1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351 |
- #! python
- #
- # This module implements a RFC2217 compatible client. RF2217 descibes a
- # protocol to access serial ports over TCP/IP and allows setting the baud rate,
- # modem control lines etc.
- #
- # This file is part of pySerial. https://github.com/pyserial/pyserial
- # (C) 2001-2015 Chris Liechti <cliechti@gmx.net>
- #
- # SPDX-License-Identifier: BSD-3-Clause
- # TODO:
- # - setting control line -> answer is not checked (had problems with one of the
- # severs). consider implementing a compatibility mode flag to make check
- # conditional
- # - write timeout not implemented at all
- # ###########################################################################
- # observations and issues with servers
- # ===========================================================================
- # sredird V2.2.1
- # - http://www.ibiblio.org/pub/Linux/system/serial/ sredird-2.2.2.tar.gz
- # - does not acknowledge SET_CONTROL (RTS/DTR) correctly, always responding
- # [105 1] instead of the actual value.
- # - SET_BAUDRATE answer contains 4 extra null bytes -> probably for larger
- # numbers than 2**32?
- # - To get the signature [COM_PORT_OPTION 0] has to be sent.
- # - run a server: while true; do nc -l -p 7000 -c "sredird debug /dev/ttyUSB0 /var/lock/sredir"; done
- # ===========================================================================
- # telnetcpcd (untested)
- # - http://ftp.wayne.edu/kermit/sredird/telnetcpcd-1.09.tar.gz
- # - To get the signature [COM_PORT_OPTION] w/o data has to be sent.
- # ===========================================================================
- # ser2net
- # - does not negotiate BINARY or COM_PORT_OPTION for his side but at least
- # acknowledges that the client activates these options
- # - The configuration may be that the server prints a banner. As this client
- # implementation does a flushInput on connect, this banner is hidden from
- # the user application.
- # - NOTIFY_MODEMSTATE: the poll interval of the server seems to be one
- # second.
- # - To get the signature [COM_PORT_OPTION 0] has to be sent.
- # - run a server: run ser2net daemon, in /etc/ser2net.conf:
- # 2000:telnet:0:/dev/ttyS0:9600 remctl banner
- # ###########################################################################
- # How to identify ports? pySerial might want to support other protocols in the
- # future, so lets use an URL scheme.
- # for RFC2217 compliant servers we will use this:
- # rfc2217://<host>:<port>[?option[&option...]]
- #
- # options:
- # - "logging" set log level print diagnostic messages (e.g. "logging=debug")
- # - "ign_set_control": do not look at the answers to SET_CONTROL
- # - "poll_modem": issue NOTIFY_MODEMSTATE requests when CTS/DTR/RI/CD is read.
- # Without this option it expects that the server sends notifications
- # automatically on change (which most servers do and is according to the
- # RFC).
- # the order of the options is not relevant
- from __future__ import absolute_import
- import logging
- import socket
- import struct
- import threading
- import time
- try:
- import urlparse
- except ImportError:
- import urllib.parse as urlparse
- try:
- import Queue
- except ImportError:
- import queue as Queue
- import serial
- from serial.serialutil import SerialBase, SerialException, to_bytes, \
- iterbytes, PortNotOpenError, Timeout
- # port string is expected to be something like this:
- # rfc2217://host:port
- # host may be an IP or including domain, whatever.
- # port is 0...65535
- # map log level names to constants. used in from_url()
- LOGGER_LEVELS = {
- 'debug': logging.DEBUG,
- 'info': logging.INFO,
- 'warning': logging.WARNING,
- 'error': logging.ERROR,
- }
- # telnet protocol characters
- SE = b'\xf0' # Subnegotiation End
- NOP = b'\xf1' # No Operation
- DM = b'\xf2' # Data Mark
- BRK = b'\xf3' # Break
- IP = b'\xf4' # Interrupt process
- AO = b'\xf5' # Abort output
- AYT = b'\xf6' # Are You There
- EC = b'\xf7' # Erase Character
- EL = b'\xf8' # Erase Line
- GA = b'\xf9' # Go Ahead
- SB = b'\xfa' # Subnegotiation Begin
- WILL = b'\xfb'
- WONT = b'\xfc'
- DO = b'\xfd'
- DONT = b'\xfe'
- IAC = b'\xff' # Interpret As Command
- IAC_DOUBLED = b'\xff\xff'
- # selected telnet options
- BINARY = b'\x00' # 8-bit data path
- ECHO = b'\x01' # echo
- SGA = b'\x03' # suppress go ahead
- # RFC2217
- COM_PORT_OPTION = b'\x2c'
- # Client to Access Server
- SET_BAUDRATE = b'\x01'
- SET_DATASIZE = b'\x02'
- SET_PARITY = b'\x03'
- SET_STOPSIZE = b'\x04'
- SET_CONTROL = b'\x05'
- NOTIFY_LINESTATE = b'\x06'
- NOTIFY_MODEMSTATE = b'\x07'
- FLOWCONTROL_SUSPEND = b'\x08'
- FLOWCONTROL_RESUME = b'\x09'
- SET_LINESTATE_MASK = b'\x0a'
- SET_MODEMSTATE_MASK = b'\x0b'
- PURGE_DATA = b'\x0c'
- SERVER_SET_BAUDRATE = b'\x65'
- SERVER_SET_DATASIZE = b'\x66'
- SERVER_SET_PARITY = b'\x67'
- SERVER_SET_STOPSIZE = b'\x68'
- SERVER_SET_CONTROL = b'\x69'
- SERVER_NOTIFY_LINESTATE = b'\x6a'
- SERVER_NOTIFY_MODEMSTATE = b'\x6b'
- SERVER_FLOWCONTROL_SUSPEND = b'\x6c'
- SERVER_FLOWCONTROL_RESUME = b'\x6d'
- SERVER_SET_LINESTATE_MASK = b'\x6e'
- SERVER_SET_MODEMSTATE_MASK = b'\x6f'
- SERVER_PURGE_DATA = b'\x70'
- RFC2217_ANSWER_MAP = {
- SET_BAUDRATE: SERVER_SET_BAUDRATE,
- SET_DATASIZE: SERVER_SET_DATASIZE,
- SET_PARITY: SERVER_SET_PARITY,
- SET_STOPSIZE: SERVER_SET_STOPSIZE,
- SET_CONTROL: SERVER_SET_CONTROL,
- NOTIFY_LINESTATE: SERVER_NOTIFY_LINESTATE,
- NOTIFY_MODEMSTATE: SERVER_NOTIFY_MODEMSTATE,
- FLOWCONTROL_SUSPEND: SERVER_FLOWCONTROL_SUSPEND,
- FLOWCONTROL_RESUME: SERVER_FLOWCONTROL_RESUME,
- SET_LINESTATE_MASK: SERVER_SET_LINESTATE_MASK,
- SET_MODEMSTATE_MASK: SERVER_SET_MODEMSTATE_MASK,
- PURGE_DATA: SERVER_PURGE_DATA,
- }
