pyztk/zk/base.py

492 lines
16 KiB
Python
Raw Normal View History

2016-05-23 13:50:54 +07:00
# -*- coding: utf-8 -*-
2016-06-12 15:46:20 +07:00
from datetime import datetime
2016-05-23 13:50:54 +07:00
from struct import pack, unpack
from socket import socket, AF_INET, SOCK_DGRAM
from zk import const
2016-06-10 15:35:55 +07:00
from zk.exception import ZKErrorResponse, ZKNetworkError
2016-06-12 16:35:02 +07:00
from zk.attendance import Attendance
2016-05-25 16:28:55 +07:00
from zk.user import User
2016-05-23 13:50:54 +07:00
class ZK(object):
2016-05-26 12:45:28 +07:00
is_connect = False
2016-05-23 13:50:54 +07:00
2016-05-29 20:27:01 +07:00
__data_recv = None
__sesion_id = 0
__reply_id = 0
2016-05-26 12:45:28 +07:00
def __init__(self, ip, port=4370, timeout=60):
2016-05-23 13:50:54 +07:00
self.__address = (ip, port)
self.__sock = socket(AF_INET, SOCK_DGRAM)
self.__sock.settimeout(timeout)
2016-05-29 20:27:01 +07:00
def __create_header(self, command, command_string, checksum, session_id, reply_id):
2016-05-23 13:50:54 +07:00
'''
Puts a the parts that make up a packet together and packs them into a byte string
'''
2016-05-23 23:59:43 +07:00
buf = pack('HHHH', command, checksum, session_id, reply_id) + command_string
2016-05-23 13:50:54 +07:00
buf = unpack('8B'+'%sB' % len(command_string), buf)
2016-05-23 23:59:43 +07:00
checksum = unpack('H', self.__create_checksum(buf))[0]
2016-05-23 13:50:54 +07:00
reply_id += 1
if reply_id >= const.USHRT_MAX:
reply_id -= const.USHRT_MAX
2016-05-23 23:59:43 +07:00
buf = pack('HHHH', command, checksum, session_id, reply_id)
2016-05-23 13:50:54 +07:00
return buf + command_string
def __create_checksum(self, p):
'''
2016-05-23 23:59:43 +07:00
Calculates the checksum of the packet to be sent to the time clock
2016-05-23 13:50:54 +07:00
Copied from zkemsdk.c
'''
l = len(p)
2016-05-23 23:59:43 +07:00
checksum = 0
2016-05-23 13:50:54 +07:00
while l > 1:
2016-05-23 23:59:43 +07:00
checksum += unpack('H', pack('BB', p[0], p[1]))[0]
2016-05-23 13:50:54 +07:00
p = p[2:]
2016-05-23 23:59:43 +07:00
if checksum > const.USHRT_MAX:
checksum -= const.USHRT_MAX
2016-05-23 13:50:54 +07:00
l -= 2
if l:
2016-05-23 23:59:43 +07:00
checksum = checksum + p[-1]
2016-05-23 13:50:54 +07:00
2016-05-23 23:59:43 +07:00
while checksum > const.USHRT_MAX:
checksum -= const.USHRT_MAX
2016-05-23 13:50:54 +07:00
2016-05-23 23:59:43 +07:00
checksum = ~checksum
2016-05-23 13:50:54 +07:00
2016-05-23 23:59:43 +07:00
while checksum < 0:
checksum += const.USHRT_MAX
2016-05-23 13:50:54 +07:00
2016-05-23 23:59:43 +07:00
return pack('H', checksum)
2016-05-29 20:27:01 +07:00
def __send_command(self, command, command_string, checksum, session_id, reply_id, response_size):
buf = self.__create_header(command, command_string, checksum, session_id, reply_id)
2016-06-10 15:35:55 +07:00
try:
self.__sock.sendto(buf, self.__address)
self.__data_recv = self.__sock.recv(response_size)
except Exception, e:
raise ZKNetworkError(str(e))
2016-05-29 20:27:01 +07:00
self.__response = unpack('HHHH', self.__data_recv[:8])[0]
self.__reply_id = unpack('HHHH', self.__data_recv[:8])[3]
if self.__response in [const.CMD_ACK_OK, const.CMD_PREPARE_DATA]:
return {
'status': True,
'code': self.__response
}
else:
2016-05-23 23:59:43 +07:00
return {
'status': False,
2016-05-29 20:27:01 +07:00
'code': self.__response
2016-05-23 23:59:43 +07:00
}
2016-05-23 13:50:54 +07:00
2016-05-27 10:01:00 +07:00
def __get_data_size(self):
