
return { }
2023-10-20 13:00:54 +02:00
2023-10-20 15:09:48 +02:00
def get_packed_telemetry ( self ) :
2023-10-21 11:59:18 +02:00
if self . config [ " telemetry_enabled " ] == True :
self . update_telemeter_config ( )
2023-10-26 11:53:42 +02:00
if self . telemeter != None :
packed = self . telemeter . packed ( )
return packed
else :
return None
2023-10-21 11:59:18 +02:00
else :
return None
2023-10-20 15:09:48 +02:00
2022-04-07 21:03:53 +02:00
def is_known ( self , dest_hash ) :
try :
source_identity = RNS . Identity . recall ( dest_hash )
if source_identity :
return True
else :
return False
except Exception as e :
return False
def request_key ( self , dest_hash ) :
try :
RNS . Transport . request_path ( dest_hash )
return True
except Exception as e :
RNS . log ( " Error while querying for key: " + str ( e ) , RNS . LOG_ERROR )
return False
2022-10-02 01:14:29 +02:00
def _service_jobs ( self ) :
if self . is_service :
2022-10-12 18:55:08 +02:00
last_usb_discovery = time . time ( )
2023-11-05 12:20:30 +01:00
last_multicast_lock_check = time . time ( )
2022-10-02 01:14:29 +02:00
while True :
2022-10-08 22:47:08 +02:00
time . sleep ( SidebandCore . SERVICE_JOB_INTERVAL )
2022-10-12 18:55:08 +02:00
now = time . time ( )
2022-12-20 12:53:50 +01:00
2023-11-07 00:11:37 +01:00
try :
if hasattr ( self , " interface_local " ) :
if self . interface_local != None :
if self . interface_local . carrier_changed :
RNS . log ( " AutoInterface carrier change detected, retaking wake locks " , RNS . LOG_DEBUG )
self . owner_service . take_locks ( force_multicast = True )
self . interface_local . carrier_changed = False
last_multicast_lock_check = now
if ( self . interface_local != None and len ( self . interface_local . adopted_interfaces ) == 0 ) or ( self . config [ " connect_local " ] and self . interface_local == None ) :
if not self . interface_local_adding :
RNS . log ( " No suitable interfaces on AutoInterface, scheduling re-init " , RNS . LOG_DEBUG )
if self . interface_local in RNS . Transport . interfaces :
RNS . Transport . interfaces . remove ( self . interface_local )
del self . interface_local
self . interface_local = None
self . interface_local_adding = True
def job ( ) :
self . __add_localinterface ( delay = 60 )
threading . Thread ( target = job , daemon = True ) . start ( )
if ( now - last_multicast_lock_check > 120 ) :
RNS . log ( " Checking multicast and wake locks " , RNS . LOG_DEBUG )
self . owner_service . take_locks ( )
last_multicast_lock_check = now
except Exception as e :
import traceback
exception_info = " " . join ( traceback . TracebackException . from_exception ( e ) . format ( ) )
RNS . log ( f " An { str ( type ( e ) ) } occurred while running interface checks: { str ( e ) } " , RNS . LOG_ERROR )
RNS . log ( exception_info , RNS . LOG_ERROR )
2023-11-05 12:20:30 +01:00
2022-12-20 20:39:30 +01:00
announce_wanted = self . getstate ( " wants.announce " )
2022-12-22 14:53:24 +01:00
announce_attached_interface = None
announce_delay = 0
2022-12-22 11:47:05 +01:00
# TODO: The "start_announce" config entry should be
# renamed to "auto_announce", which is its current
# meaning.
2022-12-20 20:39:30 +01:00
if self . config [ " start_announce " ] == True :
needs_if_change_announce = False
2022-12-22 14:53:24 +01:00
if hasattr ( self , " interface_local " ) and self . interface_local != None :
have_peers = len ( self . interface_local . peers ) > 0
2022-12-22 18:21:38 +01:00
2022-12-22 14:53:24 +01:00
if hasattr ( self . interface_local , " had_peers " ) :
if not self . interface_local . had_peers and have_peers :
RNS . log ( " Peers became reachable on the interface " + str ( self . interface_local ) , RNS . LOG_DEBUG )
needs_if_change_announce = True
announce_attached_interface = self . interface_local
announce_delay = 10
if self . interface_local . had_peers and not have_peers :
RNS . log ( " No peers reachable on the interface " + str ( self . interface_local ) , RNS . LOG_DEBUG )
2022-12-20 20:39:30 +01:00
needs_if_change_announce = True
2022-12-22 14:53:24 +01:00
self . interface_local . had_peers = have_peers
for interface in RNS . Transport . interfaces :
if not hasattr ( self , " interface_local " ) or interface != self . interface_local :
if hasattr ( interface , " was_online " ) :
if not interface . was_online and interface . online :
RNS . log ( " The interface " + str ( interface ) + " became available " , RNS . LOG_DEBUG )
needs_if_change_announce = True
if interface . was_online and not interface . online :
RNS . log ( " The interface " + str ( interface ) + " became unavailable " , RNS . LOG_DEBUG )
needs_if_change_announce = True
interface . was_online = interface . online
2022-12-20 20:39:30 +01:00
if needs_if_change_announce and time . time ( ) > self . last_if_change_announce + SidebandCore . IF_CHANGE_ANNOUNCE_MIN_INTERVAL :
announce_wanted = True
self . last_if_change_announce = time . time ( )
if time . time ( ) > self . next_auto_announce :
announce_wanted = True
2022-12-20 12:53:50 +01:00
if hasattr ( self , " interface_rnode " ) and self . interface_rnode != None :
if self . config [ " hw_rnode_bluetooth " ] :
self . interface_rnode . allow_bluetooth = True
else :
self . interface_rnode . allow_bluetooth = False
2022-12-20 20:39:30 +01:00
if announce_wanted :
2022-12-22 14:53:24 +01:00
def gen_announce_job ( delay , attached_interface ) :
def x ( ) :
aif = announce_attached_interface
time . sleep ( delay )
self . lxmf_announce ( attached_interface = aif )
return x
threading . Thread ( target = gen_announce_job ( announce_delay , announce_attached_interface ) , daemon = True ) . start ( )
2022-10-02 01:14:29 +02:00
2022-11-02 22:29:13 +01:00
if self . getstate ( " wants.bt_on " ) :
self . setstate ( " wants.bt_on " , False )
2022-11-23 21:19:31 +01:00
self . owner_app . discover_usb_devices ( )
2022-11-02 22:29:13 +01:00
self . setstate ( " executing.bt_on " , True )
if self . interface_rnode != None :
self . interface_rnode . enable_bluetooth ( )
else :
if hasattr ( self . owner_app , " usb_devices " ) and self . owner_app . usb_devices != None :
if len ( self . owner_app . usb_devices ) > 0 :
target_port = self . owner_app . usb_devices [ 0 ] [ " port " ]
RNS . Interfaces . Android . RNodeInterface . RNodeInterface . bluetooth_control ( port = target_port , enable_bluetooth = True )
2022-11-23 21:19:31 +01:00
else :
RNS . log ( " Could not execute RNode Bluetooth control command, no USB devices available " , RNS . LOG_ERROR )
2022-11-02 22:29:13 +01:00
self . setstate ( " executing.bt_on " , False )
if self . getstate ( " wants.bt_off " ) :
self . setstate ( " wants.bt_off " , False )
2022-11-23 21:19:31 +01:00
self . owner_app . discover_usb_devices ( )
2022-11-02 22:29:13 +01:00
self . setstate ( " executing.bt_off " , True )
if self . interface_rnode != None :
self . interface_rnode . disable_bluetooth ( )
else :
if hasattr ( self . owner_app , " usb_devices " ) and self . owner_app . usb_devices != None :
if len ( self . owner_app . usb_devices ) > 0 :
target_port = self . owner_app . usb_devices [ 0 ] [ " port " ]
RNS . Interfaces . Android . RNodeInterface . RNodeInterface . bluetooth_control ( port = target_port , disable_bluetooth = True )
2022-11-23 21:19:31 +01:00
else :
RNS . log ( " Could not execute RNode Bluetooth control command, no USB devices available " , RNS . LOG_ERROR )
2022-11-02 22:29:13 +01:00
self . setstate ( " executing.bt_off " , False )
if self . getstate ( " wants.bt_pair " ) :
self . setstate ( " wants.bt_pair " , False )
2022-11-23 21:19:31 +01:00
self . owner_app . discover_usb_devices ( )
2022-11-02 22:29:13 +01:00
self . setstate ( " executing.bt_pair " , True )