- SET_CONTROL_REQ_FLOW_SETTING = b'\x00' # Request Com Port Flow Control Setting (outbound/both)
- SET_CONTROL_USE_NO_FLOW_CONTROL = b'\x01' # Use No Flow Control (outbound/both)
- SET_CONTROL_USE_SW_FLOW_CONTROL = b'\x02' # Use XON/XOFF Flow Control (outbound/both)
- SET_CONTROL_USE_HW_FLOW_CONTROL = b'\x03' # Use HARDWARE Flow Control (outbound/both)
- SET_CONTROL_REQ_BREAK_STATE = b'\x04' # Request BREAK State
- SET_CONTROL_BREAK_ON = b'\x05' # Set BREAK State ON
- SET_CONTROL_BREAK_OFF = b'\x06' # Set BREAK State OFF
- SET_CONTROL_REQ_DTR = b'\x07' # Request DTR Signal State
- SET_CONTROL_DTR_ON = b'\x08' # Set DTR Signal State ON
- SET_CONTROL_DTR_OFF = b'\x09' # Set DTR Signal State OFF
- SET_CONTROL_REQ_RTS = b'\x0a' # Request RTS Signal State
- SET_CONTROL_RTS_ON = b'\x0b' # Set RTS Signal State ON
- SET_CONTROL_RTS_OFF = b'\x0c' # Set RTS Signal State OFF
- SET_CONTROL_REQ_FLOW_SETTING_IN = b'\x0d' # Request Com Port Flow Control Setting (inbound)
- SET_CONTROL_USE_NO_FLOW_CONTROL_IN = b'\x0e' # Use No Flow Control (inbound)
- SET_CONTROL_USE_SW_FLOW_CONTOL_IN = b'\x0f' # Use XON/XOFF Flow Control (inbound)
- SET_CONTROL_USE_HW_FLOW_CONTOL_IN = b'\x10' # Use HARDWARE Flow Control (inbound)
- SET_CONTROL_USE_DCD_FLOW_CONTROL = b'\x11' # Use DCD Flow Control (outbound/both)
- SET_CONTROL_USE_DTR_FLOW_CONTROL = b'\x12' # Use DTR Flow Control (inbound)
- SET_CONTROL_USE_DSR_FLOW_CONTROL = b'\x13' # Use DSR Flow Control (outbound/both)
- LINESTATE_MASK_TIMEOUT = 128 # Time-out Error
- LINESTATE_MASK_SHIFTREG_EMPTY = 64 # Transfer Shift Register Empty
- LINESTATE_MASK_TRANSREG_EMPTY = 32 # Transfer Holding Register Empty
- LINESTATE_MASK_BREAK_DETECT = 16 # Break-detect Error
- LINESTATE_MASK_FRAMING_ERROR = 8 # Framing Error
- LINESTATE_MASK_PARTIY_ERROR = 4 # Parity Error
- LINESTATE_MASK_OVERRUN_ERROR = 2 # Overrun Error
- LINESTATE_MASK_DATA_READY = 1 # Data Ready
- MODEMSTATE_MASK_CD = 128 # Receive Line Signal Detect (also known as Carrier Detect)
- MODEMSTATE_MASK_RI = 64 # Ring Indicator
- MODEMSTATE_MASK_DSR = 32 # Data-Set-Ready Signal State
- MODEMSTATE_MASK_CTS = 16 # Clear-To-Send Signal State
- MODEMSTATE_MASK_CD_CHANGE = 8 # Delta Receive Line Signal Detect
- MODEMSTATE_MASK_RI_CHANGE = 4 # Trailing-edge Ring Detector
- MODEMSTATE_MASK_DSR_CHANGE = 2 # Delta Data-Set-Ready
- MODEMSTATE_MASK_CTS_CHANGE = 1 # Delta Clear-To-Send
- PURGE_RECEIVE_BUFFER = b'\x01' # Purge access server receive data buffer
- PURGE_TRANSMIT_BUFFER = b'\x02' # Purge access server transmit data buffer
- PURGE_BOTH_BUFFERS = b'\x03' # Purge both the access server receive data
- # buffer and the access server transmit data buffer
- RFC2217_PARITY_MAP = {
- serial.PARITY_NONE: 1,
- serial.PARITY_ODD: 2,
- serial.PARITY_EVEN: 3,
- serial.PARITY_MARK: 4,
- serial.PARITY_SPACE: 5,
- }
- RFC2217_REVERSE_PARITY_MAP = dict((v, k) for k, v in RFC2217_PARITY_MAP.items())
- RFC2217_STOPBIT_MAP = {
- serial.STOPBITS_ONE: 1,
- serial.STOPBITS_ONE_POINT_FIVE: 3,
- serial.STOPBITS_TWO: 2,
- }
- RFC2217_REVERSE_STOPBIT_MAP = dict((v, k) for k, v in RFC2217_STOPBIT_MAP.items())
- # Telnet filter states
- M_NORMAL = 0
- M_IAC_SEEN = 1
- M_NEGOTIATE = 2
- # TelnetOption and TelnetSubnegotiation states
- REQUESTED = 'REQUESTED'
- ACTIVE = 'ACTIVE'
- INACTIVE = 'INACTIVE'
- REALLY_INACTIVE = 'REALLY_INACTIVE'
- class TelnetOption(object):
- """Manage a single telnet option, keeps track of DO/DONT WILL/WONT."""
- def __init__(self, connection, name, option, send_yes, send_no, ack_yes,
- ack_no, initial_state, activation_callback=None):
- """\
- Initialize option.
- :param connection: connection used to transmit answers
- :param name: a readable name for debug outputs
- :param send_yes: what to send when option is to be enabled.
- :param send_no: what to send when option is to be disabled.
- :param ack_yes: what to expect when remote agrees on option.
- :param ack_no: what to expect when remote disagrees on option.
- :param initial_state: options initialized with REQUESTED are tried to
- be enabled on startup. use INACTIVE for all others.
- """
- self.connection = connection
- self.name = name
- self.option = option
- self.send_yes = send_yes
- self.send_no = send_no
- self.ack_yes = ack_yes
- self.ack_no = ack_no
- self.state = initial_state
- self.active = False
- self.activation_callback = activation_callback
- def __repr__(self):
- """String for debug outputs"""
- return "{o.name}:{o.active}({o.state})".format(o=self)
- def process_incoming(self, command):
- """\
- A DO/DONT/WILL/WONT was received for this option, update state and
- answer when needed.
- """
- if command == self.ack_yes:
- if self.state is REQUESTED:
- self.state = ACTIVE
- self.active = True
- if self.activation_callback is not None:
- self.activation_callback()
- elif self.state is ACTIVE:
- pass
- elif self.state is INACTIVE:
- self.state = ACTIVE
- self.connection.telnet_send_option(self.send_yes, self.option)
- self.active = True
- if self.activation_callback is not None:
- self.activation_callback()
- elif self.state is REALLY_INACTIVE:
- self.connection.telnet_send_option(self.send_no, self.option)
- else:
- raise ValueError('option in illegal state {!r}'.format(self))
- elif command == self.ack_no:
- if self.state is REQUESTED:
- self.state = INACTIVE
- self.active = False
- elif self.state is ACTIVE:
- self.state = INACTIVE
- self.connection.telnet_send_option(self.send_no, self.option)
- self.active = False
- elif self.state is INACTIVE:
- pass
- elif self.state is REALLY_INACTIVE:
- pass
- else:
- raise ValueError('option in illegal state {!r}'.format(self))
- class TelnetSubnegotiation(object):
- """\
- A object to handle subnegotiation of options. In this case actually
- sub-sub options for RFC 2217. It is used to track com port options.