"""Checks a returned packet to see if it returned CMD_PREPARE_DATA,
indicating that data packets are to be sent
Returns the amount of bytes that are going to be sent"""
response = self.__response
if response == const.CMD_PREPARE_DATA:
size = unpack('I', self.__data_recv[8:12])[0]
return size
else:
return 0
2016-06-12 15:46:20 +07:00
def __reverse_hex(self, hex):
data = ''
for i in reversed( xrange( len(hex)/2 ) ):
data += hex[i*2:(i*2)+2]
return data
def __decode_time(self, t):
"""Decode a timestamp retrieved from the timeclock
copied from zkemsdk.c - DecodeTime"""
t = t.encode('hex')
t = int(self.__reverse_hex(t), 16)
second = t % 60
t = t / 60
minute = t % 60
t = t / 60
hour = t % 24
t = t / 24
day = t % 31+1
t = t / 31
month = t % 12+1
t = t / 12
year = t + 2000
d = datetime(year, month, day, hour, minute, second)
return d
2016-05-23 13:50:54 +07:00
def connect(self):
'''
connect to device
'''
command = const.CMD_CONNECT
2016-05-29 20:27:01 +07:00
command_string = ''
checksum = 0
session_id = 0
reply_id = const.USHRT_MAX - 1
response_size = 8
cmd_response = self.__send_command(command, command_string, checksum, session_id, reply_id, response_size)
2016-05-23 23:59:43 +07:00
if cmd_response.get('status'):
2016-05-26 12:45:28 +07:00
self.is_connect = True
2016-05-29 20:27:01 +07:00
# set the session id
self.__sesion_id = unpack('HHHH', self.__data_recv[:8])[2]
return True
2016-05-23 23:59:43 +07:00
else:
2016-06-10 15:35:55 +07:00
raise ZKErrorResponse("Invalid response")
2016-05-23 13:50:54 +07:00
def disconnect(self):
'''
diconnect from connected device
'''
command = const.CMD_EXIT
2016-05-29 20:27:01 +07:00
command_string = ''
checksum = 0
session_id = self.__sesion_id
reply_id = self.__reply_id
response_size = 8
cmd_response = self.__send_command(command, command_string, checksum, session_id, reply_id, response_size)
2016-05-23 23:59:43 +07:00
if cmd_response.get('status'):
2016-05-29 20:27:01 +07:00
return True
2016-05-23 23:59:43 +07:00
else:
2016-06-10 15:35:55 +07:00
raise ZKErrorResponse("Invalid response")
2016-05-23 13:55:09 +07:00
2016-05-29 20:27:01 +07:00
def disable_device(self):
2016-05-27 08:54:17 +07:00
'''
2016-05-29 20:27:01 +07:00
disable (lock) connected device, make sure no activity when process run
2016-05-27 08:54:17 +07:00
'''
2016-05-30 09:47:58 +07:00
2016-05-29 20:27:01 +07:00
command = const.CMD_DISABLEDEVICE
command_string = ''
checksum = 0
session_id = self.__sesion_id
reply_id = self.__reply_id
response_size = 8
cmd_response = self.__send_command(command, command_string, checksum, session_id, reply_id, response_size)
2016-05-23 23:59:43 +07:00
if cmd_response.get('status'):
2016-05-29 20:27:01 +07:00
return True
2016-05-23 23:59:43 +07:00
else:
2016-06-10 15:35:55 +07:00
raise ZKErrorResponse("Invalid response")
2016-05-23 14:41:39 +07:00
2016-05-29 20:27:01 +07:00
def enable_device(self):
2016-05-23 13:55:09 +07:00
'''
2016-05-29 20:27:01 +07:00
re-enable connected device
2016-05-23 13:55:09 +07:00
'''
2016-05-30 09:47:58 +07:00
2016-05-29 20:27:01 +07:00
command = const.CMD_ENABLEDEVICE
command_string = ''
checksum = 0
session_id = self.__sesion_id
reply_id = self.__reply_id
response_size = 8
2016-05-23 13:55:09 +07:00
2016-05-29 20:27:01 +07:00
cmd_response = self.__send_command(command, command_string, checksum, session_id, reply_id, response_size)
2016-05-23 23:59:43 +07:00
if cmd_response.get('status'):
2016-05-29 20:27:01 +07:00
return True