if self . interface_rnode != None :
self . interface_rnode . bluetooth_pair ( )
else :
if hasattr ( self . owner_app , " usb_devices " ) and self . owner_app . usb_devices != None :
if len ( self . owner_app . usb_devices ) > 0 :
2022-12-15 17:01:34 +01:00
try :
target_port = self . owner_app . usb_devices [ 0 ] [ " port " ]
RNS . Interfaces . Android . RNodeInterface . RNodeInterface . bluetooth_control ( port = target_port , pairing_mode = True )
except Exception as e :
2023-10-26 11:53:42 +02:00
self . setstate ( " hardware_operation.error " , " An error occurred while trying to communicate with the device. Please make sure that Sideband has been granted permissions to access the device. \n \n The reported error was: \n \n [i] " + str ( e ) + " [/i] " )
2022-11-23 21:19:31 +01:00
else :
RNS . log ( " Could not execute RNode Bluetooth control command, no USB devices available " , RNS . LOG_ERROR )
2022-11-02 22:29:13 +01:00
self . setstate ( " executing.bt_pair " , False )
2022-10-12 18:55:08 +02:00
if ( now - last_usb_discovery > 5 ) :
if self . interface_rnode != None and not self . interface_rnode . online :
self . owner_app . discover_usb_devices ( )
last_usb_discovery = time . time ( )
if hasattr ( self . owner_app , " usb_devices " ) and self . owner_app . usb_devices != None :
if len ( self . owner_app . usb_devices ) > 0 :
target_device = self . owner_app . usb_devices [ 0 ]
if self . interface_rnode . port != target_device [ " port " ] :
RNS . log ( " Updating RNode device to " + str ( target_device ) )
self . interface_rnode . port = target_device [ " port " ]
2022-10-15 13:34:04 +02:00
if self . interface_serial != None and not self . interface_serial . online :
self . owner_app . discover_usb_devices ( )
last_usb_discovery = time . time ( )
if hasattr ( self . owner_app , " usb_devices " ) and self . owner_app . usb_devices != None :
if len ( self . owner_app . usb_devices ) > 0 :
target_device = self . owner_app . usb_devices [ 0 ]
if self . interface_serial . port != target_device [ " port " ] :
RNS . log ( " Updating serial device to " + str ( target_device ) )
self . interface_serial . port = target_device [ " port " ]
if self . interface_modem != None and not self . interface_modem . online :
self . owner_app . discover_usb_devices ( )
last_usb_discovery = time . time ( )
if hasattr ( self . owner_app , " usb_devices " ) and self . owner_app . usb_devices != None :
if len ( self . owner_app . usb_devices ) > 0 :
target_device = self . owner_app . usb_devices [ 0 ]
if self . interface_modem . port != target_device [ " port " ] :
RNS . log ( " Updating modem device to " + str ( target_device ) )
self . interface_modem . port = target_device [ " port " ]
2022-10-08 22:47:08 +02:00
def _periodic_jobs ( self ) :
if self . is_service or self . is_standalone :
while True :
time . sleep ( SidebandCore . PERIODIC_JOBS_INTERVAL )
if self . config [ " lxmf_periodic_sync " ] == True :
if self . getpersistent ( " lxmf.lastsync " ) == None :
self . setpersistent ( " lxmf.lastsync " , time . time ( ) )
else :
now = time . time ( )
syncinterval = self . config [ " lxmf_sync_interval " ]
lastsync = self . getpersistent ( " lxmf.lastsync " )
nextsync = lastsync + syncinterval
2023-11-07 00:11:37 +01:00
RNS . log ( " Last LXMF sync was " + RNS . prettytime ( now - lastsync ) + " ago " , RNS . LOG_EXTREME )
RNS . log ( " Next LXMF sync is " + ( " in " + RNS . prettytime ( nextsync - now ) if nextsync - now > 0 else " now " ) , RNS . LOG_EXTREME )
2022-10-08 22:47:08 +02:00
if now > nextsync :
if self . request_lxmf_sync ( ) :
RNS . log ( " Scheduled LXMF sync succeeded " , RNS . LOG_DEBUG )
self . setpersistent ( " lxmf.lastsync " , time . time ( ) )
self . setpersistent ( " lxmf.syncretrying " , False )
else :
if not self . getpersistent ( " lxmf.syncretrying " ) :
RNS . log ( " Scheduled LXMF sync failed, retrying in " + RNS . prettytime ( SidebandCore . PERIODIC_SYNC_RETRY ) , RNS . LOG_DEBUG )
self . setpersistent ( " lxmf.lastsync " , lastsync + SidebandCore . PERIODIC_SYNC_RETRY )
self . setpersistent ( " lxmf.syncretrying " , True )
else :
RNS . log ( " Retry of scheduled LXMF sync failed too, waiting until next scheduled sync to try again " , RNS . LOG_DEBUG )
self . setpersistent ( " lxmf.lastsync " , time . time ( ) )
self . setpersistent ( " lxmf.syncretrying " , False )
2023-10-29 20:59:27 +01:00
if self . config [ " telemetry_enabled " ] :
if self . config [ " telemetry_send_to_collector " ] :
2023-10-30 16:55:55 +01:00
if self . config [ " telemetry_collector " ] != None and self . config [ " telemetry_collector " ] != self . lxmf_destination . hash :
2023-10-29 23:03:51 +01:00
try :
now = time . time ( )
collector_address = self . config [ " telemetry_collector " ]
last_send_timebase = self . getpersistent ( f " telemetry. { RNS . hexrep ( collector_address , delimit = False ) } .last_send_success_timebase " ) or 0
send_interval = self . config [ " telemetry_send_interval " ]
next_send = last_send_timebase + send_interval
scheduled = next_send - now ; blocked = self . telemetry_send_blocked_until - now
next_send_in = max ( scheduled , blocked )
2023-11-07 00:11:37 +01:00
RNS . log ( " Last telemetry send was " + RNS . prettytime ( now - last_send_timebase ) + " ago " , RNS . LOG_EXTREME )
RNS . log ( " Next telemetry send is " + ( " in " + RNS . prettytime ( next_send_in ) if next_send_in > 0 else " now " ) , RNS . LOG_EXTREME )
2023-10-29 23:03:51 +01:00
if now > last_send_timebase + send_interval and now > self . telemetry_send_blocked_until :
RNS . log ( " Initiating telemetry send to collector " , RNS . LOG_DEBUG )
if not self . pending_telemetry_send_try > = self . pending_telemetry_send_maxtries :
self . pending_telemetry_send = True
self . pending_telemetry_send_try + = 1
2023-10-30 16:55:55 +01:00
if self . config [ " telemetry_send_all_to_collector " ] :
2023-10-30 22:26:20 +01:00
last_timebase = ( self . getpersistent ( f " telemetry. { RNS . hexrep ( collector_address , delimit = False ) } .last_send_success_timebase " ) or 0 )
self . create_telemetry_collector_response ( to_addr = collector_address , timebase = last_timebase , is_authorized_telemetry_request = True )
2023-10-30 16:55:55 +01:00
else :
self . send_latest_telemetry ( to_addr = collector_address )
2023-10-29 23:03:51 +01:00
else :
if self . telemetry_send_blocked_until < now :
next_slot = now + send_interval
self . telemetry_send_blocked_until = next_slot
RNS . log ( f " Sending telemetry to collector failed after { self . pending_telemetry_send_try } tries. " , RNS . LOG_WARNING )
RNS . log ( f " Not scheduling further retries until next send slot in { RNS . prettytime ( next_slot - now ) } . " , RNS . LOG_WARNING )
self . pending_telemetry_send_try = 0
except Exception as e :
RNS . log ( " An error occurred while sending scheduled telemetry to collector: " + str ( e ) , RNS . LOG_ERROR )
if self . config [ " telemetry_request_from_collector " ] :
2023-10-30 16:55:55 +01:00
if self . config [ " telemetry_collector " ] != None and self . config [ " telemetry_collector " ] != self . lxmf_destination . hash :
2023-10-29 23:03:51 +01:00
try :
now = time . time ( )
collector_address = self . config [ " telemetry_collector " ]
last_request_timebase = self . getpersistent ( f " telemetry. { RNS . hexrep ( collector_address , delimit = False ) } .last_request_success_timebase " ) or 0
request_interval = self . config [ " telemetry_request_interval " ]
next_request = last_request_timebase + request_interval
2023-11-07 00:11:37 +01:00
RNS . log ( " Last telemetry request was " + RNS . prettytime ( now - last_request_timebase ) + " ago " , RNS . LOG_EXTREME )