- """
- def __init__(self, connection, name, option, ack_option=None):
- if ack_option is None:
- ack_option = option
- self.connection = connection
- self.name = name
- self.option = option
- self.value = None
- self.ack_option = ack_option
- self.state = INACTIVE
- def __repr__(self):
- """String for debug outputs."""
- return "{sn.name}:{sn.state}".format(sn=self)
- def set(self, value):
- """\
- Request a change of the value. a request is sent to the server. if
- the client needs to know if the change is performed he has to check the
- state of this object.
- """
- self.value = value
- self.state = REQUESTED
- self.connection.rfc2217_send_subnegotiation(self.option, self.value)
- if self.connection.logger:
- self.connection.logger.debug("SB Requesting {} -> {!r}".format(self.name, self.value))
- def is_ready(self):
- """\
- Check if answer from server has been received. when server rejects
- the change, raise a ValueError.
- """
- if self.state == REALLY_INACTIVE:
- raise ValueError("remote rejected value for option {!r}".format(self.name))
- return self.state == ACTIVE
- # add property to have a similar interface as TelnetOption
- active = property(is_ready)
- def wait(self, timeout=3):
- """\
- Wait until the subnegotiation has been acknowledged or timeout. It
- can also throw a value error when the answer from the server does not
- match the value sent.
- """
- timeout_timer = Timeout(timeout)
- while not timeout_timer.expired():
- time.sleep(0.05) # prevent 100% CPU load
- if self.is_ready():
- break
- else:
- raise SerialException("timeout while waiting for option {!r}".format(self.name))
- def check_answer(self, suboption):
- """\
- Check an incoming subnegotiation block. The parameter already has
- cut off the header like sub option number and com port option value.
- """
- if self.value == suboption[:len(self.value)]:
- self.state = ACTIVE
- else:
- # error propagation done in is_ready
- self.state = REALLY_INACTIVE
- if self.connection.logger:
- self.connection.logger.debug("SB Answer {} -> {!r} -> {}".format(self.name, suboption, self.state))
- class Serial(SerialBase):
- """Serial port implementation for RFC 2217 remote serial ports."""
- BAUDRATES = (50, 75, 110, 134, 150, 200, 300, 600, 1200, 1800, 2400, 4800,
- 9600, 19200, 38400, 57600, 115200)
- def __init__(self, *args, **kwargs):
- self._thread = None
- self._socket = None
- self._linestate = 0
- self._modemstate = None
- self._modemstate_timeout = Timeout(-1)
- self._remote_suspend_flow = False
- self._write_lock = None
- self.logger = None
- self._ignore_set_control_answer = False
- self._poll_modem_state = False
- self._network_timeout = 3
- self._telnet_options = None
- self._rfc2217_port_settings = None
- self._rfc2217_options = None
- self._read_buffer = None
- super(Serial, self).__init__(*args, **kwargs) # must be last call in case of auto-open
- def open(self):
- """\
- Open port with current settings. This may throw a SerialException
- if the port cannot be opened.
- """
- self.logger = None
- self._ignore_set_control_answer = False
- self._poll_modem_state = False
- self._network_timeout = 3
- if self._port is None:
- raise SerialException("Port must be configured before it can be used.")
- if self.is_open:
- raise SerialException("Port is already open.")
- try:
- self._socket = socket.create_connection(self.from_url(self.portstr), timeout=5) # XXX good value?
- self._socket.setsockopt(socket.IPPROTO_TCP, socket.TCP_NODELAY, 1)
- except Exception as msg:
- self._socket = None
- raise SerialException("Could not open port {}: {}".format(self.portstr, msg))
- # use a thread save queue as buffer. it also simplifies implementing
- # the read timeout
- self._read_buffer = Queue.Queue()
- # to ensure that user writes does not interfere with internal
- # telnet/rfc2217 options establish a lock
- self._write_lock = threading.Lock()
- # name the following separately so that, below, a check can be easily done
- mandadory_options = [
- TelnetOption(self, 'we-BINARY', BINARY, WILL, WONT, DO, DONT, INACTIVE),
- TelnetOption(self, 'we-RFC2217', COM_PORT_OPTION, WILL, WONT, DO, DONT, REQUESTED),
- ]
- # all supported telnet options
- self._telnet_options = [
- TelnetOption(self, 'ECHO', ECHO, DO, DONT, WILL, WONT, REQUESTED),
- TelnetOption(self, 'we-SGA', SGA, WILL, WONT, DO, DONT, REQUESTED),
- TelnetOption(self, 'they-SGA', SGA, DO, DONT, WILL, WONT, REQUESTED),
- TelnetOption(self, 'they-BINARY', BINARY, DO, DONT, WILL, WONT, INACTIVE),
- TelnetOption(self, 'they-RFC2217', COM_PORT_OPTION, DO, DONT, WILL, WONT, REQUESTED),
- ] + mandadory_options
- # RFC 2217 specific states
- # COM port settings
- self._rfc2217_port_settings = {
- 'baudrate': TelnetSubnegotiation(self, 'baudrate', SET_BAUDRATE, SERVER_SET_BAUDRATE),
- 'datasize': TelnetSubnegotiation(self, 'datasize', SET_DATASIZE, SERVER_SET_DATASIZE),
- 'parity': TelnetSubnegotiation(self, 'parity', SET_PARITY, SERVER_SET_PARITY),
- 'stopsize': TelnetSubnegotiation(self, 'stopsize', SET_STOPSIZE, SERVER_SET_STOPSIZE),
- }
- # There are more subnegotiation objects, combine all in one dictionary
- # for easy access
- self._rfc2217_options = {
- 'purge': TelnetSubnegotiation(self, 'purge', PURGE_DATA, SERVER_PURGE_DATA),
- 'control': TelnetSubnegotiation(self, 'control', SET_CONTROL, SERVER_SET_CONTROL),
- }
- self._rfc2217_options.update(self._rfc2217_port_settings)
- # cache for line and modem states that the server sends to us
- self._linestate = 0
- self._modemstate = None
- self._modemstate_timeout = Timeout(-1)
- # RFC 2217 flow control between server and client
- self._remote_suspend_flow = False
- self.is_open = True
- self._thread = threading.Thread(target=self._telnet_read_loop)
- self._thread.setDaemon(True)
- self._thread.setName('pySerial RFC 2217 reader thread for {}'.format(self._port))
- self._thread.start()
- try: # must clean-up if open fails
- # negotiate Telnet/RFC 2217 -> send initial requests
- for option in self._telnet_options:
- if option.state is REQUESTED:
- self.telnet_send_option(option.send_yes, option.option)
- # now wait until important options are negotiated
- timeout = Timeout(self._network_timeout)
- while not timeout.expired():
- time.sleep(0.05) # prevent 100% CPU load
- if sum(o.active for o in mandadory_options) == sum(o.state != INACTIVE for o in mandadory_options):
- break
- else:
- raise SerialException(
- "Remote does not seem to support RFC2217 or BINARY mode {!r}".format(mandadory_options))
- if self.logger:
- self.logger.info("Negotiated options: {}".format(self._telnet_options))
- # fine, go on, set RFC 2217 specific things
- self._reconfigure_port()
- # all things set up get, now a clean start
- if not self._dsrdtr:
- self._update_dtr_state()
- if not self._rtscts:
- self._update_rts_state()
- self.reset_input_buffer()
- self.reset_output_buffer()
- except:
- self.close()
- raise
- def _reconfigure_port(self):
- """Set communication parameters on opened port."""
