nodescan_v6_2.py 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574
  1. #! /usr/bin/python
  2. # -*- coding: utf-8 -*-
  3. """
  4. This file is part of grandPA.
  5. grandPA is free software: you can redistribute it and/or modify
  6. it under the terms of the GNU General Public License as published by
  7. the Free Software Foundation, either version 2 of the License, or
  8. (at your option) any later version.
  9. grandPA is distributed in the hope that it will be useful,
  10. but WITHOUT ANY WARRANTY; without even the implied warranty of
  11. MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  12. GNU General Public License for more details.
  13. You should have received a copy of the GNU General Public License
  14. along with grandPA. If not, see <http://www.gnu.org/licenses/>.
  15. (c) 2012 micha.rathfelder@gmail.com
  16. """
  17. print("suche ArtNet Nodes ")
  18. import time
  19. import socket, struct
  20. import sys
  21. import _thread as thread
  22. import copy
  23. import random
  24. sys.stdout.write("\x1b]2;Nodescan\x07")
  25. print(socket.AF_INET)
  26. try:
  27. sock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
  28. sock.bind(('', 6454))
  29. sock.setsockopt(socket.SOL_SOCKET, socket.SO_BROADCAST, 1)
  30. except socket.error as e:
  31. print("Socket 6454 ", "ERR: {0} ".format(e.args))
  32. sys.exit()
  33. try:
  34. sock2 = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
  35. sock2.bind(('', 6455))
  36. sock2.setsockopt(socket.SOL_SOCKET, socket.SO_BROADCAST, 1)
  37. except socket.error as e:
  38. print("Socket2 6454 ", "ERR: {0} ".format(e.args))
  39. sys.exit()
  40. print(socket.AF_INET)
  41. sock_cmd = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
  42. def bind_cmd_node():
  43. global sock_cmd
  44. try:
  45. sock_cmd.bind(('', 7601)) #7601
  46. #sock_cmd.bind(('', 49737))
  47. sock_cmd.setsockopt(socket.SOL_SOCKET, socket.SO_BROADCAST, 1)
  48. except socket_cmd.error as e:
  49. print("Socket 6454 ", "ERR: {0} ".format(e.args))
  50. sys.exit()
  51. if __name__ == "__main__":
  52. bind_cmd_node()
  53. def ArtNet_poll(ip,port=6454):
  54. print("POLL",[ip,port],end="")
  55. #try:
  56. if 1:
  57. sock.sendto(b'Art-Net\x00\x00 \x00\x0e\x06\x00',(ip,port)) # ArtPol / ping
  58. print(" OK ;",end="")
  59. #send_node_cmd(ip=(2,255,255,255),cmd="CMD GT ")
  60. #except Exception as e:
  61. # print("Exception ArtNet-POLL",e,)
  62. print()
  63. def ArtPollReplyDelay():
  64. time.sleep(1)
  65. ArtPollReply()
  66. def ArtPollReply():
  67. print("ArtPollReply()")
  68. port = 6454
  69. content = []
  70. header = []
  71. # Name, 7byte + 0x00
  72. content.append("Art-Net\x00")
  73. # OpCode ArtPollReply -> 0x2100, Low Byte first
  74. content.append(struct.pack('<H', 0x2100))
  75. # Protocol Version 14, High Byte first
  76. content.append(struct.pack('>H', 14))
  77. # IP
  78. #ip = [int(i) for i in self.own_ip.split('.')]