RNS . log ( " Next telemetry request is " + ( " in " + RNS . prettytime ( next_request - now ) if next_request - now > 0 else " now " ) , RNS . LOG_EXTREME )
2023-10-29 23:03:51 +01:00
if now > last_request_timebase + request_interval :
RNS . log ( " Initiating telemetry request to collector " , RNS . LOG_DEBUG )
except Exception as e :
RNS . log ( " An error occurred while requesting scheduled telemetry from collector: " + str ( e ) , RNS . LOG_ERROR )
2023-10-29 20:59:27 +01:00
2022-04-07 21:03:53 +02:00
def __start_jobs_deferred ( self ) :
2022-10-02 01:14:29 +02:00
if self . is_service :
self . service_thread = threading . Thread ( target = self . _service_jobs , daemon = True )
self . service_thread . start ( )
2022-10-08 22:47:08 +02:00
2022-12-22 11:47:05 +01:00
if self . is_standalone or self . is_service :
if self . config [ " start_announce " ] :
2023-11-01 17:29:16 +01:00
def da ( ) :
time . sleep ( 8 )
self . lxmf_announce ( )
self . last_if_change_announce = time . time ( )
threading . Thread ( target = da , daemon = True ) . start ( )
2022-12-22 11:47:05 +01:00
2022-10-08 22:47:08 +02:00
self . periodic_thread = threading . Thread ( target = self . _periodic_jobs , daemon = True )
self . periodic_thread . start ( )
2023-10-20 17:27:15 +02:00
if self . is_standalone or self . is_client :
if self . config [ " telemetry_enabled " ] :
2023-10-26 11:53:42 +02:00
self . run_telemetry ( )
2023-10-22 21:44:57 +02:00
def __add_localinterface ( self , delay = None ) :
self . interface_local_adding = True
if delay :
time . sleep ( delay )
try :
RNS . log ( " Adding Auto Interface... " , RNS . LOG_DEBUG )
if self . config [ " connect_local_groupid " ] == " " :
group_id = None
else :
group_id = self . config [ " connect_local_groupid " ]
if self . config [ " connect_local_ifac_netname " ] == " " :
ifac_netname = None
else :
ifac_netname = self . config [ " connect_local_ifac_netname " ]
if self . config [ " connect_local_ifac_passphrase " ] == " " :
ifac_netkey = None
else :
ifac_netkey = self . config [ " connect_local_ifac_passphrase " ]
autointerface = RNS . Interfaces . AutoInterface . AutoInterface (
RNS . Transport ,
name = " AutoInterface " ,
group_id = group_id
)
autointerface . OUT = True
if RNS . Reticulum . transport_enabled ( ) :
if_mode = Interface . Interface . MODE_FULL
if self . config [ " connect_ifmode_local " ] == " gateway " :
if_mode = Interface . Interface . MODE_GATEWAY
elif self . config [ " connect_ifmode_local " ] == " access point " :
if_mode = Interface . Interface . MODE_ACCESS_POINT
elif self . config [ " connect_ifmode_local " ] == " roaming " :
if_mode = Interface . Interface . MODE_ROAMING
elif self . config [ " connect_ifmode_local " ] == " boundary " :
if_mode = Interface . Interface . MODE_BOUNDARY
else :
if_mode = None
self . reticulum . _add_interface ( autointerface , mode = if_mode , ifac_netname = ifac_netname , ifac_netkey = ifac_netkey )
self . interface_local = autointerface
self . interface_local_adding = False
except Exception as e :
RNS . log ( " Error while adding AutoInterface. The contained exception was: " + str ( e ) )
self . interface_local = None
self . interface_local_adding = False
2023-10-26 13:21:49 +02:00
def _reticulum_log_debug ( self , debug = False ) :
self . log_verbose = debug
if self . log_verbose :
2023-11-07 00:11:37 +01:00
selected_level = 6
2023-10-26 13:21:49 +02:00
else :
selected_level = 2
RNS . loglevel = selected_level
if self . is_client :
self . service_rpc_set_debug ( debug )
2022-04-07 21:03:53 +02:00
def __start_jobs_immediate ( self ) :
2022-10-13 21:22:16 +02:00
if self . log_verbose :
2023-11-07 00:11:37 +01:00
selected_level = 6
2022-10-03 18:29:54 +02:00
else :
selected_level = 2
2022-10-12 16:38:59 +02:00
self . setstate ( " init.loadingstate " , " Substantiating Reticulum " )
2022-10-03 18:29:54 +02:00
self . reticulum = RNS . Reticulum ( configdir = self . rns_configdir , loglevel = selected_level )
2022-04-07 21:03:53 +02:00
2023-10-22 20:16:41 +02:00
if self . is_service :
self . __start_rpc_listener ( )
2022-07-06 12:20:41 +02:00
if RNS . vendor . platformutils . get_platform ( ) == " android " :
2022-12-19 02:09:43 +01:00
# TODO: Just log to console for, but add option to export log
# files at some point.
# if self.config["debug"]:
# self.reticulum.logdest = RNS.LOG_FILE
# if not self.reticulum.is_connected_to_shared_instance:
# self.reticulum.logfile = self.log_dir+"sideband_service.log"
# else:
# self.reticulum.logfile = self.log_dir+"sideband_core.log"
2022-12-19 02:06:41 +01:00
2022-07-06 12:19:05 +02:00
if not self . reticulum . is_connected_to_shared_instance :
RNS . log ( " Running as master or standalone instance, adding interfaces " )
2022-10-15 11:42:34 +02:00
self . interface_local = None
self . interface_tcp = None
self . interface_i2p = None
self . interface_rnode = None
self . interface_modem = None
self . interface_serial = None
2022-07-06 12:19:05 +02:00
if self . config [ " connect_local " ] :
2022-10-12 16:38:59 +02:00
self . setstate ( " init.loadingstate " , " Discovering Topography " )
2023-10-22 21:44:57 +02:00
self . __add_localinterface ( )
2022-07-06 12:19:05 +02:00
if self . config [ " connect_tcp " ] :
2022-10-12 16:38:59 +02:00
self . setstate ( " init.loadingstate " , " Connecting TCP Tunnel " )
2022-07-06 12:19:05 +02:00
try :
2022-11-02 22:29:13 +01:00
RNS . log ( " Adding TCP Interface... " , RNS . LOG_DEBUG )
2022-07-06 12:19:05 +02:00
if self . config [ " connect_tcp_host " ] != " " :
tcp_host = self . config [ " connect_tcp_host " ]
tcp_port = int ( self . config [ " connect_tcp_port " ] )
if tcp_port > 0 and tcp_port < = 65536 :
if self . config [ " connect_tcp_ifac_netname " ] == " " :
ifac_netname = None
else :
ifac_netname = self . config [ " connect_tcp_ifac_netname " ]
if self . config [ " connect_tcp_ifac_passphrase " ] == " " :
ifac_netkey = None
else :
ifac_netkey = self . config [ " connect_tcp_ifac_passphrase " ]
tcpinterface = RNS . Interfaces . TCPInterface . TCPClientInterface (
RNS . Transport ,
" TCPClientInterface " ,
tcp_host ,
tcp_port ,
kiss_framing = False ,
i2p_tunneled = False
)
tcpinterface . OUT = True
2022-10-16 00:25:07 +02:00
if RNS . Reticulum . transport_enabled ( ) :
2022-10-18 15:44:36 +02:00
if_mode = Interface . Interface . MODE_FULL
if self . config [ " connect_ifmode_tcp " ] == " gateway " :
if_mode = Interface . Interface . MODE_GATEWAY
elif self . config [ " connect_ifmode_tcp " ] == " access point " :
if_mode = Interface . Interface . MODE_ACCESS_POINT
elif self . config [ " connect_ifmode_tcp " ] == " roaming " :
if_mode = Interface . Interface . MODE_ROAMING
elif self . config [ " connect_ifmode_tcp " ] == " boundary " :
if_mode = Interface . Interface . MODE_BOUNDARY
2022-10-16 00:25:07 +02:00
else :
if_mode = None
self . reticulum . _add_interface ( tcpinterface , mode = if_mode , ifac_netname = ifac_netname , ifac_netkey = ifac_netkey )
2022-07-06 12:19:05 +02:00
self . interface_tcp = tcpinterface
except Exception as e :
RNS . log ( " Error while adding TCP Interface. The contained exception was: " + str ( e ) )
self . interface_tcp = None
if self . config [ " connect_i2p " ] :
2022-10-12 16:38:59 +02:00
self . setstate ( " init.loadingstate " , " Opening I2P Endpoints " )
2022-07-06 12:19:05 +02:00
try :
2022-11-02 22:29:13 +01:00
RNS . log ( " Adding I2P Interface... " , RNS . LOG_DEBUG )
2022-07-06 12:19:05 +02:00
if self . config [ " connect_i2p_b32 " ] . endswith ( " .b32.i2p " ) :
if self . config [ " connect_i2p_ifac_netname " ] == " " :
ifac_netname = None
else :
