meshtastic

- Unnamed repository; edit this file 'description' to name the repository.
git clone git://git.acid.vegas/-c.git
Log | Files | Refs | Archive | README | LICENSE

commit 053c5e9d3262f304be81b9485eeaca7bfe1cfb35
parent d33930ee373a37aba87cc19da3c72a1010cf1e01
Author: acidvegas <acid.vegas@acid.vegas>
Date: Tue, 7 May 2024 16:47:30 -0400

Entire code is in a class now for modular usage

Diffstat:
Mmeshmqtt.py | 369++++++++++++++++++++++++++++++++++++++++++-------------------------------------

1 file changed, 196 insertions(+), 173 deletions(-)

diff --git a/meshmqtt.py b/meshmqtt.py
@@ -6,8 +6,8 @@ import base64
 import logging
 
 try:
-	from cryptography.hazmat.primitives.ciphers import Cipher, algorithms, modes
 	from cryptography.hazmat.backends           import default_backend
+	from cryptography.hazmat.primitives.ciphers import Cipher, algorithms, modes
 except ImportError:
 	raise SystemExit('missing the cryptography module (pip install cryptography)')
 
@@ -26,27 +26,66 @@ except ImportError:
 logging.basicConfig(level=logging.INFO, format='%(asctime)s - %(levelname)s - %(message)s', datefmt='%Y-%m-%d %I:%M:%S')
 
 
-def decode_encrypted(message_packet):
-	'''
-	Decrypt an encrypted message packet.
+class MeshtasticMQTT(object):
+	def __init__(self):
+		'''Initialize the Meshtastic MQTT client'''
+
+		self.broadcast_id = 4294967295
+		self.key = None
+
+
+	def connect(self, broker: str, port: int, root: str, tls: bool, username: str, password: str, key: str):
+		'''
+		Connect to the MQTT broker
+
+		:param broker:   The MQTT broker address
+		:param port:     The MQTT broker port
+		:param root:     The root topic to subscribe to
+		:param tls:      Enable TLS/SSL
+		:param username: The MQTT username
+		:param password: The MQTT password
+		:param key:      The encryption key
+		'''
+
+		client = mqtt.Client(mqtt.CallbackAPIVersion.VERSION2, client_id='', clean_session=True, userdata=None)
+		client.username_pw_set(username=username, password=password)
+
+		self.key = '1PG7OiApB1nwvP+rz05pAQ==' if key == 'AQ==' else key
+
+		if tls:
+			client.tls_set()
+			#client.tls_insecure_set(False)
+
+		client.on_connect     = self.on_connect
+		client.on_message     = self.on_message
+		client.on_subscribe   = self.on_subscribe
+		client.on_unsubscribe = self.on_unsubscribe
+
+		client.connect(broker, port, 60)
+		client.subscribe(root, 0)
+		client.loop_forever()
+
 
-	:param message_packet: The message packet to decrypt
- 	'''
+	def decrypt_message_packet(self, message_packet):
+		'''
+		Decrypt an encrypted message packet.
+		
+		:param message_packet: The message packet to decrypt
+		'''
 
-	try:
 		# Ensure the key is formatted and padded correctly before turning it into bytes
-		padded_key = args.key.ljust(len(args.key) + ((4 - (len(args.key) % 4)) % 4), '=')
-		key = padded_key.replace('-', '+').replace('_', '/')
-		key_bytes = base64.b64decode(key.encode('ascii'))
+		padded_key = self.key.ljust(len(self.key) + ((4 - (len(self.key) % 4)) % 4), '=')
+		key        = padded_key.replace('-', '+').replace('_', '/')
+		key_bytes  = base64.b64decode(key.encode('ascii'))
 
 		# Extract the nonce from the packet
 		nonce_packet_id = getattr(message_packet, 'id').to_bytes(8, 'little')
 		nonce_from_node = getattr(message_packet, 'from').to_bytes(8, 'little')
-		nonce = nonce_packet_id + nonce_from_node
+		nonce           = nonce_packet_id + nonce_from_node
 
