1
0
mirror of https://gitea.farpn.net/w1cdn/mwtchahrd.git synced 2025-11-24 22:56:35 -06:00

Merge pull request 'Filter out callsign-SSID combinations' (#32) from filter into dev

Reviewed-on: https://gitea.farpn.net/w1cdn/mwtchahrd/pulls/32
This commit is contained in:
w1cdn
2025-11-19 01:01:32 +00:00
3 changed files with 44 additions and 39 deletions

View File

@@ -1,11 +0,0 @@
[target.aarch64-unknown-linux-gnu]
image = "ghcr.io/cross-rs/aarch64-unknown-linux-gnu:edge@sha256:168fa652629cedcd9549e85258be8f83fa008625b187c004d6ea439cf16f6a41"
[target.x86_64-unknown-linux-gnu]
image = "ghcr.io/cross-rs/x86_64-unknown-linux-gnu:edge@sha256:3542b427c3f7d0d2976d7add025c5ba997499411f408b3b26803ccc70fc431da"
[target.armv7-unknown-linux-gnueabihf]
image = "ghcr.io/cross-rs/armv7-unknown-linux-gnueabihf:edge@sha256:3e1def581eb9c9f11cfff85745802f2de5cf9cdeeb5a8495048f393a0993b99b"
[target.arm-unknown-linux-gnueabihf]
image = "ghcr.io/cross-rs/arm-unknown-linux-gnueabihf:edge@sha256:28e7aaae8301506f4f1b3394c8bc23f958d1717043e06f816045e7b8df57e173"

View File

@@ -75,6 +75,15 @@ mwtchahrd -i <IP> -p <PORT> [-c <CHANNEL>] [-d] [-u]
- `-f, --freq <FREQ>`
Spotting frequency [default: 14105000].
- `-y, --my-lat <MY_LAT>`
Spotter latitude, DD.dddd.
- `-x, --my-lon <MY_LON>`
Spotter longitude, DD.dddd.
- `-t, --filter <CALL-SSID,CALL-SSID,...>`
Filter out spots from these callsign-UUID combinations (self spots, for example), comma-separated. This is not regex, just full matches.
- `-h, --help`
Print help.
@@ -109,10 +118,10 @@ mwtchahrd -i 127.0.0.1 -p 8000 -u
### Spotting to [Spothole.app](https://spothole.app) API
Sends only UI frames and mode is hardcoded as `PKT`. Spot from callsign `W1CDN` and report fixed frequency 14.105 MHz:
Sends only UI frames and mode is hardcoded as `PKT`. Spot from callsign `W1CDN` and report fixed frequency 14.105 MHz. Report your location as spotter and don't spot your own beacons.
```bash
mwtchahrd --ip 192.168.0.6 --port 8000 --spotter W1CDN --spothole --freq 14105000
mwtchahrd --ip 192.168.0.6 --port 8000 --spotter W1CDN --spothole --freq 14105000 --my-lat 47.01 --my-lon -97.01 --filter W1CDN-1,W1CDN-7
```
## Code Overview

View File

@@ -83,10 +83,14 @@ struct Cli {
#[arg(short = 'y', long, allow_negative_numbers = true)]
my_lat: Option<f64>,
/// Spotter longitude DD.dddd; to send negaitve (W or S), use = e.g. --my-lon=-97.1
/// Spotter longitude DD.dddd
#[arg(short = 'x', long, allow_negative_numbers = true)]
my_lon: Option<f64>,
/// Filter out spots from these callsign-UUID combinations (self spots, for example), comma-separated
#[arg(short = 't', long, value_delimiter = ',', num_args = 1..,)]
filter: Vec<String>,
}
/// Convert a byte slice into a hex-dump string for debugging purposes.
@@ -484,8 +488,8 @@ fn handle_frame(frame: &AgwFrame, cli: &Cli, buffers: &mut BufferManager, loc_st
//println!("Stored location: {} {}", stored_loc[0].clone(), stored_loc[1].clone());
// If Spothole is enabled
if summary == "UI" && cli.spothole {
// If Spothole is enabled and this is a UI frame and the source is not filtered
if summary == "UI" && cli.spothole && !cli.filter.contains(&source){
// POST JSON
let packet = json!({
"dx_call": &source_call,
@@ -508,6 +512,9 @@ fn handle_frame(frame: &AgwFrame, cli: &Cli, buffers: &mut BufferManager, loc_st
.send();
println!("sent to {} = {}", spothole_url, packet);
println!("res = {res:?}");
// If it's filtered, send a note about that
} else if summary == "UI" && cli.spothole && cli.filter.contains(&source) {
println!("Filter {:?} applied, not spotted", cli.filter)
}
// Send UDP