- if self._socket is None:
- raise SerialException("Can only operate on open ports")
- # if self._timeout != 0 and self._interCharTimeout is not None:
- # XXX
- if self._write_timeout is not None:
- raise NotImplementedError('write_timeout is currently not supported')
- # XXX
- # Setup the connection
- # to get good performance, all parameter changes are sent first...
- if not 0 < self._baudrate < 2 ** 32:
- raise ValueError("invalid baudrate: {!r}".format(self._baudrate))
- self._rfc2217_port_settings['baudrate'].set(struct.pack(b'!I', self._baudrate))
- self._rfc2217_port_settings['datasize'].set(struct.pack(b'!B', self._bytesize))
- self._rfc2217_port_settings['parity'].set(struct.pack(b'!B', RFC2217_PARITY_MAP[self._parity]))
- self._rfc2217_port_settings['stopsize'].set(struct.pack(b'!B', RFC2217_STOPBIT_MAP[self._stopbits]))
- # and now wait until parameters are active
- items = self._rfc2217_port_settings.values()
- if self.logger:
- self.logger.debug("Negotiating settings: {}".format(items))
- timeout = Timeout(self._network_timeout)
- while not timeout.expired():
- time.sleep(0.05) # prevent 100% CPU load
- if sum(o.active for o in items) == len(items):
- break
- else:
- raise SerialException("Remote does not accept parameter change (RFC2217): {!r}".format(items))
- if self.logger:
- self.logger.info("Negotiated settings: {}".format(items))
- if self._rtscts and self._xonxoff:
- raise ValueError('xonxoff and rtscts together are not supported')
- elif self._rtscts:
- self.rfc2217_set_control(SET_CONTROL_USE_HW_FLOW_CONTROL)
- elif self._xonxoff:
- self.rfc2217_set_control(SET_CONTROL_USE_SW_FLOW_CONTROL)
- else:
- self.rfc2217_set_control(SET_CONTROL_USE_NO_FLOW_CONTROL)
- def close(self):
- """Close port"""
- self.is_open = False
- if self._socket:
- try:
- self._socket.shutdown(socket.SHUT_RDWR)
- self._socket.close()
- except:
- # ignore errors.
- pass
- if self._thread:
- self._thread.join(7) # XXX more than socket timeout
- self._thread = None
- # in case of quick reconnects, give the server some time
- time.sleep(0.3)
- self._socket = None
- def from_url(self, url):
- """\
- extract host and port from an URL string, other settings are extracted
- an stored in instance
- """
- parts = urlparse.urlsplit(url)
- if parts.scheme != "rfc2217":
- raise SerialException(
- 'expected a string in the form '
- '"rfc2217://<host>:<port>[?option[&option...]]": '
- 'not starting with rfc2217:// ({!r})'.format(parts.scheme))
- try:
- # process options now, directly altering self
- for option, values in urlparse.parse_qs(parts.query, True).items():
- if option == 'logging':
- logging.basicConfig() # XXX is that good to call it here?
- self.logger = logging.getLogger('pySerial.rfc2217')
- self.logger.setLevel(LOGGER_LEVELS[values[0]])
- self.logger.debug('enabled logging')
- elif option == 'ign_set_control':
- self._ignore_set_control_answer = True
- elif option == 'poll_modem':
- self._poll_modem_state = True
- elif option == 'timeout':
- self._network_timeout = float(values[0])
- else:
- raise ValueError('unknown option: {!r}'.format(option))
- if not 0 <= parts.port < 65536:
- raise ValueError("port not in range 0...65535")
- except ValueError as e:
- raise SerialException(
- 'expected a string in the form '
- '"rfc2217://<host>:<port>[?option[&option...]]": {}'.format(e))
- return (parts.hostname, parts.port)
- # - - - - - - - - - - - - - - - - - - - - - - - -
- @property
- def in_waiting(self):
- """Return the number of bytes currently in the input buffer."""
- if not self.is_open:
- raise PortNotOpenError()
- return self._read_buffer.qsize()
- def read(self, size=1):
- """\
- Read size bytes from the serial port. If a timeout is set it may
- return less characters as requested. With no timeout it will block
- until the requested number of bytes is read.
- """
- if not self.is_open:
- raise PortNotOpenError()
- data = bytearray()
- try:
- timeout = Timeout(self._timeout)
- while len(data) < size:
- if self._thread is None or not self._thread.is_alive():
- raise SerialException('connection failed (reader thread died)')
- buf = self._read_buffer.get(True, timeout.time_left())
- if buf is None:
- return bytes(data)
- data += buf
- if timeout.expired():
- break
- except Queue.Empty: # -> timeout
- pass
- return bytes(data)
- def write(self, data):
- """\
- Output the given byte string over the serial port. Can block if the
- connection is blocked. May raise SerialException if the connection is
- closed.
- """
- if not self.is_open:
- raise PortNotOpenError()
- with self._write_lock:
- try:
- self._socket.sendall(to_bytes(data).replace(IAC, IAC_DOUBLED))
- except socket.error as e:
- raise SerialException("connection failed (socket error): {}".format(e))
- return len(data)
- def reset_input_buffer(self):
- """Clear input buffer, discarding all that is in the buffer."""
- if not self.is_open:
- raise PortNotOpenError()
- self.rfc2217_send_purge(PURGE_RECEIVE_BUFFER)
- # empty read buffer
- while self._read_buffer.qsize():
- self._read_buffer.get(False)
- def reset_output_buffer(self):
- """\
- Clear output buffer, aborting the current output and
- discarding all that is in the buffer.
- """
- if not self.is_open:
- raise PortNotOpenError()
- self.rfc2217_send_purge(PURGE_TRANSMIT_BUFFER)
- def _update_break_state(self):
- """\
- Set break: Controls TXD. When active, to transmitting is
- possible.
- """
- if not self.is_open:
- raise PortNotOpenError()
- if self.logger:
- self.logger.info('set BREAK to {}'.format('active' if self._break_state else 'inactive'))
- if self._break_state:
- self.rfc2217_set_control(SET_CONTROL_BREAK_ON)
- else:
- self.rfc2217_set_control(SET_CONTROL_BREAK_OFF)
- def _update_rts_state(self):
- """Set terminal status line: Request To Send."""
