nodescan2.py 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430
  1. # -*- coding: utf-8 -*-
  2. """
  3. Valid-License-Identifier: GPL-2.0-only
  4. SPDX-URL: https://spdx.org/licenses/GPL-2.0-only.html
  5. (c) 2012 micha@librelight.de
  6. """
  7. import time
  8. import json
  9. import socket, struct
  10. import sys
  11. import os
  12. import _thread as thread
  13. import copy
  14. import random
  15. import traceback
  16. sys.stdout.write("\x1b]2;Nodescan\x07")
  17. def UDP_Socket(bind=False,ip='',port=6454):
  18. sock = False
  19. try:
  20. sock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
  21. sock.setsockopt(socket.SOL_SOCKET, socket.SO_BROADCAST, 1)
  22. if bind:
  23. sock.bind((ip, port))
  24. except socket.error as e:
  25. print("Socket 6454 ", "ERR: {0} ".format(e.args))
  26. sock = False
  27. return sock
  28. def ArtPoll(sock=None,ip="2.255.255.255",port=6454):
  29. print("ArtPoll",ip,port)
  30. if not sock:
  31. sock=UDP_Socket()
  32. #port=6454
  33. #ip="2.255.255.255"
  34. PKG=b'Art-Net\x00\x00 \x00\x0e\x06\x00'
  35. print("SEND:",[PKG])
  36. sock.sendto(PKG,(ip,port)) # ArtPol / ping
  37. sock.close()
  38. def convert_mac(MAC):
  39. #MAC = data[201:201+6]
  40. _MAC = []
  41. for x in MAC:
  42. #x = hex(ord(x))[2:]
  43. x = hex(x)[2:]
  44. x = x.rjust(2,"0")
  45. _MAC.append(x)
  46. _MAC = ":".join(_MAC)
  47. return _MAC
  48. def convert_bin(d):
  49. return bin(d)[2:].rjust(8,"0")
  50. def convert_ip(d):
  51. IP="[0,0,0,0]"
  52. _ip = []
  53. try:
  54. _ip.append( d[0] )
  55. _ip.append( d[1] )
  56. _ip.append( d[2] )
  57. _ip.append( d[3] )
  58. IP = str(_ip)
  59. except:pass
  60. return IP
  61. def convert_to_hex(x,d):
  62. out = b""
  63. try:
  64. a = struct.unpack(x, d)[0]
  65. #out = hex(a)
  66. out = "{0:#0{1}x}".format(a,6)
  67. except:
  68. pass
  69. return out
  70. def ArtNet_decode_pollreplay(data):
  71. debug = 0
  72. node = {}
  73. if len(data) < 10: #min opcode
  74. return node
  75. opcode=convert_to_hex("<h",data[8:10])
  76. if opcode != '0x2100': #OpPollReplay
  77. return node
  78. if len(data) < 207: #Mal
  79. return node
  80. #print(data[174:174+4])
  81. #print("===================================================================-")
  82. #print("decode",data[:13])
  83. # UDP PACKAGE VALUE:INDEX:RAGE
  84. CONF = {}
  85. CONF["IP"] = [10,14+1]
  86. CONF["port"] = [14,15+1]
  87. CONF["version"] = [16,17+1]
  88. CONF["NetSwitch"] = [18]
  89. CONF["SubSwitch"] = [19]
  90. CONF["oem"] = [20,21+1]
  91. CONF["ubea"] = [22]
  92. CONF["status"] = [23]
  93. CONF["esta"] = [24,25+1]
  94. CONF["sname"] = [26,26+17]
  95. CONF["lname"] = [44,44+43]
  96. CONF["NodeReport"] = [108,108+20]
  97. CONF["NumPort"] = [173]
  98. CONF["PortTypes"] = [174,174+4]
  99. CONF["GoodInput"] = [178,178+4]
  100. CONF["GoodOutput"] = [182,182+4]
  101. CONF["SwIn"] = [186,186+4]
  102. CONF["SwOut"] = [190,190+4]
  103. #CONF["MSG"] = [108,108+40]
  104. CONF["MAC"] = [201,201+6]
  105. cleanup = ["sname","lname","MSG","NodeReport"]
  106. for k,v in CONF.items():