 		# Decrypt the message
-		cipher = Cipher(algorithms.AES(key_bytes), modes.CTR(nonce), backend=default_backend())
-		decryptor = cipher.decryptor()
+		cipher          = Cipher(algorithms.AES(key_bytes), modes.CTR(nonce), backend=default_backend())
+		decryptor       = cipher.decryptor()
 		decrypted_bytes = decryptor.update(getattr(message_packet, 'encrypted')) + decryptor.finalize()
 
 		# Parse the decrypted message
@@ -54,140 +93,151 @@ def decode_encrypted(message_packet):
 		data.ParseFromString(decrypted_bytes)
 		message_packet.decoded.CopyFrom(data)
 
-		if message_packet.decoded.portnum == portnums_pb2.TEXT_MESSAGE_APP:
-			text_payload = message_packet.decoded.payload.decode('utf-8')
-			text = {
-				'message' : text_payload,
-				'from'    : getattr(message_packet, 'from'),
-				'id'      : getattr(message_packet, 'id'),
-				'to'      : getattr(message_packet, 'to')
-			}
-			logging.info('Received text message:')
-			logging.info(text)
-
-		elif message_packet.decoded.portnum == portnums_pb2.MAP_REPORT_APP:
-			pos = mesh_pb2.Position()
-			pos.ParseFromString(message_packet.decoded.payload)
-			logging.info('Received map report:')
-			logging.info(pos)
-
-		elif message_packet.decoded.portnum == portnums_pb2.NODEINFO_APP:
-			info = mesh_pb2.User()
-			info.ParseFromString(message_packet.decoded.payload)
-			logging.info('Received node info:')
-			logging.info(info)
-
-		elif message_packet.decoded.portnum == portnums_pb2.POSITION_APP:
-			pos = mesh_pb2.Position()
-			pos.ParseFromString(message_packet.decoded.payload)
-			logging.info('Received position:')
-			logging.info(pos)
-
-		elif message_packet.decoded.portnum == portnums_pb2.TELEMETRY_APP:
-			env = telemetry_pb2.Telemetry()
-			env.ParseFromString(message_packet.decoded.payload)
-			logging.info('Received telemetry:')
-			logging.info(env)
-
-	except Exception as e:
-		logging.error(f'Failed to decrypt message: {str(e)}')
-
-
-def on_connect(client, userdata, flags, rc, properties):
-	'''
-	Callback for when the client receives a CONNACK response from the server.
-
-	:param client: The client instance for this callback
-	:param userdata: The private user data as set in Client() or user_data_set()
-	:param flags: Response flags sent by the broker
-	:param rc: The connection result
-	:param properties: The properties returned by the broker
-	'''
-
-	if rc == 0:
-		logging.info('Connected to MQTT broker')
-	else:
-		logging.error(f'Failed to connect to MQTT broker: {rc}')
-
-
-def on_message(client, userdata, msg):
-	'''
-	Callback for when a message is received from the server.
-
-	:param client: The client instance for this callback
-	:param userdata: The private user data as set in Client() or user_data_set()
-	:param msg: An instance of MQTTMessage. This is a
-	'''
-
-	# Define the service envelope
-	service_envelope = mqtt_pb2.ServiceEnvelope()
-
-	try:
-	 	# Parse the message payload
-		service_envelope.ParseFromString(msg.payload)
-
-		logging.info('Received a packet:')
-		logging.info(service_envelope)
-
-		# Extract the message packet from the service envelope
-		message_packet = service_envelope.packet
-
-	except Exception as e:
-		#logging.error(f'Failed to parse message: {str(e)}')
-		return
-
-	# Check if the message is encrypted before decrypting it
-	if message_packet.HasField('encrypted') and not message_packet.HasField('decoded'):
-		decode_encrypted(message_packet)
-
-	# If the message is not encrypted, log the payload (this should not happen)
-	else:
-		logging.warning('Received an unencrypted message')
-		logging.info(f'Payload: {message_packet}')
-
-
-def on_subscribe(client, userdata, mid, reason_code_list, properties):
-	'''
-	Callback for when the client receives a SUBACK response from the server.
-
-	:param client: The client instance for this callback
-	:param userdata: The private user data as set in Client() or user_data_set()
-	:param mid: The message ID of the subscribe request
-	:param reason_code_list: A list of SUBACK reason codes
-	:param properties: The properties returned by the broker
-	'''
-
-	# Since we subscribed only for a single channel, reason_code_list contains a single entry
-	if reason_code_list[0].is_failure:
-		logging.error(f'Broker rejected you subscription: {reason_code_list[0]}')
-	else:
-		logging.info(f'Broker granted the following QoS: {reason_code_list[0].value}')
-
-
-def on_unsubscribe(client, userdata, mid, reason_code_list, properties):
-	'''
-	Callback for when the client receives a UNSUBACK response from the server.
-
-	:param client: The client instance for this callback
-	:param userdata: The private user data as set in Client() or user_data_set()
-	:param mid: The message ID of the unsubscribe request
-	:param reason_code_list: A list of UNSUBACK reason codes
-	:param properties: The properties returned by the broker
-	'''
-
-	# reason_code_list is only present in MQTTv5, it will always be empty in MQTTv3
-	if len(reason_code_list) == 0 or not reason_code_list[0].is_failure:
-		logging.info('Broker accepted the unsubscription(s)')
-	else:
-		logging.error(f'Broker replied with failure: {reason_code_list[0]}')
-
-	# Disconnect from the broker
-	client.disconnect()
+		return message_packet
+
+