  79. ip = [2, 0, 0, 10]
  80. content += [chr(i) for i in ip]
  81. # Port
  82. content.append(struct.pack('<H', 0x1936))
  83. # Firmware Version
  84. content.append(struct.pack('>H', 200))
  85. # Net and subnet of this node
  86. net = 0
  87. subnet = 0
  88. content.append(chr(net))
  89. content.append(chr(subnet))
  90. # OEM Code (E:Cue 1x DMX Out)
  91. content.append(struct.pack('>H', 0x0360))
  92. # UBEA Version -> Nope -> 0
  93. content.append(chr(0))
  94. # Status1
  95. content.append(struct.pack('>H', 0b11010000))
  96. # Manufacture ESTA Code
  97. content.append('LL')
  98. # Short Name
  99. content.append('LOOP-OpPollReplay\x00')
  100. # Long Name
  101. content.append('LOOP-OpPollReplay_ArtNet_Node' + '_' * 34 + '\x00')
  102. content.append('\x00'*100)
  103. # stitch together
  104. content = ''.join(content)
  105. #print(self.lang['send_ArtPollReply'])
  106. #self.s.sendto(content, ("<broadcast>", self.__port))
  107. print("send" ,[content])
  108. sock.sendto(content, ("<broadcast>", port))
  109. sock.sendto(content, ("2.0.0.255", port))
  110. sock.sendto(content, ("10.10.10.255", port))
  111. sock.sendto(content, ("192.168.2.255", port))
  112. #sock.sendto(content, ("2.0.0.255", port))
  113. #sock.sendto
  114. def testBounce(ip,port):
  115. print(("TESTBOUNCE", (ip, port)))
  116. try:
  117. sock.sendto("TESTBOUNCE " +ip, (ip, port))
  118. except socket.error as e:
  119. print("Socket", "ERR: {0} ".format(e.args))
  120. print(("TESTBOUNCE", (ip, port)))
  121. def reciveBounce(timeout=10):
  122. start = time.time()
  123. while 1:
  124. data = sock.recv(500)
  125. print("bounce",data)
  126. #data, addr = sock.recvfrom(500)
  127. if data:
  128. #print(addr)
  129. print(data)
  130. print()
  131. if time.time() > start+timeout:
  132. print("timeout stopping reciveBounce ")
  133. break
  134. def poll():
  135. port = 6454
  136. #ip = "255.255.255.255"
  137. #ArtNet_poll(ip)
  138. #ip = "<broadcast>"
  139. #ArtNet_poll(ip)
  140. ip = "192.168.0.255"
  141. ArtNet_poll(ip)
  142. ip = "192.168.0.99"
  143. ArtNet_poll(ip)
  144. #ip = "2.0.0.255"
  145. #ArtNet_poll(ip)
  146. #ip = "2.255.255.255"
  147. #ArtNet_poll(ip)
  148. print("")
  149. class ArtNetNodes():
  150. def __init__(self):
  151. print("CONSTRUCKT:",self)
  152. self.__nodes = []
  153. self.__lock = thread.allocate_lock()
  154. self.__tick = 0
  155. #self.__lock.acquire()
  156. #self.__lock.release()
  157. def clear(self):
  158. self.__lock.acquire()
  159. self.__nodes = []
  160. self.__lock.release()
  161. def add(self,add_node):
  162. #print("ArtNetNodes.add()",add_node)
  163. #for i in add_node:
  164. # print(i,[add_node[i]])
  165. #print()
  166. print("add",add_node)
  167. try:
  168. self.__lock.acquire()
  169. update_node = 0
  170. if "MSG" in add_node and "BOOT" in add_node["MSG"].upper():
  171. BOOT = time.time()
  172. print(" BOOOOOOOOT")
  173. else:
  174. BOOT = 0
  175. for node in self.__nodes:
  176. info = node["MAC"],node["IP"].ljust(16," "),[node["SwIn"],node["SwOut"],node["PortTypes"]]
  177. node_match = 1
  178. keys = ["MAC","SwOut","SwIn","PortTypes"]
  179. for i in keys:
  180. if node[i] != add_node[i]:
  181. node_match = 0
  182. break
  183. if node_match: # NODE MAC
  184. update_node = 0
  185. for i in add_node:
  186. UPDATECOUNTER = node["UPDATECOUNTER"]
  187. if node[i] != add_node[i]:
  188. node_match = 0
  189. update_node += 1
  190. node[i] = add_node[i]
  191. UPDATECOUNTER +=1
  192. self.__tick += 1
  193. #break
  194. if update_node:
  195. node["UPDATECOUNTER"] = UPDATECOUNTER
  196. node["UPDATESTAMP"] = time.time()
  197. node["REFRESHSTAMP"] = time.time()
  198. if BOOT:
  199. node["BOOT"] = BOOT
