nodescan_v6_2.py 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590
  1. #! /usr/bin/python
  2. # -*- coding: utf-8 -*-
  3. """
  4. This file is part of grandPA.
  5. grandPA is free software: you can redistribute it and/or modify
  6. it under the terms of the GNU General Public License as published by
  7. the Free Software Foundation, either version 2 of the License, or
  8. (at your option) any later version.
  9. grandPA is distributed in the hope that it will be useful,
  10. but WITHOUT ANY WARRANTY; without even the implied warranty of
  11. MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  12. GNU General Public License for more details.
  13. You should have received a copy of the GNU General Public License
  14. along with grandPA. If not, see <http://www.gnu.org/licenses/>.
  15. (c) 2012 micha.rathfelder@gmail.com
  16. """
  17. print("suche ArtNet Nodes ")
  18. import time
  19. import socket, struct
  20. import sys
  21. import _thread as thread
  22. import copy
  23. import random
  24. sys.stdout.write("\x1b]2;Nodescan\x07")
  25. print(socket.AF_INET)
  26. try:
  27. sock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
  28. sock.bind(('', 6454))
  29. sock.setsockopt(socket.SOL_SOCKET, socket.SO_BROADCAST, 1)
  30. except socket.error as e:
  31. print("Socket 6454 ", "ERR: {0} ".format(e.args))
  32. sys.exit()
  33. try:
  34. sock2 = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
  35. sock2.bind(('', 6455))
  36. sock2.setsockopt(socket.SOL_SOCKET, socket.SO_BROADCAST, 1)
  37. except socket.error as e:
  38. print("Socket2 6454 ", "ERR: {0} ".format(e.args))
  39. sys.exit()
  40. print(socket.AF_INET)
  41. sock_cmd = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
  42. def bind_cmd_node():
  43. global sock_cmd
  44. try:
  45. sock_cmd.bind(('', 7601)) #7601
  46. #sock_cmd.bind(('', 49737))
  47. sock_cmd.setsockopt(socket.SOL_SOCKET, socket.SO_BROADCAST, 1)
  48. except socket_cmd.error as e:
  49. print("Socket 6454 ", "ERR: {0} ".format(e.args))
  50. sys.exit()
  51. if __name__ == "__main__":
  52. bind_cmd_node()
  53. def ArtNet_poll(ip,port=6454):
  54. print("POLL",[ip,port],end="")
  55. #try:
  56. if 1:
  57. sock.sendto(b'Art-Net\x00\x00 \x00\x0e\x06\x00',(ip,port)) # ArtPol / ping
  58. print(" OK ;",end="")
  59. #send_node_cmd(ip=(2,255,255,255),cmd="CMD GT ")
  60. #except Exception as e:
  61. # print("Exception ArtNet-POLL",e,)
  62. print()
  63. def ArtPollReplyDelay():
  64. time.sleep(1)
  65. ArtPollReply()
  66. def ArtPollReply():
  67. print("ArtPollReply()")
  68. port = 6454
  69. content = []
  70. header = []
  71. # Name, 7byte + 0x00
  72. content.append("Art-Net\x00")
  73. # OpCode ArtPollReply -> 0x2100, Low Byte first
  74. content.append(struct.pack('<H', 0x2100))
  75. # Protocol Version 14, High Byte first
  76. content.append(struct.pack('>H', 14))
  77. # IP
  78. #ip = [int(i) for i in self.own_ip.split('.')]