  107. val = b'undefined'
  108. if len(v) == 2:
  109. val = data[v[0]:v[1]]
  110. if k in cleanup:
  111. val = val.strip(b"\x00")
  112. val = val.decode(errors="ignore")
  113. if len(v) == 1:
  114. val = data[v[0]]
  115. node[k] = val
  116. # ================================
  117. node["MAC"] = convert_mac(node["MAC"])
  118. node["IP"] = convert_ip(node["IP"])
  119. node["status"] = convert_bin(node["status"])
  120. node["opcode"] = opcode
  121. unpack = {"port":b"<H"}
  122. for k,v in node.items():
  123. if k in unpack:
  124. up = unpack[k]
  125. #print(k,v,up)
  126. node[k] = struct.unpack(up,v)[0]
  127. to_hex = {"version":'>H',"oem":'>H',"esta":"<H"}
  128. for k,u in to_hex.items():
  129. if k in node:
  130. v=node[k]
  131. node[k] = convert_to_hex(u,v)
  132. #for k,v in node.items():
  133. # if type(node[k]) is bytes:
  134. # node[k] = v.decode(errors="ignore")
  135. return node
  136. def test():
  137. UDP_ArtPollReplay = b'Art-Net\x00\x00!\x02\x00\x00T6\x19\x03P\x00\x00\x11\x10\x00\x00RUAADN-01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00AVR-ArtNet DMX NODE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00Node is ready\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x80\x00\x00\x00\x08\x00\x00\x00\x82\x00\x00\x00\x07\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00p\xb3\xd5\xfa\xff\xfa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'
  138. NODE_OLD = {'IP': '[2, 0, 0, 84]', 'port': (6454,), 'version': '\x03P', 'NetSwitch': 0, 'SubSwitch': 0, 'oem': '\x11\x10', 'ubea': 0, 'status': 0, 'esta': 'RU', 'sname': 'AADN-01', 'lname': 'AVR-ArtNet DMX NODE', 'NumPort': 1, 'PortTypes': '\x00\x00\x00', 'GoodInput': '\x08\x00\x00\x00', 'GoodOutput': '\x00\x00\x00', 'SwIn': '\x07\x00\x00\x00', 'SwOut': '\x00\x00\x00\x00', 'MSG': 'Node is ready', 'MAC': '70:b3:d5:fa:ff:fa'}
  139. NODE = {'IP': '[2, 0, 0, 84]', 'port': 6454, 'version': '0x0350', 'NetSwitch': 0, 'SubSwitch': 0, 'oem': '0x1110', 'ubea': 0, 'status': '00000000', 'esta': '0x5552', 'sname': 'AADN-01', 'lname': 'AVR-ArtNet DMX NODE', 'NodeReport': 'Node is ready', 'NumPort': 1, 'PortTypes': b'\x80\x00\x00\x00', 'GoodInput': b'\x08\x00\x00\x00', 'GoodOutput': b'\x82\x00\x00\x00', 'SwIn': b'\x07\x00\x00\x00', 'SwOut': b'\x00\x00\x00\x00', 'MAC': '70:b3:d5:fa:ff:fa', 'opcode': '0x2100'}
  140. node = ArtNet_decode_pollreplay(UDP_ArtPollReplay)
  141. k_miss =[]
  142. if NODE != node:
  143. for k,v in node.items():
  144. if k in NODE:
  145. print(v==NODE[k],"- diff -",k,v, NODE[k])
  146. else:
  147. k_miss.append(k)
  148. print("MISSING KEY:",k_miss)
  149. print(node)
  150. print(NODE)
  151. assert NODE == node
  152. def os_get_MAC(_filter=["vmbr0","br0"]):
  153. print(sys._getframe().f_code.co_name)
  154. cmd = "ip -j -o l l"
  155. r=os.popen(cmd)
  156. out="fa:00:00:00:00:00"
  157. out={}
  158. if not r:
  159. return out
  160. try:
  161. txt = r.read()
  162. data = json.loads(txt)
  163. for i in data:
  164. #print(i)
  165. if "ifname" not in i:
  166. continue
  167. #if i["ifname"] in _filter:
  168. if 1:
  169. dev = "none"
  170. if "ifname" in i:
  171. dev = i["ifname"]
  172. #if "." in dev:
  173. # continue
  174. if dev not in out:
  175. out[dev] = []
  176. if "address" in i:
  177. out[dev].append( i["address"])
  178. except Exception as e:
  179. print(e,e.args[0])
  180. return out
  181. def os_list_routing():
  182. print(sys._getframe().f_code.co_name)
  183. cmd="ip -j -o r l"
  184. r=os.popen(cmd)
  185. out={}
  186. if not r:
  187. return ips
  188. txt=r.read()
  189. jdata = json.loads(txt)
  190. for data in jdata:
  191. #print(data)
  192. dev = "none"
  193. if "dev" in data:
  194. dev = data["dev"]
  195. if dev not in out:
  196. out[dev] = []
  197. if "dst" in data:
  198. out[dev].append(data["dst"])
  199. return out
  200. def os_list_ip():
  201. print(sys._getframe().f_code.co_name)
  202. ips = {}
  203. cmd="ip -o -j -4 a l "
  204. r=os.popen(cmd)
  205. if not r:
  206. return ips
  207. txt=r.read()
  208. jdata = json.loads(txt)
  209. for data in jdata:
  210. #print(data)
  211. if "addr_info" in data:
  212. infos = data["addr_info"]
  213. for info in infos:
  214. dev = "None"
  215. if "dev" in info:
  216. dev = info["dev"]
  217. if "local" in info:
  218. ip = info["local"]
  219. if "prefixlen" in info:
  220. ip += "/"+str(info["prefixlen"])
  221. #if "." in dev:
  222. # continue
  223. if dev not in ips:
  224. ips[dev] = []
  225. ips[dev].append(ip)
  226. #print(" ",[dev,ip])
  227. return ips
  228. def get_mask(IP):
  229. print(sys._getframe().f_code.co_name)
  230. import ipaddress
  231. #mask=ipaddress.IPv4Network(IP+'/8',False)
  232. #print(mask,mask.netmask)
  233. #mask=ipaddress.IPv4Network(IP+'/24',False)
  234. mask=ipaddress.IPv4Network(IP,False)
  235. #print(IP,mask.netmask)
  236. return mask.netmask
  237. def ArtPollReply(sock=None):
  238. print(sys._getframe().f_code.co_name)
  239. if not sock:
  240. sock=UDP_Socket()
  241. port = 6454
  242. content = []
  243. content2=[]
  244. for c in content:
  245. if type(c) is not bytes:
  246. c= bytes(c,"ascii")
  247. content2.append(c)
  248. content = b''.join(content2)
  249. fill = 240-len(content)-1
  250. print()
  251. if fill > 0:
  252. content = content + b"\x00"*fill
  253. def create_ip(IP,content):
  254. #CONF["IP"] = [10,14+1]
  255. x=[]
  256. j=10
  257. for i in IP.split("."):
  258. i = 33
  259. _ip = struct.pack("B",int(i))
  260. # content = content[:10+j]+ _ip + content[10+j:]
  261. content = inject(j,_ip,content)
  262. j+=1
  263. x.append([_ip,i])
  264. print(IP,x)
  265. def patch(content,index,patch):
  266. _patch = patch[:]
  267. if type(_patch) != bytes:
  268. _patch=bytes(_patch,"ascii")
  269. content[index:index+len(_patch)] = _patch
  270. def pad(val,count,fill="\x00"):
  271. return val.ljust(count,fill)[:count]
  272. def ip_to_byte(IP):
  273. out=[]
  274. for i in IP.split("."):
  275. out.append( int(i) )
  276. return bytes(out)
  277. print()
  278. #IP="2.0.0.255"
  279. #create_ip(IP,content)
  280. #sock.sendto(content, (IP, port))
  281. # =======================================
  282. content = [0]*(282-42) # new empty PKG bytes([0,0,0,..])