+	def on_connect(self, client, userdata, flags, rc, properties):
+		'''
+		Callback for when the client receives a CONNACK response from the server.
+
+		:param client:     The client instance for this callback
+		:param userdata:   The private user data as set in Client() or user_data_set()
+		:param flags:      Response flags sent by the broker
+		:param rc:         The connection result
+		:param properties: The properties returned by the broker
+		'''
+
+		if rc == 0:
+			logging.info('Connected to MQTT broker')
+		else:
+			logging.error(f'Failed to connect to MQTT broker: {rc}')
+
+
+	def on_message(self, client, userdata, msg):
+		'''
+		Callback for when a message is received from the server.
+
+		:param client:   The client instance for this callback
+		:param userdata: The private user data as set in Client() or user_data_set()
+		:param msg:      An instance of MQTTMessage. This is a
+		'''
+
+		# Define the service envelope
+		service_envelope = mqtt_pb2.ServiceEnvelope()
+
+		try:
+			# Parse the message payload
+			service_envelope.ParseFromString(msg.payload)
+
+#			logging.info('Received a packet:')
+#			logging.info(service_envelope)
+
+			# Extract the message packet from the service envelope
+			message_packet = service_envelope.packet
+
+		except Exception as e:
+			#logging.error(f'Failed to parse message: {str(e)}')
+			return
+
+		# Check if the message is encrypted before decrypting it
+		if message_packet.HasField('encrypted') and not message_packet.HasField('decoded'):
+			message_packet = self.decrypt_message_packet(message_packet)
+
+			if message_packet.decoded.portnum == portnums_pb2.TEXT_MESSAGE_APP:
+				text_payload = message_packet.decoded.payload.decode('utf-8')
+				text = {
+					'message' : text_payload,
+					'from'    : getattr(message_packet, 'from'),
+					'id'      : getattr(message_packet, 'id'),
+					'to'      : getattr(message_packet, 'to')
+				}
+				logging.info('Received text message:')
+				logging.info(text)
+
+			h = [portnums_pb2.REMOTE_HARDWARE_APP, portnums_pb2.ROUTING_APP, 
+
+			elif message_packet.decoded.portnum == portnums_pb2.MAP_REPORT_APP: # comes unencrypted
+				pos = mesh_pb2.Position()
+				pos.ParseFromString(message_packet.decoded.payload)
+				logging.info('Received map report:')
+				logging.info(pos)
+
+			elif message_packet.decoded.portnum == portnums_pb2.NODEINFO_APP:
+				info = mesh_pb2.User()
+				info.ParseFromString(message_packet.decoded.payload)
+				logging.info('Received node info:')
+				logging.info(info)
+
+			elif message_packet.decoded.portnum == portnums_pb2.POSITION_APP:
+				pos = mesh_pb2.Position()
+				pos.ParseFromString(message_packet.decoded.payload)
+				logging.info('Received position:')
+				logging.info(pos)
+
+			elif message_packet.decoded.portnum == portnums_pb2.TELEMETRY_APP:
+				env = telemetry_pb2.Telemetry()
+				env.ParseFromString(message_packet.decoded.payload)
+				logging.info('Received telemetry:')
+				logging.info(env)
+
+			elif message_packet.decoded.portnum == portnums_pb2.TRACEROUTE_APP:
+				routeDiscovery = mesh_pb2.RouteDiscovery()
+				routeDiscovery.ParseFromString(message_packet.decoded.payload)
+				logging.info('Received traceroute:')
+				logging.info(routeDiscovery)
+
+			else:
+				logging.warning('Received an unknown message:')
+				logging.info(message_packet)
+
+		# If the message is not encrypted, log the payload (this should not happen)
+		else:
+			logging.warning('Received an unencrypted message')
+			logging.info(f'Payload: {message_packet}')
+
+
+	def on_subscribe(self, client, userdata, mid, reason_code_list, properties):
+		'''
+		Callback for when the client receives a SUBACK response from the server.
+
+		:param client:           The client instance for this callback
+		:param userdata:         The private user data as set in Client() or user_data_set()
+		:param mid:              The message ID of the subscribe request
+		:param reason_code_list: A list of SUBACK reason codes
+		:param properties:       The properties returned by the broker
+		'''
+
+		# Since we subscribed only for a single channel, reason_code_list contains a single entry
+		if reason_code_list[0].is_failure:
+			logging.error(f'Broker rejected you subscription: {reason_code_list[0]}')
+		else:
+			logging.info(f'Broker granted the following QoS: {reason_code_list[0].value}')
+
+
+	def on_unsubscribe(self, client, userdata, mid, reason_code_list, properties):
+		'''
+		Callback for when the client receives a UNSUBACK response from the server.
+
+		:param client:           The client instance for this callback
+		:param userdata:         The private user data as set in Client() or user_data_set()
+		:param mid:              The message ID of the unsubscribe request
+		:param reason_code_list: A list of UNSUBACK reason codes
+		:param properties:       The properties returned by the broker
+		'''
+
+		# reason_code_list is only present in MQTTv5, it will always be empty in MQTTv3
+		if len(reason_code_list) == 0 or not reason_code_list[0].is_failure:
+			logging.info('Broker accepted the unsubscription(s)')
+		else:
+			logging.error(f'Broker replied with failure: {reason_code_list[0]}')
+
+		# Disconnect from the broker
+		client.disconnect()
 