  79. ip = [2, 0, 0, 10]
  80. content += [chr(i) for i in ip]
  81. # Port
  82. content.append(struct.pack('<H', 0x1936))
  83. # Firmware Version
  84. content.append(struct.pack('>H', 200))
  85. # Net and subnet of this node
  86. net = 0
  87. subnet = 0
  88. content.append(chr(net))
  89. content.append(chr(subnet))
  90. # OEM Code (E:Cue 1x DMX Out)
  91. content.append(struct.pack('>H', 0x0360))
  92. # UBEA Version -> Nope -> 0
  93. content.append(chr(0))
  94. # Status1
  95. content.append(struct.pack('>H', 0b11010000))
  96. # Manufacture ESTA Code
  97. content.append('LL')
  98. # Short Name
  99. content.append('LOOP-OpPollReplay\x00')
  100. # Long Name
  101. content.append('LOOP-OpPollReplay_ArtNet_Node' + '_' * 34 + '\x00')
  102. content.append('\x00'*100)
  103. # stitch together
  104. content = ''.join(content)
  105. #print(self.lang['send_ArtPollReply'])
  106. #self.s.sendto(content, ("<broadcast>", self.__port))
  107. print("send" ,[content])
  108. sock.sendto(content, ("<broadcast>", port))
  109. sock.sendto(content, ("2.0.0.255", port))
  110. sock.sendto(content, ("10.10.10.255", port))
  111. sock.sendto(content, ("192.168.2.255", port))
  112. #sock.sendto(content, ("2.0.0.255", port))
  113. #sock.sendto
  114. def testBounce(ip,port):
  115. print(("TESTBOUNCE", (ip, port)))
  116. try:
  117. sock.sendto("TESTBOUNCE " +ip, (ip, port))
  118. except socket.error as e:
  119. print("Socket", "ERR: {0} ".format(e.args))
  120. print(("TESTBOUNCE", (ip, port)))
  121. def reciveBounce(timeout=10):
  122. start = time.time()
  123. while 1:
  124. data = sock.recv(500)
  125. print("bounce",data)
  126. #data, addr = sock.recvfrom(500)
  127. if data:
  128. #print(addr)
  129. print(data)
  130. print()
  131. if time.time() > start+timeout:
  132. print("timeout stopping reciveBounce ")
  133. break
  134. def poll():
  135. port = 6454
  136. #ip = "255.255.255.255"
  137. #ArtNet_poll(ip)
  138. #ip = "<broadcast>"
  139. #ArtNet_poll(ip)
  140. ip = "192.168.0.255"
  141. ArtNet_poll(ip)
  142. ip = "192.168.0.99"
  143. ArtNet_poll(ip)
  144. ip = "2.255.255.255"
  145. ArtNet_poll(ip)
  146. ip = "2.0.0.255"
  147. ArtNet_poll(ip)
  148. ip = "2.255.255.255"
  149. ArtNet_poll(ip)
  150. #ip = "2.0.0.255"
  151. #ArtNet_poll(ip)
  152. #ip = "2.255.255.255"
  153. #ArtNet_poll(ip)
  154. print("")
  155. class ArtNetNodes():
  156. def __init__(self):
  157. print("CONSTRUCKT:",self)
  158. self.__nodes = []
  159. self.__lock = thread.allocate_lock()
  160. self.__tick = 0
  161. #self.__lock.acquire()
  162. #self.__lock.release()
  163. def clear(self):
  164. self.__lock.acquire()
  165. self.__nodes = []
  166. self.__lock.release()
  167. def add(self,add_node):
  168. #print("ArtNetNodes.add()",add_node)
  169. #for i in add_node:
  170. # print(i,[add_node[i]])
  171. #print()
  172. print("add",add_node)
  173. try:
  174. self.__lock.acquire()
  175. update_node = 0
  176. if "MSG" in add_node and "BOOT" in add_node["MSG"].upper():
  177. BOOT = time.time()
  178. print(" BOOOOOOOOT")
  179. else:
  180. BOOT = 0
  181. for node in self.__nodes:
  182. info = node["MAC"],node["IP"].ljust(16," "),[node["SwIn"],node["SwOut"],node["PortTypes"]]
  183. node_match = 1
  184. keys = ["MAC","SwOut","SwIn","PortTypes"]
  185. for i in keys:
  186. if node[i] != add_node[i]:
  187. node_match = 0
  188. break
  189. if node_match: # NODE MAC
  190. update_node = 0
  191. for i in add_node:
  192. UPDATECOUNTER = node["UPDATECOUNTER"]
  193. if node[i] != add_node[i]:
  194. node_match = 0
  195. update_node += 1
  196. node[i] = add_node[i]
  197. UPDATECOUNTER +=1
  198. self.__tick += 1
  199. #break
  200. if update_node:
  201. node["UPDATECOUNTER"] = UPDATECOUNTER
  202. node["UPDATESTAMP"] = time.time()
  203. node["REFRESHSTAMP"] = time.time()