  283. patch(content,0, b"Art-Net\x00")
  284. patch(content,8, b"\x00\x21") # revers 0x2100 protocol
  285. hostname=os.popen("hostname").read().strip()
  286. #hostname+="0123456789012345678901234567890123456789012345678901234567890"
  287. sname=pad(hostname,18) # Short Name, len == 30
  288. patch(content,26,sname)
  289. lname=pad("LibreLight "+hostname,64) # Long Name, len == 64
  290. patch(content,26+18,lname)
  291. Report="LibreLight is ready CPU:40%"
  292. #Report+="12345678901234567890123456789012345123456789012345678901234567890"
  293. Report=pad(Report,64)
  294. patch(content,26+28+54,Report)
  295. ips=os_list_ip()
  296. mac= os_get_MAC()
  297. if "vmbr0" in mac:
  298. mac = mac["vmbr0"][0]
  299. print()
  300. print([mac])
  301. print()
  302. mac=mac.replace(":","")
  303. print([mac])
  304. if len(mac) == 12:
  305. mac=bytes.fromhex(mac)
  306. #content[201:] = mac
  307. patch(content,201,mac)
  308. #print([mac])
  309. print("send" ,[content])
  310. for IP in ["192.168.2.255","2.0.0.255","10.10.10.255"]:
  311. content2 = content[:]
  312. _IP = ip_to_byte(IP)
  313. patch(content2,10,_IP)
  314. content2 = bytes(content2)
  315. sock.sendto(content2, (IP, port))
  316. print("send" ,[content])
  317. def main():
  318. print("start main()")
  319. sock = UDP_Socket(bind=True,ip='',port=6454)
  320. print("-- loop --")
  321. while sock:
  322. data, addr = sock.recvfrom(300)
  323. opcode=""
  324. if len(data) >= 10:
  325. opcode=convert_to_hex("<h",data[8:10])
  326. if opcode != '0x2100': #OpPollReplay
  327. continue
  328. print("-",addr,len(data),opcode)
  329. print()
  330. nodes = ArtNet_decode_pollreplay(data)
  331. for k,v in nodes.items():
  332. print("-",[k,v])
  333. print("end main()")
  334. def print_help():
  335. print("help -h --help ")
  336. print(" --main")
  337. print(" --ArtPoll")
  338. print(" --ArtPollReplay")
  339. if __name__ == "__main__":
  340. test()
  341. if "-h" in sys.argv or "--help" in sys.argv:
  342. print_help()
  343. elif "--ArtPoll" in sys.argv:
  344. ArtPoll()
  345. elif "--ArtPollReplay" in sys.argv:
  346. ArtPollReply()
  347. elif "-MAC" in sys.argv:
  348. mac= os_get_MAC()
  349. for k,v in mac.items():
  350. print("-",k,v)
  351. print()
  352. for k,v in os_list_ip().items():
  353. print("-",k,v)
  354. print()
  355. for k,v in os_list_routing().items():
  356. print("-",k,v)
  357. print()
  358. print( get_mask("192.168.2.2/24"))
  359. print( get_mask("192.168.2.2/25"))
  360. print( get_mask("192.168.2.2/8"))
  361. elif "--main" in sys.argv:
  362. main()
  363. else:
  364. print_help()