2016-05-23 23:59:43 +07:00
else:
2016-06-10 15:35:55 +07:00
raise ZKErrorResponse("Invalid response")
2016-05-23 13:55:09 +07:00
2016-05-29 20:27:01 +07:00
def get_firmware_version(self):
2016-05-23 13:55:09 +07:00
'''
2016-05-29 20:27:01 +07:00
get firmware version name
2016-05-23 13:55:09 +07:00
'''
2016-05-30 09:47:58 +07:00
2016-05-29 20:27:01 +07:00
command = const.CMD_GET_VERSION
command_string = ''
checksum = 0
session_id = self.__sesion_id
reply_id = self.__reply_id
response_size = 1024
2016-05-23 13:55:09 +07:00
2016-05-29 20:27:01 +07:00
cmd_response = self.__send_command(command, command_string, checksum, session_id, reply_id, response_size)
2016-05-23 23:59:43 +07:00
if cmd_response.get('status'):
2016-05-29 20:27:01 +07:00
firmware_version = self.__data_recv[8:].strip('\x00|\x01\x10x')
return firmware_version
2016-05-23 23:59:43 +07:00
else:
2016-06-10 15:35:55 +07:00
raise ZKErrorResponse("Invalid response")
2016-05-23 21:00:43 +07:00
2016-06-09 11:20:39 +07:00
def get_serialnumber(self):
2016-06-10 11:27:49 +07:00
command = const.CMD_OPTIONS_RRQ
2016-06-09 11:20:39 +07:00
command_string = '~SerialNumber'
checksum = 0
session_id = self.__sesion_id
reply_id = self.__reply_id
response_size = 1024
cmd_response = self.__send_command(command, command_string, checksum, session_id, reply_id, response_size)
if cmd_response.get('status'):
2016-06-09 13:37:19 +07:00
serialnumber = self.__data_recv[8:].split('=')[-1].strip('\x00|\x01\x10x')
return serialnumber
2016-06-09 11:20:39 +07:00
else:
2016-06-10 15:35:55 +07:00
raise ZKErrorResponse("Invalid response")
2016-06-09 11:20:39 +07:00
2016-05-29 20:27:01 +07:00
def restart(self):
2016-05-27 08:54:17 +07:00
'''
2016-05-29 20:27:01 +07:00
restart connected device
2016-05-27 08:54:17 +07:00
'''
2016-05-29 20:27:01 +07:00
command = const.CMD_RESTART
command_string = ''
checksum = 0
session_id = self.__sesion_id
reply_id = self.__reply_id
response_size = 8
cmd_response = self.__send_command(command, command_string, checksum, session_id, reply_id, response_size)
2016-05-24 21:49:04 +07:00
if cmd_response.get('status'):
2016-05-29 20:27:01 +07:00
return True
2016-05-24 21:49:04 +07:00
else:
2016-06-10 15:35:55 +07:00
raise ZKErrorResponse("Invalid response")
2016-05-24 21:49:04 +07:00
2016-06-10 14:16:22 +07:00
def poweroff(self):
2016-05-27 08:54:17 +07:00
'''
2016-05-29 20:27:01 +07:00
shutdown connected device
2016-05-27 08:54:17 +07:00
'''
2016-05-29 20:27:01 +07:00
command = const.CMD_POWEROFF
command_string = ''
checksum = 0
session_id = self.__sesion_id
reply_id = self.__reply_id
response_size = 8
cmd_response = self.__send_command(command, command_string, checksum, session_id, reply_id, response_size)
2016-05-24 21:49:04 +07:00
if cmd_response.get('status'):
2016-05-29 20:27:01 +07:00
return True
2016-05-24 21:49:04 +07:00
else:
2016-06-10 15:35:55 +07:00
raise ZKErrorResponse("Invalid response")
2016-05-24 21:49:04 +07:00
2016-05-24 21:52:42 +07:00
def test_voice(self):
2016-05-27 08:54:17 +07:00
'''
play test voice
'''
2016-05-30 09:47:58 +07:00
2016-05-24 21:52:42 +07:00
command = const.CMD_TESTVOICE
2016-05-29 20:27:01 +07:00
command_string = ''
checksum = 0
session_id = self.__sesion_id
reply_id = self.__reply_id
response_size = 8
cmd_response = self.__send_command(command, command_string, checksum, session_id, reply_id, response_size)
2016-05-24 21:52:42 +07:00
if cmd_response.get('status'):
2016-05-29 20:27:01 +07:00