  204. if BOOT:
  205. node["BOOT"] = BOOT
  206. print("UPDATE NODE".ljust(16," "),info)
  207. else:
  208. print("NODE NOT CHANGE".ljust(16," "),info)
  209. node["REFRESHSTAMP"] = time.time()
  210. update_node = 1
  211. print("x-node:",update_node,add_node)
  212. if not update_node: # ADD NEW NODE
  213. node = add_node
  214. print("add_node",node)
  215. node["BOOT"] = BOOT
  216. info = node["MAC"],node["IP"].ljust(16," "),[node["SwIn"],node["SwOut"],node["PortTypes"]]
  217. node["UPDATECOUNTER"] = 1
  218. node["REFRESHSTAMP"] = time.time()
  219. node["UPDATESTAMP"] = time.time()
  220. print("ADD NEW NODE".ljust(16," "),node["UPDATECOUNTER"],info)
  221. self.__tick += 1
  222. self.__nodes += [node]
  223. finally:
  224. #print("release lock")
  225. self.__lock.release()
  226. def tick(self):
  227. self.__lock.acquire()
  228. x = self.__tick
  229. self.__lock.release()
  230. return x
  231. return random.randint(0,1000)
  232. def get(self):
  233. self.__lock.acquire()
  234. out = []
  235. if self.__nodes:
  236. out = copy.deepcopy(self.__nodes)
  237. self.__lock.release()
  238. return out
  239. def recive(self):
  240. print("-- NODE SCAN START ---")
  241. print()
  242. while 1:
  243. data, addr = sock.recvfrom(500)
  244. new_node = ArtNet_decode_pollreplay( data )
  245. print("rvc loop",addr)
  246. if new_node:
  247. print("rcv",new_node)
  248. self.add(new_node)
  249. time.sleep(0.001)
  250. print("-- NODE SCAN STOP ---")
  251. print()
  252. def loop(self):
  253. thread.start_new_thread(self.recive, () )
  254. time.sleep(5)
  255. poll()
  256. Reciver = ArtNetNodes
  257. def ArtNet_decode_pollreplay(data):
  258. debug = 1
  259. node = {}
  260. if len(data) >= 10: #min opcode
  261. opcode = data[8:9+1]
  262. #print([opcode])
  263. #if opcode != struct.pack("<H",0x5000): #OpPollReplay
  264. if opcode == struct.pack("<H",0x2100): #OpPollReplay
  265. if len(data) >= 207: #Mal
  266. print("decode",data[:13])
  267. if debug:print("-----------------------------------------")
  268. if debug:print([opcode] ,"OpPollReplay")
  269. _ip = []
  270. print(data[10])
  271. _ip.append( data[10] )
  272. _ip.append( data[11] )
  273. _ip.append( data[12] )
  274. _ip.append( data[13] )
  275. node["IP"] = str(_ip)
  276. if debug:print([_ip])
  277. _port = struct.unpack("<H",data[14:15+1] )
  278. #Versinfo = struct.unpack("<H",data[16:17+1] )
  279. Versinfo = data[16:17+1]
  280. node["port"] = _port
  281. if debug:print("_port :", [_port ])
  282. node["version"] = Versinfo
  283. if debug:print("Version:",[Versinfo])
  284. NetSwitch = data[18]
  285. node["NetSwitch"] = NetSwitch
  286. if debug:print("NetSwitch:",[NetSwitch])
  287. SubSwitch = data[19]
  288. node["SubSwitch"] = SubSwitch
  289. if debug:print("SubSwitch:",[SubSwitch])
  290. #oem = struct.unpack("<H",data[19:20+1] )
  291. oem = data[20:21+1]
  292. node["oem"] = oem
  293. if debug:print("oem",[oem])
  294. ubea = data[22]
  295. node["ubea"] = ubea
  296. if debug:print("ubea ver.",[ubea])
  297. stat = data[23]
  298. node["status"] = stat
  299. if debug:print("Status1 ",[stat])
  300. esta = data[24:25+1]
  301. def set_ip4(cur_ip=(2,0,0,91),new_ip=(2,0,0,201),new_netmask=(255,0,0,0)):
  302. #send ip
  303. port = 7600
  304. #print(ip)
  305. data = []
  306. #New ip
  307. #_ip = [192, 168, 2, 91]
  308. _ip = [ 2, 0, 0, 181] # CLASS C NET
  309. _ip = [ 2, 0, 0, 101] # CLASS C NET
  310. #_ip = [192, 168, 0, 91]
  311. _ip = new_ip
  312. print("NEW NODE _ip:", _ip)
  313. data.append(struct.pack('<B', _ip[0]))
  314. data.append(struct.pack('<B', _ip[1]))
  315. data.append(struct.pack('<B', _ip[2]))
  316. data.append(struct.pack('<B', _ip[3]))
  317. #_ip = [255, 255, 255, 255] # cange all nodes in Network to the same _ip ! DANGER !