ifac_netname = self . config [ " connect_i2p_ifac_netname " ]
if self . config [ " connect_i2p_ifac_passphrase " ] == " " :
ifac_netkey = None
else :
ifac_netkey = self . config [ " connect_i2p_ifac_passphrase " ]
2022-07-06 13:07:11 +02:00
i2pinterface = RNS . Interfaces . I2PInterface . I2PInterface (
2022-07-06 12:19:05 +02:00
RNS . Transport ,
" I2PInterface " ,
RNS . Reticulum . storagepath ,
2022-07-06 13:07:11 +02:00
[ self . config [ " connect_i2p_b32 " ] ] ,
2022-07-06 12:19:05 +02:00
connectable = False ,
)
i2pinterface . OUT = True
2022-10-16 00:25:07 +02:00
if RNS . Reticulum . transport_enabled ( ) :
2022-10-18 15:44:36 +02:00
if_mode = Interface . Interface . MODE_FULL
if self . config [ " connect_ifmode_i2p " ] == " gateway " :
if_mode = Interface . Interface . MODE_GATEWAY
elif self . config [ " connect_ifmode_i2p " ] == " access point " :
if_mode = Interface . Interface . MODE_ACCESS_POINT
elif self . config [ " connect_ifmode_i2p " ] == " roaming " :
if_mode = Interface . Interface . MODE_ROAMING
elif self . config [ " connect_ifmode_i2p " ] == " boundary " :
if_mode = Interface . Interface . MODE_BOUNDARY
2022-10-16 00:25:07 +02:00
else :
if_mode = None
self . reticulum . _add_interface ( i2pinterface , mode = if_mode , ifac_netname = ifac_netname , ifac_netkey = ifac_netkey )
2022-07-06 16:08:53 +02:00
for si in RNS . Transport . interfaces :
if type ( si ) == RNS . Interfaces . I2PInterface . I2PInterfacePeer :
self . interface_i2p = si
2022-07-06 12:19:05 +02:00
except Exception as e :
RNS . log ( " Error while adding I2P Interface. The contained exception was: " + str ( e ) )
self . interface_i2p = None
2022-10-12 16:38:59 +02:00
if self . config [ " connect_rnode " ] :
self . setstate ( " init.loadingstate " , " Starting RNode " )
try :
2022-11-02 22:29:13 +01:00
RNS . log ( " Adding RNode Interface... " , RNS . LOG_DEBUG )
2022-10-12 16:38:59 +02:00
target_device = None
if len ( self . owner_app . usb_devices ) > 0 :
# TODO: Add more intelligent selection here
target_device = self . owner_app . usb_devices [ 0 ]
2022-12-20 16:02:25 +01:00
# if target_device or self.config["hw_rnode_bluetooth"]:
if target_device != None :
target_port = target_device [ " port " ]
else :
target_port = None
bt_device_name = None
rnode_allow_bluetooth = False
if self . getpersistent ( " permissions.bluetooth " ) :
if self . config [ " hw_rnode_bluetooth " ] :
RNS . log ( " Allowing RNode bluetooth " , RNS . LOG_DEBUG )
rnode_allow_bluetooth = True
if self . config [ " hw_rnode_bt_device " ] != None :
bt_device_name = self . config [ " hw_rnode_bt_device " ]
2022-11-23 20:42:56 +01:00
2022-11-02 22:29:13 +01:00
else :
2022-12-20 16:02:25 +01:00
RNS . log ( " Disallowing RNode bluetooth since config is disabled " , RNS . LOG_DEBUG )
2022-11-23 20:42:56 +01:00
rnode_allow_bluetooth = False
2022-12-20 16:02:25 +01:00
else :
RNS . log ( " Disallowing RNode bluetooth due to missing permission " , RNS . LOG_DEBUG )
rnode_allow_bluetooth = False
2022-11-02 22:29:13 +01:00
2022-12-20 16:02:25 +01:00
if self . config [ " connect_rnode_ifac_netname " ] == " " :
ifac_netname = None
else :
ifac_netname = self . config [ " connect_rnode_ifac_netname " ]
2022-11-02 22:29:13 +01:00
2022-12-20 16:02:25 +01:00
if self . config [ " connect_rnode_ifac_passphrase " ] == " " :
ifac_netkey = None
else :
ifac_netkey = self . config [ " connect_rnode_ifac_passphrase " ]
2022-11-02 22:29:13 +01:00
2023-09-13 21:14:30 +02:00
if self . config [ " hw_rnode_atl_short " ] == " " :
atl_short = None
else :
atl_short = self . config [ " hw_rnode_atl_short " ]
if self . config [ " hw_rnode_atl_long " ] == " " :
atl_long = None
else :
atl_long = self . config [ " hw_rnode_atl_long " ]
2022-12-20 16:02:25 +01:00
rnodeinterface = RNS . Interfaces . Android . RNodeInterface . RNodeInterface (
RNS . Transport ,
" RNodeInterface " ,
target_port ,
frequency = self . config [ " hw_rnode_frequency " ] ,
bandwidth = self . config [ " hw_rnode_bandwidth " ] ,
txpower = self . config [ " hw_rnode_tx_power " ] ,
sf = self . config [ " hw_rnode_spreading_factor " ] ,
cr = self . config [ " hw_rnode_coding_rate " ] ,
flow_control = None ,
id_interval = self . config [ " hw_rnode_beaconinterval " ] ,
id_callsign = self . config [ " hw_rnode_beacondata " ] ,
allow_bluetooth = rnode_allow_bluetooth ,
target_device_name = bt_device_name ,
2023-09-13 21:14:30 +02:00
st_alock = atl_short ,
lt_alock = atl_long ,
2022-12-20 16:02:25 +01:00
)
2022-10-12 16:38:59 +02:00
2022-12-20 16:02:25 +01:00
rnodeinterface . OUT = True
2022-10-16 00:25:07 +02:00
2022-12-20 16:02:25 +01:00
if RNS . Reticulum . transport_enabled ( ) :
if_mode = Interface . Interface . MODE_FULL
if self . config [ " connect_ifmode_rnode " ] == " gateway " :
if_mode = Interface . Interface . MODE_GATEWAY
elif self . config [ " connect_ifmode_rnode " ] == " access point " :
if_mode = Interface . Interface . MODE_ACCESS_POINT
elif self . config [ " connect_ifmode_rnode " ] == " roaming " :
if_mode = Interface . Interface . MODE_ROAMING
elif self . config [ " connect_ifmode_rnode " ] == " boundary " :
if_mode = Interface . Interface . MODE_BOUNDARY
else :
if_mode = None
self . reticulum . _add_interface ( rnodeinterface , mode = if_mode , ifac_netname = ifac_netname , ifac_netkey = ifac_netkey )
self . interface_rnode = rnodeinterface
2022-10-12 16:38:59 +02:00
2022-12-20 16:02:25 +01:00
if rnodeinterface != None :
if len ( rnodeinterface . hw_errors ) > 0 :
self . setpersistent ( " startup.errors.rnode " , rnodeinterface . hw_errors [ 0 ] )
2022-10-29 16:39:54 +02:00
2023-09-13 21:14:30 +02:00
if self . config [ " hw_rnode_enable_framebuffer " ] == True :
if self . interface_rnode . online :
self . interface_rnode . display_image ( sideband_fb_data )
self . interface_rnode . enable_external_framebuffer ( )
else :
self . interface_rnode . last_imagedata = sideband_fb_data
2022-12-20 16:02:25 +01:00
else :
2023-09-13 21:14:30 +02:00
if self . interface_rnode . online :
self . interface_rnode . disable_external_framebuffer ( )
2022-10-29 16:39:54 +02:00
2022-10-12 16:38:59 +02:00
except Exception as e :
RNS . log ( " Error while adding RNode Interface. The contained exception was: " + str ( e ) )
self . interface_rnode = None
2022-10-15 11:42:34 +02:00
elif self . config [ " connect_serial " ] :
self . setstate ( " init.loadingstate " , " Starting Serial Interface " )
try :
2022-11-02 22:29:13 +01:00
RNS . log ( " Adding Serial Interface... " , RNS . LOG_DEBUG )
2022-10-15 11:42:34 +02:00
target_device = None
if len ( self . owner_app . usb_devices ) > 0 :
# TODO: Add more intelligent selection here
target_device = self . owner_app . usb_devices [ 0 ]
if target_device :
if self . config [ " connect_serial_ifac_netname " ] == " " :
ifac_netname = None
else :
ifac_netname = self . config [ " connect_serial_ifac_netname " ]
if self . config [ " connect_serial_ifac_passphrase " ] == " " :
ifac_netkey = None
else :
ifac_netkey = self . config [ " connect_serial_ifac_passphrase " ]
serialinterface = RNS . Interfaces . Android . SerialInterface . SerialInterface (
2022-10-15 14:55:47 +02:00
RNS . Transport ,
" SerialInterface " ,
target_device [ " port " ] ,
self . config [ " hw_serial_baudrate " ] ,
self . config [ " hw_serial_databits " ] ,
self . config [ " hw_serial_parity " ] ,
self . config [ " hw_serial_stopbits " ] ,
)
2022-10-15 11:42:34 +02:00
serialinterface . OUT = True
2022-10-16 00:25:07 +02:00
if RNS . Reticulum . transport_enabled ( ) :
if_mode = Interface . Interface . MODE_FULL
2022-10-18 15:44:36 +02:00
if self . config [ " connect_ifmode_serial " ] == " gateway " :
if_mode = Interface . Interface . MODE_GATEWAY