- if not self.is_open:
- raise PortNotOpenError()
- if self.logger:
- self.logger.info('set RTS to {}'.format('active' if self._rts_state else 'inactive'))
- if self._rts_state:
- self.rfc2217_set_control(SET_CONTROL_RTS_ON)
- else:
- self.rfc2217_set_control(SET_CONTROL_RTS_OFF)
- def _update_dtr_state(self):
- """Set terminal status line: Data Terminal Ready."""
- if not self.is_open:
- raise PortNotOpenError()
- if self.logger:
- self.logger.info('set DTR to {}'.format('active' if self._dtr_state else 'inactive'))
- if self._dtr_state:
- self.rfc2217_set_control(SET_CONTROL_DTR_ON)
- else:
- self.rfc2217_set_control(SET_CONTROL_DTR_OFF)
- @property
- def cts(self):
- """Read terminal status line: Clear To Send."""
- if not self.is_open:
- raise PortNotOpenError()
- return bool(self.get_modem_state() & MODEMSTATE_MASK_CTS)
- @property
- def dsr(self):
- """Read terminal status line: Data Set Ready."""
- if not self.is_open:
- raise PortNotOpenError()
- return bool(self.get_modem_state() & MODEMSTATE_MASK_DSR)
- @property
- def ri(self):
- """Read terminal status line: Ring Indicator."""
- if not self.is_open:
- raise PortNotOpenError()
- return bool(self.get_modem_state() & MODEMSTATE_MASK_RI)
- @property
- def cd(self):
- """Read terminal status line: Carrier Detect."""
- if not self.is_open:
- raise PortNotOpenError()
- return bool(self.get_modem_state() & MODEMSTATE_MASK_CD)
- # - - - platform specific - - -
- # None so far
- # - - - RFC2217 specific - - -
- def _telnet_read_loop(self):
- """Read loop for the socket."""
- mode = M_NORMAL
- suboption = None
- try:
- while self.is_open:
- try:
- data = self._socket.recv(1024)
- except socket.timeout:
- # just need to get out of recv form time to time to check if
- # still alive
- continue
- except socket.error as e:
- # connection fails -> terminate loop
- if self.logger:
- self.logger.debug("socket error in reader thread: {}".format(e))
- self._read_buffer.put(None)
- break
- if not data:
- self._read_buffer.put(None)
- break # lost connection
- for byte in iterbytes(data):
- if mode == M_NORMAL:
- # interpret as command or as data
- if byte == IAC:
- mode = M_IAC_SEEN
- else:
- # store data in read buffer or sub option buffer
- # depending on state
- if suboption is not None:
- suboption += byte
- else:
- self._read_buffer.put(byte)
- elif mode == M_IAC_SEEN:
- if byte == IAC:
- # interpret as command doubled -> insert character
- # itself
- if suboption is not None:
- suboption += IAC
- else:
- self._read_buffer.put(IAC)
- mode = M_NORMAL
- elif byte == SB:
- # sub option start
- suboption = bytearray()
- mode = M_NORMAL
- elif byte == SE:
- # sub option end -> process it now
- self._telnet_process_subnegotiation(bytes(suboption))
- suboption = None
- mode = M_NORMAL
- elif byte in (DO, DONT, WILL, WONT):
- # negotiation
- telnet_command = byte
- mode = M_NEGOTIATE
- else:
- # other telnet commands
- self._telnet_process_command(byte)
- mode = M_NORMAL
- elif mode == M_NEGOTIATE: # DO, DONT, WILL, WONT was received, option now following
- self._telnet_negotiate_option(telnet_command, byte)
- mode = M_NORMAL
- finally:
- if self.logger:
- self.logger.debug("read thread terminated")
- # - incoming telnet commands and options
- def _telnet_process_command(self, command):
- """Process commands other than DO, DONT, WILL, WONT."""
- # Currently none. RFC2217 only uses negotiation and subnegotiation.
- if self.logger:
- self.logger.warning("ignoring Telnet command: {!r}".format(command))
- def _telnet_negotiate_option(self, command, option):
- """Process incoming DO, DONT, WILL, WONT."""
- # check our registered telnet options and forward command to them
- # they know themselves if they have to answer or not
- known = False
- for item in self._telnet_options:
- # can have more than one match! as some options are duplicated for
- # 'us' and 'them'
- if item.option == option:
- item.process_incoming(command)
- known = True
- if not known:
- # handle unknown options
- # only answer to positive requests and deny them
- if command == WILL or command == DO:
- self.telnet_send_option((DONT if command == WILL else WONT), option)
- if self.logger:
- self.logger.warning("rejected Telnet option: {!r}".format(option))
- def _telnet_process_subnegotiation(self, suboption):
- """Process subnegotiation, the data between IAC SB and IAC SE."""
- if suboption[0:1] == COM_PORT_OPTION:
- if suboption[1:2] == SERVER_NOTIFY_LINESTATE and len(suboption) >= 3:
- self._linestate = ord(suboption[2:3]) # ensure it is a number
- if self.logger:
- self.logger.info("NOTIFY_LINESTATE: {}".format(self._linestate))
- elif suboption[1:2] == SERVER_NOTIFY_MODEMSTATE and len(suboption) >= 3:
- self._modemstate = ord(suboption[2:3]) # ensure it is a number
- if self.logger:
- self.logger.info("NOTIFY_MODEMSTATE: {}".format(self._modemstate))
- # update time when we think that a poll would make sense
- self._modemstate_timeout.restart(0.3)
- elif suboption[1:2] == FLOWCONTROL_SUSPEND:
- self._remote_suspend_flow = True
- elif suboption[1:2] == FLOWCONTROL_RESUME:
- self._remote_suspend_flow = False
- else:
- for item in self._rfc2217_options.values():
- if item.ack_option == suboption[1:2]:
- #~ print "processing COM_PORT_OPTION: %r" % list(suboption[1:])
- item.check_answer(bytes(suboption[2:]))
- break
- else:
- if self.logger:
- self.logger.warning("ignoring COM_PORT_OPTION: {!r}".format(suboption))
- else:
- if self.logger:
- self.logger.warning("ignoring subnegotiation: {!r}".format(suboption))
- # - outgoing telnet commands and options
- def _internal_raw_write(self, data):
- """internal socket write with no data escaping. used to send telnet stuff."""
- with self._write_lock:
- self._socket.sendall(data)
- def telnet_send_option(self, action, option):
- """Send DO, DONT, WILL, WONT."""
- self._internal_raw_write(IAC + action + option)
- def rfc2217_send_subnegotiation(self, option, value=b''):
- """Subnegotiation of RFC2217 parameters."""
- value = value.replace(IAC, IAC_DOUBLED)
- self._internal_raw_write(IAC + SB + COM_PORT_OPTION + option + value + IAC + SE)
- def rfc2217_send_purge(self, value):
- """\
- Send purge request to the remote.