  318. #_ip = [002, 000, 000, 255] # cange all nodes in subnet to the same _ip ! DANGER !
  319. _ip = [ 2, 0, 0, 199] # CLASS A NET
  320. _ip = [192, 168, 0, 91]
  321. #_ip = [ 2, 0, 0, 191] # CLASS C NET
  322. _ip = cur_ip
  323. print("OLD NODE _ip:", _ip)
  324. #OLD _ip , Target Node to change
  325. data.append(struct.pack('<B', _ip[0]))
  326. data.append(struct.pack('<B', _ip[1]))
  327. data.append(struct.pack('<B', _ip[2]))
  328. data.append(struct.pack('<B', _ip[3]))
  329. ip = ".".join(str(x) for x in _ip)
  330. #print("send to ip:", ip)
  331. # NETMASK
  332. MASK = []
  333. netmask = [255, 255, 255 , 0] #fast CLASS C funktioniert
  334. #netmask = [255, 0, 0 , 0] #CLASS C funkioniert nicht
  335. netmask = new_netmask
  336. print("NEW NODE net:",netmask)
  337. MASK.append(struct.pack('<B', netmask[0]))
  338. MASK.append(struct.pack('<B', netmask[1]))
  339. MASK.append(struct.pack('<B', netmask[2]))
  340. MASK.append(struct.pack('<B', netmask[3]))
  341. data += MASK
  342. data += [struct.pack('<B', 255)]*11
  343. print("------------------------------")
  344. data = b'CMD IP '+ b"".join(data)
  345. print("SENDING TO ",(ip,port))
  346. print([data]) #, cur_ip=(2,0,0,91))
  347. #sock.sendto(data ,(ip,port))
  348. sock.sendto(data ,(ip,port))
  349. def send_cmd(ip=(2,0,0,91),cmd=""):
  350. node_nr = 1
  351. port = 7600
  352. print(ip)
  353. data = []
  354. _ip = [ 2, 0, 0, 91] # CLASS C NET
  355. print("NEW NODE _ip:", _ip)
  356. data.append(struct.pack('<B', _ip[0]))
  357. data.append(struct.pack('<B', _ip[1]))
  358. data.append(struct.pack('<B', _ip[2]))
  359. data.append(struct.pack('<B', _ip[3]))
  360. #_ip = [255, 255, 255, 255] # cange all nodes in Network to the same _ip ! DANGER !
  361. #_ip = [002, 000, 000, 255] # cange all nodes in subnet to the same _ip ! DANGER !
  362. _ip = [ 2, 0, 0, 199] # CLASS A NET
  363. _ip = [ 2, 0, 0, 91] # CLASS A NET
  364. #_ip = [192, 168, 0, 91]
  365. _ip = [ 2, 0, 0, 255] # CLASS C NET
  366. #_ip = [ 2, 255, 255, 255] # CLASS C NET
  367. print("OLD NODE _ip:", _ip)
  368. #OLD _ip , Target Node to change
  369. data.append(struct.pack('<B', _ip[0]))
  370. data.append(struct.pack('<B', _ip[1]))
  371. data.append(struct.pack('<B', _ip[2]))
  372. data.append(struct.pack('<B', _ip[3]))
  373. ip = ".".join(str(x) for x in ip)
  374. print("send to ip:", ip)
  375. # NETMASK
  376. MASK = []
  377. netmask = [255, 255, 255 , 0] #fast CLASS C funktioniert
  378. netmask = [255, 0, 0 , 0] #CLASS C funkioniert nicht
  379. print("NEW NODE net:",netmask)
  380. MASK.append(struct.pack('<B', netmask[0]))
  381. MASK.append(struct.pack('<B', netmask[1]))
  382. MASK.append(struct.pack('<B', netmask[2]))
  383. MASK.append(struct.pack('<B', netmask[3]))
  384. data += MASK
  385. data += [struct.pack('<B', 255)]*11
  386. print("------------------------------")
  387. data = 'CMD '+cmd+' '+ "".join(data)
  388. print("SENDING TO ",(ip,port))