elif self . config [ " connect_ifmode_serial " ] == " access point " :
if_mode = Interface . Interface . MODE_ACCESS_POINT
elif self . config [ " connect_ifmode_serial " ] == " roaming " :
if_mode = Interface . Interface . MODE_ROAMING
elif self . config [ " connect_ifmode_serial " ] == " boundary " :
if_mode = Interface . Interface . MODE_BOUNDARY
else :
if_mode = None
2022-10-16 00:25:07 +02:00
self . reticulum . _add_interface ( serialinterface , mode = if_mode , ifac_netname = ifac_netname , ifac_netkey = ifac_netkey )
2022-10-15 11:42:34 +02:00
self . interface_serial = serialinterface
except Exception as e :
RNS . log ( " Error while adding Serial Interface. The contained exception was: " + str ( e ) )
self . interface_serial = None
2022-10-15 14:55:47 +02:00
elif self . config [ " connect_modem " ] :
self . setstate ( " init.loadingstate " , " Starting Radio Modem " )
try :
2022-11-02 22:29:13 +01:00
RNS . log ( " Adding Modem Interface... " , RNS . LOG_DEBUG )
2022-10-15 14:55:47 +02:00
target_device = None
if len ( self . owner_app . usb_devices ) > 0 :
# TODO: Add more intelligent selection here
target_device = self . owner_app . usb_devices [ 0 ]
if target_device :
if self . config [ " connect_modem_ifac_netname " ] == " " :
ifac_netname = None
else :
ifac_netname = self . config [ " connect_modem_ifac_netname " ]
if self . config [ " connect_modem_ifac_passphrase " ] == " " :
ifac_netkey = None
else :
ifac_netkey = self . config [ " connect_modem_ifac_passphrase " ]
modeminterface = RNS . Interfaces . Android . KISSInterface . KISSInterface (
RNS . Transport ,
" ModemInterface " ,
target_device [ " port " ] ,
self . config [ " hw_modem_baudrate " ] ,
self . config [ " hw_modem_databits " ] ,
self . config [ " hw_modem_parity " ] ,
self . config [ " hw_modem_stopbits " ] ,
self . config [ " hw_modem_preamble " ] ,
self . config [ " hw_modem_tail " ] ,
self . config [ " hw_modem_persistence " ] ,
self . config [ " hw_modem_slottime " ] ,
False , # flow control
self . config [ " hw_modem_beaconinterval " ] ,
self . config [ " hw_modem_beacondata " ] ,
)
modeminterface . OUT = True
2022-10-16 00:25:07 +02:00
if RNS . Reticulum . transport_enabled ( ) :
if_mode = Interface . Interface . MODE_FULL
2022-10-18 15:44:36 +02:00
if self . config [ " connect_ifmode_modem " ] == " gateway " :
if_mode = Interface . Interface . MODE_GATEWAY
elif self . config [ " connect_ifmode_modem " ] == " access point " :
if_mode = Interface . Interface . MODE_ACCESS_POINT
elif self . config [ " connect_ifmode_modem " ] == " roaming " :
if_mode = Interface . Interface . MODE_ROAMING
elif self . config [ " connect_ifmode_modem " ] == " boundary " :
if_mode = Interface . Interface . MODE_BOUNDARY
else :
if_mode = None
2022-10-16 00:25:07 +02:00
self . reticulum . _add_interface ( modeminterface , mode = if_mode , ifac_netname = ifac_netname , ifac_netkey = ifac_netkey )
2022-10-15 14:55:47 +02:00
self . interface_modem = modeminterface
except Exception as e :
RNS . log ( " Error while adding Modem Interface. The contained exception was: " + str ( e ) )
self . interface_modem = None
2022-10-02 01:14:29 +02:00
RNS . log ( " Reticulum started, activating LXMF... " )
2022-10-12 16:38:59 +02:00
self . setstate ( " init.loadingstate " , " Activating LXMF Router " )
2022-10-02 01:14:29 +02:00
self . message_router = LXMF . LXMRouter ( identity = self . identity , storagepath = self . lxmf_storage , autopeer = True )
self . message_router . register_delivery_callback ( self . lxmf_delivery )
2022-04-07 21:03:53 +02:00
2022-10-02 01:14:29 +02:00
self . lxmf_destination = self . message_router . register_delivery_identity ( self . identity , display_name = self . config [ " display_name " ] )
self . lxmf_destination . set_default_app_data ( self . get_display_name_bytes )
2022-10-01 11:18:14 +02:00
2022-10-02 01:14:29 +02:00
self . rns_dir = RNS . Reticulum . configdir
2022-04-07 21:03:53 +02:00
2022-10-02 12:45:06 +02:00
self . update_active_lxmf_propagation_node ( )
def update_active_lxmf_propagation_node ( self ) :
2022-07-05 15:22:11 +02:00
if self . config [ " lxmf_propagation_node " ] != None and self . config [ " lxmf_propagation_node " ] != " " :
self . set_active_propagation_node ( self . config [ " lxmf_propagation_node " ] )
else :
if self . config [ " last_lxmf_propagation_node " ] != None and self . config [ " last_lxmf_propagation_node " ] != " " :
self . set_active_propagation_node ( self . config [ " last_lxmf_propagation_node " ] )
else :
self . set_active_propagation_node ( None )
2023-10-30 13:45:58 +01:00
def message_notification_no_display ( self , message ) :
self . message_notification ( message , no_display = True )
def message_notification ( self , message , no_display = False ) :
2022-04-07 21:03:53 +02:00
if message . state == LXMF . LXMessage . FAILED and hasattr ( message , " try_propagation_on_fail " ) and message . try_propagation_on_fail :
RNS . log ( " Direct delivery of " + str ( message ) + " failed. Retrying as propagated message. " , RNS . LOG_VERBOSE )
message . try_propagation_on_fail = None
message . delivery_attempts = 0
del message . next_delivery_attempt
message . packed = None
message . desired_method = LXMF . LXMessage . PROPAGATED
self . _db_message_set_method ( message . hash , LXMF . LXMessage . PROPAGATED )
self . message_router . handle_outbound ( message )
else :
2023-10-30 13:45:58 +01:00
if not no_display :
self . lxm_ingest ( message , originator = True )
2022-04-07 21:03:53 +02:00
2023-10-30 14:09:41 +01:00
if message . fields != None and LXMF . FIELD_TELEMETRY in message . fields :
if len ( message . fields [ LXMF . FIELD_TELEMETRY ] ) > 0 :
try :
telemeter = Telemeter . from_packed ( message . fields [ LXMF . FIELD_TELEMETRY ] )
telemetry_timebase = telemeter . read_all ( ) [ " time " ] [ " utc " ]
RNS . log ( " Setting last successul telemetry timebase for " + RNS . prettyhexrep ( message . destination_hash ) + " to " + str ( telemetry_timebase ) )
self . setpersistent ( f " telemetry. { RNS . hexrep ( message . destination_hash , delimit = False ) } .last_send_success_timebase " , telemetry_timebase )
except Exception as e :
RNS . log ( " Error while setting last successul telemetry timebase for " + RNS . prettyhexrep ( message . destination_hash ) , RNS . LOG_DEBUG )
2023-10-30 22:49:29 +01:00
def get_message_fields ( self , context_dest , telemetry_update = False , is_authorized_telemetry_request = False , signal_already_sent = False ) :
2023-10-30 03:09:57 +01:00
fields = { }
2023-10-30 22:26:20 +01:00
send_telemetry = ( telemetry_update == True ) or ( self . should_send_telemetry ( context_dest ) or is_authorized_telemetry_request )
2023-10-20 23:38:28 +02:00
send_appearance = self . config [ " telemetry_send_appearance " ] or send_telemetry
2023-10-30 14:09:41 +01:00
if send_telemetry and self . latest_packed_telemetry != None :
telemeter = Telemeter . from_packed ( self . latest_packed_telemetry )
telemetry_timebase = telemeter . read_all ( ) [ " time " ] [ " utc " ]
if telemetry_timebase > ( self . getpersistent ( f " telemetry. { RNS . hexrep ( context_dest , delimit = False ) } .last_send_success_timebase " ) or 0 ) :
2023-11-01 16:34:24 +01:00
RNS . log ( " Embedding own telemetry in message since current telemetry is newer than latest successful timebase " , RNS . LOG_DEBUG )
2023-10-30 14:09:41 +01:00
else :
2023-11-01 16:34:24 +01:00
RNS . log ( " Not embedding own telemetry in message since current telemetry is not newer than latest successful timebase " , RNS . LOG_DEBUG )
2023-10-30 14:09:41 +01:00
send_telemetry = False
send_appearance = False
2023-10-30 22:49:29 +01:00