- (PURGE_RECEIVE_BUFFER / PURGE_TRANSMIT_BUFFER / PURGE_BOTH_BUFFERS)
- """
- item = self._rfc2217_options['purge']
- item.set(value) # transmit desired purge type
- item.wait(self._network_timeout) # wait for acknowledge from the server
- def rfc2217_set_control(self, value):
- """transmit change of control line to remote"""
- item = self._rfc2217_options['control']
- item.set(value) # transmit desired control type
- if self._ignore_set_control_answer:
- # answers are ignored when option is set. compatibility mode for
- # servers that answer, but not the expected one... (or no answer
- # at all) i.e. sredird
- time.sleep(0.1) # this helps getting the unit tests passed
- else:
- item.wait(self._network_timeout) # wait for acknowledge from the server
- def rfc2217_flow_server_ready(self):
- """\
- check if server is ready to receive data. block for some time when
- not.
- """
- #~ if self._remote_suspend_flow:
- #~ wait---
- def get_modem_state(self):
- """\
- get last modem state (cached value. If value is "old", request a new
- one. This cache helps that we don't issue to many requests when e.g. all
- status lines, one after the other is queried by the user (CTS, DSR
- etc.)
- """
- # active modem state polling enabled? is the value fresh enough?
- if self._poll_modem_state and self._modemstate_timeout.expired():
- if self.logger:
- self.logger.debug('polling modem state')
- # when it is older, request an update
- self.rfc2217_send_subnegotiation(NOTIFY_MODEMSTATE)
- timeout = Timeout(self._network_timeout)
- while not timeout.expired():
- time.sleep(0.05) # prevent 100% CPU load
- # when expiration time is updated, it means that there is a new
- # value
- if not self._modemstate_timeout.expired():
- break
- else:
- if self.logger:
- self.logger.warning('poll for modem state failed')
- # even when there is a timeout, do not generate an error just
- # return the last known value. this way we can support buggy
- # servers that do not respond to polls, but send automatic
- # updates.
- if self._modemstate is not None:
- if self.logger:
- self.logger.debug('using cached modem state')
- return self._modemstate
- else:
- # never received a notification from the server
- raise SerialException("remote sends no NOTIFY_MODEMSTATE")
- #############################################################################
- # The following is code that helps implementing an RFC 2217 server.
- class PortManager(object):
- """\
- This class manages the state of Telnet and RFC 2217. It needs a serial
- instance and a connection to work with. Connection is expected to implement
- a (thread safe) write function, that writes the string to the network.
- """
- def __init__(self, serial_port, connection, logger=None):
- self.serial = serial_port
- self.connection = connection
- self.logger = logger
- self._client_is_rfc2217 = False
- # filter state machine
- self.mode = M_NORMAL
- self.suboption = None
- self.telnet_command = None
- # states for modem/line control events
- self.modemstate_mask = 255
- self.last_modemstate = None
- self.linstate_mask = 0
- # all supported telnet options
- self._telnet_options = [
- TelnetOption(self, 'ECHO', ECHO, WILL, WONT, DO, DONT, REQUESTED),
- TelnetOption(self, 'we-SGA', SGA, WILL, WONT, DO, DONT, REQUESTED),
- TelnetOption(self, 'they-SGA', SGA, DO, DONT, WILL, WONT, INACTIVE),
- TelnetOption(self, 'we-BINARY', BINARY, WILL, WONT, DO, DONT, INACTIVE),
- TelnetOption(self, 'they-BINARY', BINARY, DO, DONT, WILL, WONT, REQUESTED),
- TelnetOption(self, 'we-RFC2217', COM_PORT_OPTION, WILL, WONT, DO, DONT, REQUESTED, self._client_ok),
- TelnetOption(self, 'they-RFC2217', COM_PORT_OPTION, DO, DONT, WILL, WONT, INACTIVE, self._client_ok),
- ]
- # negotiate Telnet/RFC2217 -> send initial requests
- if self.logger:
- self.logger.debug("requesting initial Telnet/RFC 2217 options")
- for option in self._telnet_options:
- if option.state is REQUESTED:
- self.telnet_send_option(option.send_yes, option.option)
- # issue 1st modem state notification
- def _client_ok(self):
- """\
- callback of telnet option. It gets called when option is activated.
- This one here is used to detect when the client agrees on RFC 2217. A
- flag is set so that other functions like check_modem_lines know if the
- client is OK.
- """
- # The callback is used for we and they so if one party agrees, we're
- # already happy. it seems not all servers do the negotiation correctly
- # and i guess there are incorrect clients too.. so be happy if client
- # answers one or the other positively.
- self._client_is_rfc2217 = True
- if self.logger:
- self.logger.info("client accepts RFC 2217")
- # this is to ensure that the client gets a notification, even if there
- # was no change
- self.check_modem_lines(force_notification=True)
- # - outgoing telnet commands and options
- def telnet_send_option(self, action, option):
- """Send DO, DONT, WILL, WONT."""
- self.connection.write(IAC + action + option)
- def rfc2217_send_subnegotiation(self, option, value=b''):
- """Subnegotiation of RFC 2217 parameters."""
- value = value.replace(IAC, IAC_DOUBLED)
- self.connection.write(IAC + SB + COM_PORT_OPTION + option + value + IAC + SE)
- # - check modem lines, needs to be called periodically from user to
- # establish polling
- def check_modem_lines(self, force_notification=False):
- """\
- read control lines from serial port and compare the last value sent to remote.
- send updates on changes.
- """
- modemstate = (
- (self.serial.cts and MODEMSTATE_MASK_CTS) |
- (self.serial.dsr and MODEMSTATE_MASK_DSR) |
- (self.serial.ri and MODEMSTATE_MASK_RI) |
- (self.serial.cd and MODEMSTATE_MASK_CD))
- # check what has changed
- deltas = modemstate ^ (self.last_modemstate or 0) # when last is None -> 0
- if deltas & MODEMSTATE_MASK_CTS:
- modemstate |= MODEMSTATE_MASK_CTS_CHANGE
- if deltas & MODEMSTATE_MASK_DSR:
- modemstate |= MODEMSTATE_MASK_DSR_CHANGE
- if deltas & MODEMSTATE_MASK_RI:
- modemstate |= MODEMSTATE_MASK_RI_CHANGE
- if deltas & MODEMSTATE_MASK_CD:
- modemstate |= MODEMSTATE_MASK_CD_CHANGE
- # if new state is different and the mask allows this change, send
- # notification. suppress notifications when client is not rfc2217
- if modemstate != self.last_modemstate or force_notification:
- if (self._client_is_rfc2217 and (modemstate & self.modemstate_mask)) or force_notification:
- self.rfc2217_send_subnegotiation(
- SERVER_NOTIFY_MODEMSTATE,
- to_bytes([modemstate & self.modemstate_mask]))
- if self.logger:
- self.logger.info("NOTIFY_MODEMSTATE: {}".format(modemstate))
- # save last state, but forget about deltas.