  389. print([data] )
  390. #sock.sendto(data ,(ip,port))
  391. sock.sendto(data ,(ip,port))
  392. def pack_ip(_ip):
  393. data = [b"\x00",b"\x00", b"\x00", b"\x00"]
  394. if _ip:
  395. data[0] = struct.pack('<B', int(_ip[0]))
  396. data[1] = struct.pack('<B', int(_ip[1]))
  397. data[2] = struct.pack('<B', int(_ip[2]))
  398. data[3] = struct.pack('<B', int(_ip[3]))
  399. return data
  400. def send_node_cmd(ip="",ip2="",cmd=""):
  401. print()
  402. print()
  403. port = 7600
  404. data = []
  405. print("OLD NODE _ip:", ip)
  406. data = pack_ip(ip)
  407. if ip2:
  408. ip = ".".join(str(x) for x in ip2)
  409. else:
  410. ip = ".".join(str(x) for x in ip)
  411. print("send to ip:", ip)
  412. data2=""
  413. if not cmd:
  414. data2 = 'CMD GT'
  415. data2 = 'CMD ST'
  416. data2 = 'DMX OUT STORE'
  417. data2 = 'CMD DMX=IN '
  418. data2 = 'CMD DMX=OUT '
  419. data2 = 'CMD DMX=PIN '
  420. data2 = bytes(cmd,"ascii")
  421. print([data2],type(data2) )
  422. data2 = data2.ljust(20,b" ") + b"".join(data)
  423. print("SENDING COMMAND TO ",[data2],(ip,port))
  424. sock.sendto(data2 ,(ip,port))
  425. node_cmd_buf_list = []
  426. def node_cmd_recive():
  427. global node_cmd_buf_list
  428. #sock.sendto('\x00\x00\x00\x00\x00',(ip,port)) # ArtPol / ping
  429. while 1:
  430. data, addr = sock_cmd.recvfrom(5000)
  431. #print(len(data))
  432. #print([addr,data])
  433. if len(data) == 207:
  434. print()
  435. else:
  436. print("NODE CMD RESPONSE:", [addr,data])
  437. node_cmd_buf_list = [addr,data]
  438. #print([data])
  439. pass
  440. time.sleep(0.05)
  441. #send_node_cmd(ip="",cmd="CMD DMX=IN")
  442. #send_node_cmd(ip="",cmd="CMD DMX=OUT")
  443. #send_node_cmd(ip=(2,0,0,91),cmd="CMD DMX=PIN")
  444. #send_node_cmd(ip=(2,0,0,91),cmd="DMX OUT STORE")
  445. #send_node_cmd(ip=(2,0,0,255),cmd="DMX OUT STORE")
  446. #send_node_cmd(ip=(2,0,0,201),cmd="DMX OUT STORE")
  447. #send_node_cmd(ip=(2,0,0,255),ip2=(2,255,255,255),cmd="DMX OUT STORE")
  448. #send_node_cmd(ip=(2,0,0,201),ip2=(2,255,255,255),cmd="DMX OUT STORE")
  449. #send_node_cmd(ip=(2,0,0,255),ip2=(2,0,0,201),cmd="DMX OUT STORE")
  450. #send_node_cmd(ip=(2,0,0,201),ip2=(2,0,0,201),cmd="DMX OUT STORE")
  451. send_node_cmd(ip=(2,0,0,201),ip2=(255,255,255,255),cmd="DMX OUT STORE")
  452. send_node_cmd(ip=(255,255,255,255),ip2=(255,255,255,255),cmd="DMX OUT STORE")
  453. #exit()
  454. #
  455. if __name__ == "__main__":
  456. thread.start_new_thread(node_cmd_recive, () )
  457. #send_node_cmd(ip=(2,0,0,91),cmd="DMX OUT STORE")
  458. send_node_cmd(ip=(2,255,255,255),cmd="CMD GT ")
  459. rx = ArtNetNodes()
  460. rx.loop()
  461. z = 0
  462. while 1:
  463. nodes = rx.get()
  464. #print(len(nodes))
  465. if z % 10 == 0:
  466. print()
  467. pass
  468. print("node count",len(nodes))
  469. #for i in nodes:
  470. #print(i)
  471. z += 1
  472. time.sleep(0.2)
  473. print()
  474. print("time out")
  475. raw_input("ENDE")