if signal_already_sent :
return False
2023-10-30 14:09:41 +01:00
else :
RNS . log ( " Not embedding telemetry in message since no telemetry is available " , RNS . LOG_DEBUG )
send_telemetry = False
2023-10-20 23:38:28 +02:00
if send_telemetry or send_appearance :
if send_appearance :
def fth ( c ) :
r = c [ 0 ] ; g = c [ 1 ] ; b = c [ 2 ]
r = min ( max ( 0 , r ) , 1 ) ; g = min ( max ( 0 , g ) , 1 ) ; b = min ( max ( 0 , b ) , 1 )
d = 1.0 / 255.0
return struct . pack ( " !BBB " , int ( r / d ) , int ( g / d ) , int ( b / d ) )
icon = self . config [ " telemetry_icon " ]
fg = fth ( self . config [ " telemetry_fg " ] [ : - 1 ] )
bg = fth ( self . config [ " telemetry_bg " ] [ : - 1 ] )
fields [ LXMF . FIELD_ICON_APPEARANCE ] = [ icon , fg , bg ]
if send_telemetry :
fields [ LXMF . FIELD_TELEMETRY ] = self . latest_packed_telemetry
return fields
2022-11-22 14:25:56 +01:00
def paper_message ( self , content , destination_hash ) :
try :
if content == " " :
raise ValueError ( " Message content cannot be empty " )
dest_identity = RNS . Identity . recall ( destination_hash )
dest = RNS . Destination ( dest_identity , RNS . Destination . OUT , RNS . Destination . SINGLE , " lxmf " , " delivery " )
source = self . lxmf_destination
desired_method = LXMF . LXMessage . PAPER
2023-10-20 23:38:28 +02:00
lxm = LXMF . LXMessage ( dest , source , content , title = " " , desired_method = desired_method , fields = self . get_message_fields ( destination_hash ) )
2022-11-22 14:25:56 +01:00
self . lxm_ingest ( lxm , originator = True )
return True
except Exception as e :
RNS . log ( " Error while creating paper message: " + str ( e ) , RNS . LOG_ERROR )
return False
2023-10-30 13:45:58 +01:00
def send_message ( self , content , destination_hash , propagation , skip_fields = False , no_display = False ) :
2022-04-07 21:03:53 +02:00
try :
if content == " " :
raise ValueError ( " Message content cannot be empty " )
dest_identity = RNS . Identity . recall ( destination_hash )
dest = RNS . Destination ( dest_identity , RNS . Destination . OUT , RNS . Destination . SINGLE , " lxmf " , " delivery " )
source = self . lxmf_destination
if propagation :
desired_method = LXMF . LXMessage . PROPAGATED
else :
desired_method = LXMF . LXMessage . DIRECT
2023-10-30 02:28:35 +01:00
if skip_fields :
fields = { }
else :
fields = self . get_message_fields ( destination_hash )
lxm = LXMF . LXMessage ( dest , source , content , title = " " , desired_method = desired_method , fields = fields )
2023-10-30 13:45:58 +01:00
if not no_display :
lxm . register_delivery_callback ( self . message_notification )
lxm . register_failed_callback ( self . message_notification )
else :
lxm . register_delivery_callback ( self . message_notification_no_display )
lxm . register_failed_callback ( self . message_notification_no_display )
2023-10-30 02:28:35 +01:00
if self . message_router . get_outbound_propagation_node ( ) != None :
if self . config [ " lxmf_try_propagation_on_fail " ] :
lxm . try_propagation_on_fail = True
self . message_router . handle_outbound ( lxm )
2023-10-30 13:45:58 +01:00
if not no_display :
self . lxm_ingest ( lxm , originator = True )
2023-10-30 02:28:35 +01:00
return True
except Exception as e :
RNS . log ( " Error while sending message: " + str ( e ) , RNS . LOG_ERROR )
return False
def send_command ( self , content , destination_hash , propagation ) :
try :
if content == " " :
return False
commands = [ ]
if content . startswith ( " echo " ) :
echo_content = content . replace ( " echo " , " " ) . encode ( " utf-8 " )
if len ( echo_content ) > 0 :
commands . append ( { Commands . ECHO : echo_content } )
elif content . startswith ( " sig " ) :
commands . append ( { Commands . SIGNAL_REPORT : True } )
2023-10-30 13:45:58 +01:00
elif content . startswith ( " ping " ) :
commands . append ( { Commands . PING : True } )
2023-10-30 02:28:35 +01:00
if len ( commands ) == 0 :
return False
dest_identity = RNS . Identity . recall ( destination_hash )
dest = RNS . Destination ( dest_identity , RNS . Destination . OUT , RNS . Destination . SINGLE , " lxmf " , " delivery " )
source = self . lxmf_destination
if propagation :
desired_method = LXMF . LXMessage . PROPAGATED
else :
desired_method = LXMF . LXMessage . DIRECT
lxm = LXMF . LXMessage ( dest , source , " " , title = " " , desired_method = desired_method , fields = { LXMF . FIELD_COMMANDS : commands } )
2022-04-07 21:03:53 +02:00
lxm . register_delivery_callback ( self . message_notification )
lxm . register_failed_callback ( self . message_notification )
if self . message_router . get_outbound_propagation_node ( ) != None :
2023-10-26 13:43:28 +02:00
if self . config [ " lxmf_try_propagation_on_fail " ] :
lxm . try_propagation_on_fail = True
2022-04-07 21:03:53 +02:00
self . message_router . handle_outbound ( lxm )
self . lxm_ingest ( lxm , originator = True )
return True
except Exception as e :
RNS . log ( " Error while sending message: " + str ( e ) , RNS . LOG_ERROR )
return False
def new_conversation ( self , dest_str , name = " " , trusted = False ) :
if len ( dest_str ) != RNS . Reticulum . TRUNCATED_HASHLENGTH / / 8 * 2 :
return False
try :
addr_b = bytes . fromhex ( dest_str )
self . _db_create_conversation ( addr_b , name , trusted )
except Exception as e :
RNS . log ( " Error while creating conversation: " + str ( e ) , RNS . LOG_ERROR )
return False
return True
def create_conversation ( self , context_dest , name = None , trusted = False ) :
try :
self . _db_create_conversation ( context_dest , name , trusted )
except Exception as e :
RNS . log ( " Error while creating conversation: " + str ( e ) , RNS . LOG_ERROR )
return False
return True
2022-11-22 14:25:56 +01:00
def lxm_ingest_uri ( self , uri ) :
local_delivery_signal = " local_delivery_occurred "
duplicate_signal = " duplicate_lxm "
ingest_result = self . message_router . ingest_lxm_uri (
uri ,
signal_local_delivery = local_delivery_signal ,
signal_duplicate = duplicate_signal
)
if ingest_result == False :
response = " The URI contained no decodable messages "
elif ingest_result == local_delivery_signal :
response = " Message was decoded, decrypted successfully, and added to your conversation list. "
elif ingest_result == duplicate_signal :
response = " The decoded message has already been processed by the LXMF Router, and will not be ingested again. "
else :
# TODO: Add message to sneakernet queues
response = " The decoded message was not addressed to your LXMF address, and has been discarded. "
self . setstate ( " lxm_uri_ingest.result " , response )
2022-04-07 21:03:53 +02:00
def lxm_ingest ( self , message , originator = False ) :
2022-09-17 17:12:25 +02:00
should_notify = False
is_trusted = False
2023-10-29 20:59:27 +01:00
telemetry_only = False
2023-10-30 02:28:35 +01:00
own_command = False
2023-09-20 21:41:26 +02:00
unread_reason_tx = False
2022-09-17 17:12:25 +02:00
2022-04-07 21:03:53 +02:00
if originator :
context_dest = message . destination_hash
2023-09-20 21:41:26 +02:00
unread_reason_tx = True
2022-04-07 21:03:53 +02:00
else :
context_dest = message . source_hash
2022-09-17 17:12:25 +02:00
is_trusted = self . is_trusted ( context_dest )
2023-10-30 02:28:35 +01:00
if originator and LXMF . FIELD_COMMANDS in message . fields :
own_command = True
2022-04-07 21:03:53 +02:00
if self . _db_message ( message . hash ) :
2022-07-05 15:22:11 +02:00
RNS . log ( " Message exists, setting state to: " + str ( message . state ) , RNS . LOG_DEBUG )
2022-04-07 21:03:53 +02:00
self . _db_message_set_state ( message . hash , message . state )
else :
2022-07-05 15:22:11 +02:00
RNS . log ( " Message does not exist, saving " , RNS . LOG_DEBUG )