  200. print("UPDATE NODE".ljust(16," "),info)
  201. else:
  202. print("NODE NOT CHANGE".ljust(16," "),info)
  203. node["REFRESHSTAMP"] = time.time()
  204. update_node = 1
  205. print("x-node:",update_node,add_node)
  206. if not update_node: # ADD NEW NODE
  207. node = add_node
  208. print("add_node",node)
  209. node["BOOT"] = BOOT
  210. info = node["MAC"],node["IP"].ljust(16," "),[node["SwIn"],node["SwOut"],node["PortTypes"]]
  211. node["UPDATECOUNTER"] = 1
  212. node["REFRESHSTAMP"] = time.time()
  213. node["UPDATESTAMP"] = time.time()
  214. print("ADD NEW NODE".ljust(16," "),node["UPDATECOUNTER"],info)
  215. self.__tick += 1
  216. self.__nodes += [node]
  217. finally:
  218. #print("release lock")
  219. self.__lock.release()
  220. def tick(self):
  221. self.__lock.acquire()
  222. x = self.__tick
  223. self.__lock.release()
  224. return x
  225. return random.randint(0,1000)
  226. def get(self):
  227. self.__lock.acquire()
  228. out = []
  229. if self.__nodes:
  230. out = copy.deepcopy(self.__nodes)
  231. self.__lock.release()
  232. return out
  233. def recive(self):
  234. print("-- NODE SCAN START ---")
  235. print()
  236. while 1:
  237. data, addr = sock.recvfrom(500)
  238. new_node = ArtNet_decode_pollreplay( data )
  239. print("rvc loop",addr)
  240. if new_node:
  241. print("rcv",new_node)
  242. self.add(new_node)
  243. time.sleep(0.001)
  244. print("-- NODE SCAN STOP ---")
  245. print()
  246. def loop(self):
  247. thread.start_new_thread(self.recive, () )
  248. time.sleep(5)
  249. poll()
  250. Reciver = ArtNetNodes
  251. def ArtNet_decode_pollreplay(data):
  252. debug = 1
  253. node = {}
  254. if len(data) >= 10: #min opcode
  255. opcode = data[8:9+1]
  256. #print([opcode])
  257. #if opcode != struct.pack("<H",0x5000): #OpPollReplay
  258. if opcode == struct.pack("<H",0x2100): #OpPollReplay
  259. if len(data) >= 207: #Mal
  260. print("decode",data[:13])
  261. if debug:print("-----------------------------------------")
  262. if debug:print([opcode] ,"OpPollReplay")
  263. _ip = []
  264. print(data[10])
  265. _ip.append( data[10] )
  266. _ip.append( data[11] )
  267. _ip.append( data[12] )
  268. _ip.append( data[13] )
  269. node["IP"] = str(_ip)
  270. if debug:print([_ip])
  271. _port = struct.unpack("<H",data[14:15+1] )
  272. #Versinfo = struct.unpack("<H",data[16:17+1] )
  273. Versinfo = data[16:17+1]
  274. node["port"] = _port
  275. if debug:print("_port :", [_port ])
  276. node["version"] = Versinfo
  277. if debug:print("Version:",[Versinfo])
  278. NetSwitch = data[18]
  279. node["NetSwitch"] = NetSwitch
  280. if debug:print("NetSwitch:",[NetSwitch])
  281. SubSwitch = data[19]
  282. node["SubSwitch"] = SubSwitch
  283. if debug:print("SubSwitch:",[SubSwitch])
  284. #oem = struct.unpack("<H",data[19:20+1] )
  285. oem = data[20:21+1]
  286. node["oem"] = oem
  287. if debug:print("oem",[oem])
  288. ubea = data[22]
  289. node["ubea"] = ubea
  290. if debug:print("ubea ver.",[ubea])
  291. stat = data[23]
  292. node["status"] = stat
  293. if debug:print("Status1 ",[stat])
  294. esta = data[24:25+1]
  295. def set_ip4(cur_ip=(2,0,0,91),new_ip=(2,0,0,201),new_netmask=(255,0,0,0)):
  296. #send ip
  297. port = 7600
  298. #print(ip)
  299. data = []
  300. #New ip
  301. #_ip = [192, 168, 2, 91]
  302. _ip = [ 2, 0, 0, 181] # CLASS C NET
  303. _ip = [ 2, 0, 0, 101] # CLASS C NET
  304. #_ip = [192, 168, 0, 91]
  305. _ip = new_ip
  306. print("NEW NODE _ip:", _ip)
  307. data.append(struct.pack('<B', _ip[0]))
  308. data.append(struct.pack('<B', _ip[1]))
  309. data.append(struct.pack('<B', _ip[2]))
  310. data.append(struct.pack('<B', _ip[3]))
  311. #_ip = [255, 255, 255, 255] # cange all nodes in Network to the same _ip ! DANGER !