 
 
 if __name__ == '__main__':
-	parser = argparse.ArgumentParser(description='Mesh MQTT')
+	parser = argparse.ArgumentParser(description='Meshtastic MQTT Interface')
 	parser.add_argument('--broker', default='mqtt.meshtastic.org', help='MQTT broker address')
 	parser.add_argument('--port', default=1883, type=int, help='MQTT broker port')
 	parser.add_argument('--root', default='#', help='Root topic')
@@ -197,33 +247,5 @@ if __name__ == '__main__':
 	parser.add_argument('--key', default='AQ==', help='Encryption key')
 	args = parser.parse_args()
 
-	# Set the broadcast ID (Do we need to change this for a custom channel?)
-	broadcast_id = 4294967295
-
-	# Create the MQTT client
-	client = mqtt.Client(mqtt.CallbackAPIVersion.VERSION2, client_id='', clean_session=True, userdata=None) # Defaults to mqtt.MQTTv311 (change with protocol=mqtt.MQTTv5)
-
-	# Set the authentication details
-	client.username_pw_set(username=args.username, password=args.password)
-
-	# Enable TLS/SSL if the --tls flag is set
-	if args.tls:
-		import ssl
-		client.tls_set()
-		#client.tls_set(cert_reqs=ssl.CERT_REQUIRED, tls_version=ssl.PROTOCOL_TLSv1_2)
-		#client.tls_insecure_set(False)
-
-	# Set the callbacks
-	client.on_connect     = on_connect
-	client.on_message     = on_message
-	client.on_subscribe   = on_subscribe
-	client.on_unsubscribe = on_unsubscribe
-
-	# Connect to the broker
-	client.connect(args.broker, args.port, 60)
-
-	# Subscribe to the root topic
-	client.subscribe(args.root, 0)
-
-	# Start the keep-alive loop
-	client.loop_forever()
+	client = MeshtasticMQTT()
+	client.connect(args.broker, args.port, args.root, args.tls, args.username, args.password, args.key)
+\ No newline at end of file