2023-10-30 02:28:35 +01:00
self . _db_save_lxm ( message , context_dest , originator , own_command = own_command )
2022-04-07 21:03:53 +02:00
2022-10-02 12:15:37 +02:00
if is_trusted :
should_notify = True
2023-10-29 20:59:27 +01:00
if len ( message . content ) == 0 and len ( message . title ) == 0 :
2023-10-30 02:28:35 +01:00
if ( LXMF . FIELD_TELEMETRY in message . fields or LXMF . FIELD_TELEMETRY_STREAM in message . fields or LXMF . FIELD_COMMANDS in message . fields ) :
2023-10-29 20:59:27 +01:00
RNS . log ( " Squelching notification due to telemetry-only message " , RNS . LOG_DEBUG )
telemetry_only = True
if not telemetry_only :
if self . _db_conversation ( context_dest ) == None :
self . _db_create_conversation ( context_dest )
self . setstate ( " app.flags.new_conversations " , True )
2022-04-07 21:03:53 +02:00
2023-10-29 20:59:27 +01:00
if self . gui_display ( ) == " messages_screen " :
if self . gui_conversation ( ) != context_dest :
self . unread_conversation ( context_dest , tx = unread_reason_tx )
self . setstate ( " app.flags.unread_conversations " , True )
else :
self . txtime_conversation ( context_dest )
self . setstate ( " wants.viewupdate.conversations " , True )
if self . gui_foreground ( ) :
RNS . log ( " Squelching notification since GUI is in foreground " , RNS . LOG_DEBUG )
should_notify = False
else :
2023-09-20 21:41:26 +02:00
self . unread_conversation ( context_dest , tx = unread_reason_tx )
2022-10-02 01:14:29 +02:00
self . setstate ( " app.flags.unread_conversations " , True )
2022-04-07 21:03:53 +02:00
2023-10-29 20:59:27 +01:00
if RNS . vendor . platformutils . is_android ( ) :
if self . gui_display ( ) == " conversations_screen " and self . gui_foreground ( ) :
should_notify = False
2022-10-02 12:15:37 +02:00
2022-10-02 01:14:29 +02:00
if self . is_client :
should_notify = False
2022-04-07 21:03:53 +02:00
2023-10-29 20:59:27 +01:00
if telemetry_only :
should_notify = False
2022-09-17 17:12:25 +02:00
if should_notify :
nlen = 128
text = message . content . decode ( " utf-8 " )
notification_content = text [ : nlen ]
if len ( text ) > nlen :
text + = " ... "
2022-10-02 01:14:29 +02:00
self . notify ( title = self . peer_display_name ( context_dest ) , content = notification_content , group = " LXM " , context_id = RNS . hexrep ( context_dest , delimit = False ) )
2022-09-17 17:12:25 +02:00
2022-04-07 21:03:53 +02:00
def start ( self ) :
self . _db_clean_messages ( )
self . __start_jobs_immediate ( )
thread = threading . Thread ( target = self . __start_jobs_deferred )
thread . setDaemon ( True )
thread . start ( )
2022-10-02 01:14:29 +02:00
2023-11-04 19:42:06 +01:00
self . setstate ( " core.started " , True )
2022-04-07 21:03:53 +02:00
RNS . log ( " Sideband Core " + str ( self ) + " started " )
2023-09-20 20:12:47 +02:00
def stop_webshare ( self ) :
if self . webshare_server != None :
self . webshare_server . shutdown ( )
self . webshare_server = None
def start_webshare ( self ) :
if self . webshare_server == None :
def webshare_job ( ) :
from http import server
import socketserver
import json
webshare_dir = self . webshare_dir
port = 4444
class RequestHandler ( server . SimpleHTTPRequestHandler ) :
def do_GET ( self ) :
serve_root = webshare_dir
if " ? " in self . path :
self . path = self . path . split ( " ? " ) [ 0 ]
path = serve_root + self . path
if self . path == " / " :
path = serve_root + " /index.html "
if " /.. " in self . path :
self . send_response ( 403 )
self . end_headers ( )
self . write ( " Forbidden " . encode ( " utf-8 " ) )
elif self . path == " /pkglist " :
try :
self . send_response ( 200 )
self . send_header ( " Content-type " , " text/json " )
self . end_headers ( )
json_result = json . dumps ( os . listdir ( serve_root + " /pkg " ) )
self . wfile . write ( json_result . encode ( " utf-8 " ) )
except Exception as e :
self . send_response ( 500 )
self . end_headers ( )
RNS . log ( " Error listing directory " + str ( path ) + " : " + str ( e ) , RNS . LOG_ERROR )
es = " Error "
self . wfile . write ( es . encode ( " utf-8 " ) )
else :
try :
with open ( path , ' rb ' ) as f :
data = f . read ( )
self . send_response ( 200 )
2023-09-21 00:05:21 +02:00
if path . lower ( ) . endswith ( " .apk " ) :
self . send_header ( " Content-type " , " application/vnd.android.package-archive " )
2023-09-20 20:12:47 +02:00
self . end_headers ( )
self . wfile . write ( data )
except Exception as e :
self . send_response ( 500 )
self . end_headers ( )
RNS . log ( " Error serving file " + str ( path ) + " : " + str ( e ) , RNS . LOG_ERROR )
es = " Error "
self . wfile . write ( es . encode ( " utf-8 " ) )
with socketserver . TCPServer ( ( " " , port ) , RequestHandler ) as webserver :
self . webshare_server = webserver
webserver . serve_forever ( )
self . webshare_server = None
RNS . log ( " Webshare server closed " , RNS . LOG_DEBUG )
threading . Thread ( target = webshare_job , daemon = True ) . start ( )
2022-04-07 21:03:53 +02:00
def request_lxmf_sync ( self , limit = None ) :
2023-10-27 20:28:33 +02:00
if self . message_router . propagation_transfer_state == LXMF . LXMRouter . PR_IDLE or self . message_router . propagation_transfer_state > = LXMF . LXMRouter . PR_COMPLETE :
2022-04-07 21:03:53 +02:00
self . message_router . request_messages_from_propagation_node ( self . identity , max_messages = limit )
RNS . log ( " LXMF message sync requested from propagation node " + RNS . prettyhexrep ( self . message_router . get_outbound_propagation_node ( ) ) + " for " + str ( self . identity ) )
return True
else :
return False
def cancel_lxmf_sync ( self ) :
if self . message_router . propagation_transfer_state != LXMF . LXMRouter . PR_IDLE :
self . message_router . cancel_propagation_node_requests ( )
def get_sync_progress ( self ) :
2023-10-27 20:28:33 +02:00
state = self . message_router . propagation_transfer_state
if state == LXMF . LXMRouter . PR_PATH_REQUESTED :
state_val = 0.05
elif state == LXMF . LXMRouter . PR_LINK_ESTABLISHING :
state_val = 0.1
elif state == LXMF . LXMRouter . PR_LINK_ESTABLISHED :
state_val = 0.15
elif state > = LXMF . LXMRouter . PR_REQUEST_SENT :
state_val = 0.2
else :
state_val = 0.0
return ( self . message_router . propagation_transfer_progress * 0.8 ) + state_val
2022-04-07 21:03:53 +02:00
def lxmf_delivery ( self , message ) :
time_string = time . strftime ( " % Y- % m- %d % H: % M: % S " , time . localtime ( message . timestamp ) )
signature_string = " Signature is invalid, reason undetermined "
if message . signature_validated :
signature_string = " Validated "
else :
if message . unverified_reason == LXMF . LXMessage . SIGNATURE_INVALID :
signature_string = " Invalid signature "
if message . unverified_reason == LXMF . LXMessage . SOURCE_UNKNOWN :
signature_string = " Cannot verify, source is unknown "
2023-10-22 01:12:55 +02:00
RNS . log ( " LXMF delivery " + str ( time_string ) + " . " + str ( signature_string ) + " . " , RNS . LOG_DEBUG )
2022-04-07 21:03:53 +02:00
try :
2023-10-30 02:28:35 +01:00
context_dest = message . source_hash
2023-09-20 20:26:19 +02:00
if self . config [ " lxmf_ignore_unknown " ] == True :
if self . _db_conversation ( context_dest ) == None :
RNS . log ( " Dropping message from unknown sender " + RNS . prettyhexrep ( context_dest ) , RNS . LOG_DEBUG )
return
2023-10-30 02:28:35 +01:00
if message . signature_validated and LXMF . FIELD_COMMANDS in message . fields :
2023-10-30 22:26:20 +01:00
if self . allow_request_from ( context_dest ) :
2023-10-30 02:28:35 +01:00
commands = message . fields [ LXMF . FIELD_COMMANDS ]
self . handle_commands ( commands , message )
2023-10-30 13:45:58 +01:00
else :