return True
2016-05-24 21:52:42 +07:00
else:
2016-06-10 15:35:55 +07:00
raise ZKErrorResponse("Invalid response")
2016-05-24 21:52:42 +07:00
2016-05-25 12:27:13 +07:00
def set_user(self, uid, name, privilege, password='', group_id='', user_id=''):
2016-05-27 08:54:17 +07:00
'''
create or update user by uid
'''
2016-05-30 09:47:58 +07:00
2016-05-25 01:32:06 +07:00
command = const.CMD_USER_WRQ
2016-05-25 12:02:56 +07:00
uid = chr(uid % 256) + chr(uid >> 8)
if privilege not in [const.USER_DEFAULT, const.USER_ADMIN]:
privilege = const.USER_DEFAULT
privilege = chr(privilege)
command_string = pack('2sc8s28sc7sx24s', uid, privilege, password, name, chr(0), group_id, user_id)
2016-05-29 20:27:01 +07:00
checksum = 0
session_id = self.__sesion_id
reply_id = self.__reply_id
response_size = 1024
cmd_response = self.__send_command(command, command_string, checksum, session_id, reply_id, response_size)
2016-05-25 01:32:06 +07:00
if cmd_response.get('status'):
2016-05-29 20:27:01 +07:00
return True
2016-05-25 01:32:06 +07:00
else:
2016-06-10 15:35:55 +07:00
raise ZKErrorResponse("Invalid response")
2016-06-11 13:58:49 +07:00
def delete_user(self, uid):
command = const.CMD_DELETE_USER
uid = chr(uid % 256) + chr(uid >> 8)
command_string = pack('2s', uid)
checksum = 0
session_id = self.__sesion_id
reply_id = self.__reply_id
response_size = 1024
cmd_response = self.__send_command(command, command_string, checksum, session_id, reply_id, response_size)
if cmd_response.get('status'):
return True
else:
raise ZKErrorResponse("Invalid response")
2016-05-25 01:32:06 +07:00
2016-05-25 15:35:45 +07:00
def get_users(self):
2016-05-27 08:54:17 +07:00
'''
get all users
'''
2016-05-30 09:47:58 +07:00
2016-05-25 15:35:45 +07:00
command = const.CMD_USERTEMP_RRQ
2016-05-29 20:27:01 +07:00
command_string = ''
checksum = 0
session_id = self.__sesion_id
reply_id = self.__reply_id
response_size = 1024
cmd_response = self.__send_command(command, command_string, checksum, session_id, reply_id, response_size)
users = []
if cmd_response.get('status'):
if cmd_response.get('code') == const.CMD_PREPARE_DATA:
bytes = self.__get_data_size()
userdata = []
while bytes > 0:
2016-05-25 15:35:45 +07:00
data_recv = self.__sock.recv(1032)
userdata.append(data_recv)
bytes -= 1024
2016-05-25 16:28:55 +07:00
data_recv = self.__sock.recv(8)
response = unpack('HHHH', data_recv[:8])[0]
if response == const.CMD_ACK_OK:
2016-05-29 20:27:01 +07:00
if userdata:
2016-05-25 17:38:59 +07:00
# The first 4 bytes don't seem to be related to the user
for x in xrange(len(userdata)):
if x > 0:
userdata[x] = userdata[x][8:]
userdata = ''.join(userdata)
userdata = userdata[11:]
while len(userdata) >= 72:
uid, privilege, password, name, sparator, group_id, user_id = unpack( '2s2s8s28sc7sx23s', userdata.ljust(72)[:72])
2016-06-12 15:46:20 +07:00
u1 = int(uid[0].encode("hex"), 16)
u2 = int(uid[1].encode("hex"), 16)
2016-05-25 16:28:55 +07:00
2016-05-25 17:38:59 +07:00
uid = u2 + (u1*256)
2016-05-25 16:28:55 +07:00
name = unicode(name.strip('\x00|\x01\x10x'), errors='ignore')
privilege = int(privilege.encode("hex"), 16)
password = unicode(password.strip('\x00|\x01\x10x'), errors='ignore')
group_id = unicode(group_id.strip('\x00|\x01\x10x'), errors='ignore')
user_id = unicode(user_id.strip('\x00|\x01\x10x'), errors='ignore')
user = User(uid, name, privilege, password, group_id, user_id)
users.append(user)
2016-05-25 17:38:59 +07:00
userdata = userdata[72:]