- # otherwise it would also notify about changing deltas which is
- # probably not very useful
- self.last_modemstate = modemstate & 0xf0
- # - outgoing data escaping
- def escape(self, data):
- """\
- This generator function is for the user. All outgoing data has to be
- properly escaped, so that no IAC character in the data stream messes up
- the Telnet state machine in the server.
- socket.sendall(escape(data))
- """
- for byte in iterbytes(data):
- if byte == IAC:
- yield IAC
- yield IAC
- else:
- yield byte
- # - incoming data filter
- def filter(self, data):
- """\
- Handle a bunch of incoming bytes. This is a generator. It will yield
- all characters not of interest for Telnet/RFC 2217.
- The idea is that the reader thread pushes data from the socket through
- this filter:
- for byte in filter(socket.recv(1024)):
- # do things like CR/LF conversion/whatever
- # and write data to the serial port
- serial.write(byte)
- (socket error handling code left as exercise for the reader)
- """
- for byte in iterbytes(data):
- if self.mode == M_NORMAL:
- # interpret as command or as data
- if byte == IAC:
- self.mode = M_IAC_SEEN
- else:
- # store data in sub option buffer or pass it to our
- # consumer depending on state
- if self.suboption is not None:
- self.suboption += byte
- else:
- yield byte
- elif self.mode == M_IAC_SEEN:
- if byte == IAC:
- # interpret as command doubled -> insert character
- # itself
- if self.suboption is not None:
- self.suboption += byte
- else:
- yield byte
- self.mode = M_NORMAL
- elif byte == SB:
- # sub option start
- self.suboption = bytearray()
- self.mode = M_NORMAL
- elif byte == SE:
- # sub option end -> process it now
- self._telnet_process_subnegotiation(bytes(self.suboption))
- self.suboption = None
- self.mode = M_NORMAL
- elif byte in (DO, DONT, WILL, WONT):
- # negotiation
- self.telnet_command = byte
- self.mode = M_NEGOTIATE
- else:
- # other telnet commands
- self._telnet_process_command(byte)
- self.mode = M_NORMAL
- elif self.mode == M_NEGOTIATE: # DO, DONT, WILL, WONT was received, option now following
- self._telnet_negotiate_option(self.telnet_command, byte)
- self.mode = M_NORMAL
- # - incoming telnet commands and options
- def _telnet_process_command(self, command):
- """Process commands other than DO, DONT, WILL, WONT."""
- # Currently none. RFC2217 only uses negotiation and subnegotiation.
- if self.logger:
- self.logger.warning("ignoring Telnet command: {!r}".format(command))
- def _telnet_negotiate_option(self, command, option):
- """Process incoming DO, DONT, WILL, WONT."""
- # check our registered telnet options and forward command to them
- # they know themselves if they have to answer or not
- known = False
- for item in self._telnet_options:
- # can have more than one match! as some options are duplicated for
- # 'us' and 'them'
- if item.option == option:
- item.process_incoming(command)
- known = True
- if not known:
- # handle unknown options
- # only answer to positive requests and deny them
- if command == WILL or command == DO:
- self.telnet_send_option((DONT if command == WILL else WONT), option)
- if self.logger:
- self.logger.warning("rejected Telnet option: {!r}".format(option))
- def _telnet_process_subnegotiation(self, suboption):
- """Process subnegotiation, the data between IAC SB and IAC SE."""
- if suboption[0:1] == COM_PORT_OPTION:
- if self.logger:
- self.logger.debug('received COM_PORT_OPTION: {!r}'.format(suboption))
- if suboption[1:2] == SET_BAUDRATE:
- backup = self.serial.baudrate
- try:
- (baudrate,) = struct.unpack(b"!I", suboption[2:6])
- if baudrate != 0:
- self.serial.baudrate = baudrate
- except ValueError as e:
- if self.logger:
- self.logger.error("failed to set baud rate: {}".format(e))
- self.serial.baudrate = backup
- else:
- if self.logger:
- self.logger.info("{} baud rate: {}".format('set' if baudrate else 'get', self.serial.baudrate))
- self.rfc2217_send_subnegotiation(SERVER_SET_BAUDRATE, struct.pack(b"!I", self.serial.baudrate))
- elif suboption[1:2] == SET_DATASIZE:
- backup = self.serial.bytesize
- try:
- (datasize,) = struct.unpack(b"!B", suboption[2:3])
- if datasize != 0:
- self.serial.bytesize = datasize
- except ValueError as e:
- if self.logger:
- self.logger.error("failed to set data size: {}".format(e))
- self.serial.bytesize = backup
- else:
- if self.logger:
- self.logger.info("{} data size: {}".format('set' if datasize else 'get', self.serial.bytesize))
- self.rfc2217_send_subnegotiation(SERVER_SET_DATASIZE, struct.pack(b"!B", self.serial.bytesize))
- elif suboption[1:2] == SET_PARITY:
- backup = self.serial.parity
- try:
- parity = struct.unpack(b"!B", suboption[2:3])[0]
- if parity != 0:
- self.serial.parity = RFC2217_REVERSE_PARITY_MAP[parity]
- except ValueError as e:
- if self.logger:
- self.logger.error("failed to set parity: {}".format(e))
- self.serial.parity = backup
- else:
- if self.logger:
- self.logger.info("{} parity: {}".format('set' if parity else 'get', self.serial.parity))
- self.rfc2217_send_subnegotiation(
- SERVER_SET_PARITY,
- struct.pack(b"!B", RFC2217_PARITY_MAP[self.serial.parity]))
- elif suboption[1:2] == SET_STOPSIZE:
- backup = self.serial.stopbits
- try:
- stopbits = struct.unpack(b"!B", suboption[2:3])[0]
- if stopbits != 0:
- self.serial.stopbits = RFC2217_REVERSE_STOPBIT_MAP[stopbits]
- except ValueError as e:
- if self.logger:
- self.logger.error("failed to set stop bits: {}".format(e))
- self.serial.stopbits = backup
- else:
- if self.logger:
- self.logger.info("{} stop bits: {}".format('set' if stopbits else 'get', self.serial.stopbits))
- self.rfc2217_send_subnegotiation(
- SERVER_SET_STOPSIZE,
- struct.pack(b"!B", RFC2217_STOPBIT_MAP[self.serial.stopbits]))
- elif suboption[1:2] == SET_CONTROL:
- if suboption[2:3] == SET_CONTROL_REQ_FLOW_SETTING:
- if self.serial.xonxoff:
- self.rfc2217_send_subnegotiation(SERVER_SET_CONTROL, SET_CONTROL_USE_SW_FLOW_CONTROL)
- elif self.serial.rtscts:
- self.rfc2217_send_subnegotiation(SERVER_SET_CONTROL, SET_CONTROL_USE_HW_FLOW_CONTROL)
- else:
- self.rfc2217_send_subnegotiation(SERVER_SET_CONTROL, SET_CONTROL_USE_NO_FLOW_CONTROL)
- elif suboption[2:3] == SET_CONTROL_USE_NO_FLOW_CONTROL:
- self.serial.xonxoff = False
- self.serial.rtscts = False
- if self.logger:
- self.logger.info("changed flow control to None")
- self.rfc2217_send_subnegotiation(SERVER_SET_CONTROL, SET_CONTROL_USE_NO_FLOW_CONTROL)
- elif suboption[2:3] == SET_CONTROL_USE_SW_FLOW_CONTROL:
- self.serial.xonxoff = True
- if self.logger:
- self.logger.info("changed flow control to XON/XOFF")
- self.rfc2217_send_subnegotiation(SERVER_SET_CONTROL, SET_CONTROL_USE_SW_FLOW_CONTROL)
- elif suboption[2:3] == SET_CONTROL_USE_HW_FLOW_CONTROL:
- self.serial.rtscts = True
- if self.logger:
- self.logger.info("changed flow control to RTS/CTS")
- self.rfc2217_send_subnegotiation(SERVER_SET_CONTROL, SET_CONTROL_USE_HW_FLOW_CONTROL)
- elif suboption[2:3] == SET_CONTROL_REQ_BREAK_STATE:
- if self.logger:
- self.logger.warning("requested break state - not implemented")
- pass # XXX needs cached value
- elif suboption[2:3] == SET_CONTROL_BREAK_ON:
- self.serial.break_condition = True
- if self.logger:
- self.logger.info("changed BREAK to active")
- self.rfc2217_send_subnegotiation(SERVER_SET_CONTROL, SET_CONTROL_BREAK_ON)
- elif suboption[2:3] == SET_CONTROL_BREAK_OFF:
- self.serial.break_condition = False
- if self.logger:
- self.logger.info("changed BREAK to inactive")
- self.rfc2217_send_subnegotiation(SERVER_SET_CONTROL, SET_CONTROL_BREAK_OFF)
- elif suboption[2:3] == SET_CONTROL_REQ_DTR:
- if self.logger:
- self.logger.warning("requested DTR state - not implemented")
- pass # XXX needs cached value
- elif suboption[2:3] == SET_CONTROL_DTR_ON:
- self.serial.dtr = True
- if self.logger:
- self.logger.info("changed DTR to active")
- self.rfc2217_send_subnegotiation(SERVER_SET_CONTROL, SET_CONTROL_DTR_ON)
- elif suboption[2:3] == SET_CONTROL_DTR_OFF:
- self.serial.dtr = False
- if self.logger:
- self.logger.info("changed DTR to inactive")
- self.rfc2217_send_subnegotiation(SERVER_SET_CONTROL, SET_CONTROL_DTR_OFF)
- elif suboption[2:3] == SET_CONTROL_REQ_RTS:
- if self.logger:
- self.logger.warning("requested RTS state - not implemented")
- pass # XXX needs cached value
- #~ self.rfc2217_send_subnegotiation(SERVER_SET_CONTROL, SET_CONTROL_RTS_ON)
- elif suboption[2:3] == SET_CONTROL_RTS_ON:
- self.serial.rts = True
- if self.logger:
- self.logger.info("changed RTS to active")
- self.rfc2217_send_subnegotiation(SERVER_SET_CONTROL, SET_CONTROL_RTS_ON)
- elif suboption[2:3] == SET_CONTROL_RTS_OFF:
- self.serial.rts = False
- if self.logger:
- self.logger.info("changed RTS to inactive")
- self.rfc2217_send_subnegotiation(SERVER_SET_CONTROL, SET_CONTROL_RTS_OFF)
- #~ elif suboption[2:3] == SET_CONTROL_REQ_FLOW_SETTING_IN:
- #~ elif suboption[2:3] == SET_CONTROL_USE_NO_FLOW_CONTROL_IN:
- #~ elif suboption[2:3] == SET_CONTROL_USE_SW_FLOW_CONTOL_IN:
- #~ elif suboption[2:3] == SET_CONTROL_USE_HW_FLOW_CONTOL_IN:
- #~ elif suboption[2:3] == SET_CONTROL_USE_DCD_FLOW_CONTROL:
- #~ elif suboption[2:3] == SET_CONTROL_USE_DTR_FLOW_CONTROL:
- #~ elif suboption[2:3] == SET_CONTROL_USE_DSR_FLOW_CONTROL:
- elif suboption[1:2] == NOTIFY_LINESTATE:
- # client polls for current state
- self.rfc2217_send_subnegotiation(
- SERVER_NOTIFY_LINESTATE,
- to_bytes([0])) # sorry, nothing like that implemented
- elif suboption[1:2] == NOTIFY_MODEMSTATE:
- if self.logger:
- self.logger.info("request for modem state")
- # client polls for current state
- self.check_modem_lines(force_notification=True)
- elif suboption[1:2] == FLOWCONTROL_SUSPEND:
- if self.logger:
- self.logger.info("suspend")
- self._remote_suspend_flow = True
- elif suboption[1:2] == FLOWCONTROL_RESUME:
- if self.logger:
- self.logger.info("resume")
- self._remote_suspend_flow = False
- elif suboption[1:2] == SET_LINESTATE_MASK:
- self.linstate_mask = ord(suboption[2:3]) # ensure it is a number
- if self.logger:
- self.logger.info("line state mask: 0x{:02x}".format(self.linstate_mask))
- elif suboption[1:2] == SET_MODEMSTATE_MASK:
- self.modemstate_mask = ord(suboption[2:3]) # ensure it is a number
- if self.logger:
- self.logger.info("modem state mask: 0x{:02x}".format(self.modemstate_mask))
- elif suboption[1:2] == PURGE_DATA:
- if suboption[2:3] == PURGE_RECEIVE_BUFFER:
- self.serial.reset_input_buffer()
- if self.logger:
- self.logger.info("purge in")
- self.rfc2217_send_subnegotiation(SERVER_PURGE_DATA, PURGE_RECEIVE_BUFFER)
- elif suboption[2:3] == PURGE_TRANSMIT_BUFFER:
- self.serial.reset_output_buffer()
- if self.logger:
- self.logger.info("purge out")
- self.rfc2217_send_subnegotiation(SERVER_PURGE_DATA, PURGE_TRANSMIT_BUFFER)
- elif suboption[2:3] == PURGE_BOTH_BUFFERS:
- self.serial.reset_input_buffer()
- self.serial.reset_output_buffer()
- if self.logger:
- self.logger.info("purge both")
- self.rfc2217_send_subnegotiation(SERVER_PURGE_DATA, PURGE_BOTH_BUFFERS)
- else:
- if self.logger:
- self.logger.error("undefined PURGE_DATA: {!r}".format(list(suboption[2:])))
- else:
- if self.logger:
- self.logger.error("undefined COM_PORT_OPTION: {!r}".format(list(suboption[1:])))
- else:
- if self.logger:
- self.logger.warning("unknown subnegotiation: {!r}".format(suboption))
- # simple client test
- if __name__ == '__main__':
- import sys
- s = Serial('rfc2217://localhost:7000', 115200)
- sys.stdout.write('{}\n'.format(s))
- sys.stdout.write("write...\n")
- s.write(b"hello\n")
- s.flush()
- sys.stdout.write("read: {}\n".format(s.read(5)))
- s.close()
|