# TODO: Add these event to built-in log/event viewer
# when it is implemented.
RNS . log ( " Unauthorized command received from " + RNS . prettyhexrep ( context_dest ) , RNS . LOG_WARNING )
2023-10-30 02:28:35 +01:00
else :
self . lxm_ingest ( message )
2022-04-07 21:03:53 +02:00
except Exception as e :
2023-10-30 22:26:20 +01:00
RNS . log ( " Error while ingesting LXMF message " + RNS . prettyhexrep ( message . hash ) + " to database: " + str ( e ) , RNS . LOG_ERROR )
2022-04-07 21:03:53 +02:00
2023-10-30 02:28:35 +01:00
def handle_commands ( self , commands , message ) :
try :
context_dest = message . source_hash
2023-10-30 03:09:57 +01:00
RNS . log ( " Handling commands from " + RNS . prettyhexrep ( context_dest ) , RNS . LOG_DEBUG )
2023-10-30 02:28:35 +01:00
for command in commands :
if Commands . TELEMETRY_REQUEST in command :
timebase = int ( command [ Commands . TELEMETRY_REQUEST ] )
RNS . log ( " Handling telemetry request with timebase " + str ( timebase ) , RNS . LOG_DEBUG )
2023-10-30 16:55:55 +01:00
if self . config [ " telemetry_collector_enabled " ] :
RNS . log ( f " Collector requests enabled, returning complete telemetry response for all known objects since { timebase } " , RNS . LOG_DEBUG )
2023-10-30 22:26:20 +01:00
self . create_telemetry_collector_response ( to_addr = context_dest , timebase = timebase , is_authorized_telemetry_request = True )
2023-10-30 16:55:55 +01:00
else :
RNS . log ( " Responding with own latest telemetry " , RNS . LOG_DEBUG )
self . send_latest_telemetry ( to_addr = context_dest )
2023-10-30 02:28:35 +01:00
2023-10-30 13:45:58 +01:00
elif Commands . PING in command :
RNS . log ( " Handling ping request " , RNS . LOG_DEBUG )
self . send_message ( " Ping reply " , context_dest , False , skip_fields = True , no_display = True )
2023-10-30 02:28:35 +01:00
elif Commands . ECHO in command :
msg_content = " Echo reply: " + command [ Commands . ECHO ] . decode ( " utf-8 " )
RNS . log ( " Handling echo request " , RNS . LOG_DEBUG )
2023-10-30 13:45:58 +01:00
self . send_message ( msg_content , context_dest , False , skip_fields = True , no_display = True )
2023-10-30 02:28:35 +01:00
elif Commands . SIGNAL_REPORT in command :
RNS . log ( " Handling signal report " , RNS . LOG_DEBUG )
phy_str = " "
if message . q != None :
phy_str + = f " Link Quality: { message . q } % \n "
if message . rssi != None :
phy_str + = f " RSSI: { message . rssi } dBm \n "
if message . snr != None :
2023-10-31 12:44:32 +01:00
phy_str + = f " SNR: { message . snr } dB \n "
2023-10-30 02:28:35 +01:00
if len ( phy_str ) != 0 :
phy_str = phy_str [ : - 1 ]
else :
phy_str = " No reception info available "
2023-10-30 13:45:58 +01:00
self . send_message ( phy_str , context_dest , False , skip_fields = True , no_display = True )
2023-10-30 02:28:35 +01:00
except Exception as e :
RNS . log ( " Error while handling commands: " + str ( e ) , RNS . LOG_ERROR )
2023-10-30 22:26:20 +01:00
def create_telemetry_collector_response ( self , to_addr , timebase , is_authorized_telemetry_request = False ) :
added_sources = { }
2023-10-30 03:09:57 +01:00
sources = self . list_telemetry ( after = timebase )
only_latest = self . config [ " telemetry_requests_only_send_latest " ]
2023-10-30 22:26:20 +01:00
elements = 0 ; added = 0
2023-10-30 03:09:57 +01:00
telemetry_stream = [ ]
for source in sources :
if source != to_addr :
for entry in sources [ source ] :
2023-10-30 22:26:20 +01:00
elements + = 1
2023-10-30 03:09:57 +01:00
timestamp = entry [ 0 ] ; packed_telemetry = entry [ 1 ]
2023-10-30 23:24:10 +01:00
appearance = self . _db_get_appearance ( source , raw = True )
te = [ source , timestamp , packed_telemetry , appearance ]
2023-10-30 03:09:57 +01:00
if only_latest :
2023-10-30 22:26:20 +01:00
if not source in added_sources :
added_sources [ source ] = True
2023-10-30 03:09:57 +01:00
telemetry_stream . append ( te )
2023-10-30 22:26:20 +01:00
added + = 1
2023-10-30 03:09:57 +01:00
else :
telemetry_stream . append ( te )
2023-10-30 22:26:20 +01:00
added + = 1
2023-10-30 03:09:57 +01:00
2023-11-01 17:29:16 +01:00
if len ( telemetry_stream ) == 0 :
RNS . log ( f " No new telemetry for request with timebase { timebase } " , RNS . LOG_DEBUG )
2023-10-30 22:26:20 +01:00
return self . send_latest_telemetry (
to_addr = to_addr ,
stream = telemetry_stream ,
is_authorized_telemetry_request = is_authorized_telemetry_request
)
2023-10-30 03:09:57 +01:00
2023-10-30 02:28:35 +01:00
2022-04-07 21:03:53 +02:00
def get_display_name_bytes ( self ) :
return self . config [ " display_name " ] . encode ( " utf-8 " )
def get_sync_status ( self ) :
if self . message_router . propagation_transfer_state == LXMF . LXMRouter . PR_IDLE :
return " Idle "
elif self . message_router . propagation_transfer_state == LXMF . LXMRouter . PR_PATH_REQUESTED :
return " Path requested "
elif self . message_router . propagation_transfer_state == LXMF . LXMRouter . PR_LINK_ESTABLISHING :
return " Establishing link "
elif self . message_router . propagation_transfer_state == LXMF . LXMRouter . PR_LINK_ESTABLISHED :
return " Link established "
elif self . message_router . propagation_transfer_state == LXMF . LXMRouter . PR_REQUEST_SENT :
return " Sync request sent "
elif self . message_router . propagation_transfer_state == LXMF . LXMRouter . PR_RECEIVING :
return " Receiving messages "
elif self . message_router . propagation_transfer_state == LXMF . LXMRouter . PR_RESPONSE_RECEIVED :
return " Messages received "
2023-10-27 20:28:33 +02:00
elif self . message_router . propagation_transfer_state == LXMF . LXMRouter . PR_NO_PATH :
return " No path to propagation node "
elif self . message_router . propagation_transfer_state == LXMF . LXMRouter . PR_LINK_FAILED :
return " Link establisment failed "
elif self . message_router . propagation_transfer_state == LXMF . LXMRouter . PR_TRANSFER_FAILED :
return " Sync request failed "
elif self . message_router . propagation_transfer_state == LXMF . LXMRouter . PR_NO_IDENTITY_RCVD :
return " No identity received by remote "
elif self . message_router . propagation_transfer_state == LXMF . LXMRouter . PR_NO_ACCESS :
return " No access to specified node "
elif self . message_router . propagation_transfer_state == LXMF . LXMRouter . PR_FAILED :
return " Sync failed "
2022-04-07 21:03:53 +02:00
elif self . message_router . propagation_transfer_state == LXMF . LXMRouter . PR_COMPLETE :
new_msgs = self . message_router . propagation_transfer_last_result
if new_msgs == 0 :
return " Done, no new messages "
else :
return " Downloaded " + str ( new_msgs ) + " new messages "
else :
return " Unknown "
2022-10-29 16:39:54 +02:00
def cleanup ( self ) :
if RNS . vendor . platformutils . get_platform ( ) == " android " :
if not self . reticulum . is_connected_to_shared_instance :
RNS . Transport . detach_interfaces ( )
2022-04-07 21:03:53 +02:00
rns_config = """
[ reticulum ]
2022-10-15 19:12:39 +02:00
enable_transport = TRANSPORT_IS_ENABLED
2022-04-07 21:03:53 +02:00
share_instance = Yes
shared_instance_port = 37428
instance_control_port = 37429
panic_on_interface_error = No
[ logging ]
2022-07-06 12:20:41 +02:00
loglevel = 3
2022-04-07 21:03:53 +02:00
2022-10-16 00:25:07 +02:00
"""