  312. #_ip = [002, 000, 000, 255] # cange all nodes in subnet to the same _ip ! DANGER !
  313. _ip = [ 2, 0, 0, 199] # CLASS A NET
  314. _ip = [192, 168, 0, 91]
  315. #_ip = [ 2, 0, 0, 191] # CLASS C NET
  316. _ip = cur_ip
  317. print("OLD NODE _ip:", _ip)
  318. #OLD _ip , Target Node to change
  319. data.append(struct.pack('<B', _ip[0]))
  320. data.append(struct.pack('<B', _ip[1]))
  321. data.append(struct.pack('<B', _ip[2]))
  322. data.append(struct.pack('<B', _ip[3]))
  323. ip = ".".join(str(x) for x in _ip)
  324. #print("send to ip:", ip)
  325. # NETMASK
  326. MASK = []
  327. netmask = [255, 255, 255 , 0] #fast CLASS C funktioniert
  328. #netmask = [255, 0, 0 , 0] #CLASS C funkioniert nicht
  329. netmask = new_netmask
  330. print("NEW NODE net:",netmask)
  331. MASK.append(struct.pack('<B', netmask[0]))
  332. MASK.append(struct.pack('<B', netmask[1]))
  333. MASK.append(struct.pack('<B', netmask[2]))
  334. MASK.append(struct.pack('<B', netmask[3]))
  335. data += MASK
  336. data += [struct.pack('<B', 255)]*11
  337. print("------------------------------")
  338. data = b'CMD IP '+ b"".join(data)
  339. print("SENDING TO ",(ip,port))
  340. print([data]) #, cur_ip=(2,0,0,91))
  341. #sock.sendto(data ,(ip,port))
  342. sock.sendto(data ,(ip,port))
  343. def send_cmd(ip=(2,0,0,91),cmd=""):
  344. node_nr = 1
  345. port = 7600
  346. print(ip)
  347. data = []
  348. _ip = [ 2, 0, 0, 91] # CLASS C NET
  349. print("NEW NODE _ip:", _ip)
  350. data.append(struct.pack('<B', _ip[0]))
  351. data.append(struct.pack('<B', _ip[1]))
  352. data.append(struct.pack('<B', _ip[2]))
  353. data.append(struct.pack('<B', _ip[3]))
  354. #_ip = [255, 255, 255, 255] # cange all nodes in Network to the same _ip ! DANGER !
  355. #_ip = [002, 000, 000, 255] # cange all nodes in subnet to the same _ip ! DANGER !