2016-05-25 16:28:55 +07:00
else:
2016-06-10 15:35:55 +07:00
raise ZKErrorResponse("Invalid response")
2016-05-29 20:27:01 +07:00
return users
2016-05-25 21:35:50 +07:00
2016-05-26 12:45:28 +07:00
def cancel_capture(self):
2016-05-27 08:54:17 +07:00
'''
cancel capturing finger
'''
2016-05-30 09:47:58 +07:00
2016-05-26 12:45:28 +07:00
command = const.CMD_CANCELCAPTURE
cmd_response = self.__send_command(command=command)
print cmd_response
def verify_user(self):
2016-05-27 08:54:17 +07:00
'''
verify finger
'''
2016-05-30 09:47:58 +07:00
2016-05-26 12:45:28 +07:00
command = const.CMD_STARTVERIFY
# uid = chr(uid % 256) + chr(uid >> 8)
cmd_response = self.__send_command(command=command)
print cmd_response
def enroll_user(self, uid):
2016-05-27 08:54:17 +07:00
'''
start enroll user
'''
2016-05-30 09:47:58 +07:00
2016-05-26 12:45:28 +07:00
command = const.CMD_STARTENROLL
uid = chr(uid % 256) + chr(uid >> 8)
command_string = pack('2s', uid)
cmd_response = self.__send_command(command=command, command_string=command_string)
print cmd_response
2016-06-10 11:27:49 +07:00
def clear_data(self):
2016-05-25 21:35:50 +07:00
'''
2016-06-10 11:27:49 +07:00
clear all data (include: user, attendance report, finger database )
2016-05-25 21:35:50 +07:00
'''
2016-06-10 11:27:49 +07:00
command = const.CMD_CLEAR_DATA
command_string = ''
checksum = 0
session_id = self.__sesion_id
reply_id = self.__reply_id
response_size = 1024
2016-05-30 09:47:58 +07:00
2016-06-10 11:27:49 +07:00
cmd_response = self.__send_command(command, command_string, checksum, session_id, reply_id, response_size)
if cmd_response.get('status'):
serialnumber = self.__data_recv[8:].split('=')[-1].strip('\x00|\x01\x10x')
return serialnumber
else:
2016-06-10 15:35:55 +07:00
raise ZKErrorResponse("Invalid response")
2016-05-25 21:35:50 +07:00
def get_attendance(self):
2016-06-12 15:46:20 +07:00
command = const.CMD_ATTLOG_RRQ
command_string = ''
checksum = 0
session_id = self.__sesion_id
reply_id = self.__reply_id
response_size = 1024
cmd_response = self.__send_command(command, command_string, checksum, session_id, reply_id, response_size)
attendances = []
if cmd_response.get('status'):
if cmd_response.get('code') == const.CMD_PREPARE_DATA:
bytes = self.__get_data_size()
attendance_data = []
while bytes > 0:
data_recv = self.__sock.recv(1032)
attendance_data.append(data_recv)
bytes -= 1024
data_recv = self.__sock.recv(8)
response = unpack('HHHH', data_recv[:8])[0]
if response == const.CMD_ACK_OK:
if attendance_data:
# The first 4 bytes don't seem to be related to the user
for x in xrange(len(attendance_data)):
if x > 0:
attendance_data[x] = attendance_data[x][8:]
attendance_data = ''.join(attendance_data)
attendance_data = attendance_data[14:]
while len(attendance_data) >= 38:
2016-06-12 16:35:02 +07:00
user_id, sparator, timestamp, status, space = unpack( '24sc4sc10s', attendance_data.ljust(40)[:40])
user_id = user_id.strip('\x00|\x01\x10x')
2016-06-12 15:46:20 +07:00
timestamp = self.__decode_time(timestamp)
status = int(status.encode("hex"), 16)
2016-06-12 16:35:02 +07:00
attendance = Attendance(user_id, timestamp, status)
attendances.append(attendance)
2016-06-12 15:46:20 +07:00
attendance_data = attendance_data[40:]
else:
raise ZKErrorResponse("Invalid response")
return attendances
2016-05-30 09:47:58 +07:00
2016-05-25 21:35:50 +07:00
def clear_attendance(self):
'''
Not implemented yet
'''
2016-05-30 09:47:58 +07:00
2016-05-25 21:35:50 +07:00
pass