  356. _ip = [ 2, 0, 0, 199] # CLASS A NET
  357. _ip = [ 2, 0, 0, 91] # CLASS A NET
  358. #_ip = [192, 168, 0, 91]
  359. _ip = [ 2, 0, 0, 255] # CLASS C NET
  360. _ip = [ 2, 255, 255, 255] # CLASS C NET
  361. print("OLD NODE _ip:", _ip)
  362. #OLD _ip , Target Node to change
  363. data.append(struct.pack('<B', _ip[0]))
  364. data.append(struct.pack('<B', _ip[1]))
  365. data.append(struct.pack('<B', _ip[2]))
  366. data.append(struct.pack('<B', _ip[3]))
  367. ip = ".".join(str(x) for x in ip)
  368. print("send to ip:", ip)
  369. # NETMASK
  370. MASK = []
  371. netmask = [255, 255, 255 , 0] #fast CLASS C funktioniert
  372. netmask = [255, 0, 0 , 0] #CLASS C funkioniert nicht
  373. print("NEW NODE net:",netmask)
  374. MASK.append(struct.pack('<B', netmask[0]))
  375. MASK.append(struct.pack('<B', netmask[1]))
  376. MASK.append(struct.pack('<B', netmask[2]))
  377. MASK.append(struct.pack('<B', netmask[3]))
  378. data += MASK
  379. data += [struct.pack('<B', 255)]*11
  380. print("------------------------------")
  381. data = 'CMD '+cmd+' '+ "".join(data)
  382. print("SENDING TO ",(ip,port))
  383. print([data] )
  384. #sock.sendto(data ,(ip,port))
  385. sock.sendto(data ,(ip,port))
  386. def send_node_cmd(ip="",cmd=""):
  387. node_nr = 1
  388. port = 7600
  389. if not ip:
  390. ip = (2,255,255,255)
  391. data = []
  392. _ip = ip #[2, 0, 0 , 91] #CLASS C funkioniert nicht
  393. print("OLD NODE _ip:", _ip)
  394. #OLD _ip , Target Node to change
  395. data.append(struct.pack('<B', int(_ip[0])))
  396. data.append(struct.pack('<B', int(_ip[1])))
  397. data.append(struct.pack('<B', int(_ip[2])))
  398. data.append(struct.pack('<B', int(_ip[3])))
  399. ip = ""
  400. ip = ".".join(str(x) for x in _ip)
  401. print("send to ip:", ip)
  402. data2=""
  403. if not cmd:
  404. data2 = 'CMD GT'
  405. #data2 = 'CMD ST'
  406. #data2 = 'DMX OUT STORE'
  407. data2 = 'CMD DMX=IN '
  408. #data2 = 'CMD DMX=IN '
  409. data2 = 'CMD DMX=OUT '
  410. data2 = 'CMD DMX=PIN '
  411. else:
  412. pass#data2 = str(cmd)
  413. if type(data2) is str:
  414. data2 = bytes(data2,"ascii")
  415. print([data2],type(data2) )
  416. data2 = data2.ljust(20,b" ") + b"".join(data)
  417. print("SENDING COMMAND TO ",(ip,port))
  418. print([data2],type(data2) )
  419. sock.sendto(data2 ,(ip,port))
  420. #sock.sendto(bytes(data2,"ascii") ,(ip,port))
  421. node_cmd_buf_list = []
  422. def node_cmd_recive():
  423. global node_cmd_buf_list
  424. #sock.sendto('\x00\x00\x00\x00\x00',(ip,port)) # ArtPol / ping
  425. while 1:
  426. data, addr = sock_cmd.recvfrom(5000)
  427. #print(len(data))
  428. #print([addr,data])
  429. if len(data) == 207:
  430. print()
  431. else:
  432. print("NODE CMD RESPONSE:", [addr,data])
  433. node_cmd_buf_list = [addr,data]
  434. #print([data])
  435. pass
  436. time.sleep(0.05)
  437. #send_node_cmd(ip="",cmd="CMD DMX=IN")
  438. #send_node_cmd(ip="",cmd="CMD DMX=OUT")
  439. #send_node_cmd(ip=(2,0,0,91),cmd="CMD DMX=PIN")
  440. #send_node_cmd(ip=(2,0,0,91),cmd="DMX OUT STORE")
  441. #
  442. if __name__ == "__main__":
  443. thread.start_new_thread(node_cmd_recive, () )
  444. #send_node_cmd(ip=(2,0,0,91),cmd="DMX OUT STORE")
  445. send_node_cmd(ip=(2,255,255,255),cmd="CMD GT ")
  446. rx = ArtNetNodes()
  447. rx.loop()
  448. z = 0
  449. while 1:
  450. nodes = rx.get()
  451. #print(len(nodes))
  452. if z % 10 == 0:
  453. print()
  454. pass
  455. print("node count",len(nodes))
  456. #for i in nodes:
  457. #print(i)
  458. z += 1
  459. time.sleep(0.2)
  460. print()
  461. print("time out")
  462. raw_input("ENDE")