mirror of
https://github.com/markqvist/LXMF.git
synced 2024-12-26 23:59:34 -05:00
63 lines
2.5 KiB
Python
63 lines
2.5 KiB
Python
import RNS
|
|
import LXMF
|
|
import time
|
|
|
|
required_stamp_cost = 8
|
|
enforce_stamps = False
|
|
|
|
def delivery_callback(message):
|
|
time_string = time.strftime("%Y-%m-%d %H:%M:%S", time.localtime(message.timestamp))
|
|
signature_string = "Signature is invalid, reason undetermined"
|
|
if message.signature_validated:
|
|
signature_string = "Validated"
|
|
else:
|
|
if message.unverified_reason == LXMF.LXMessage.SIGNATURE_INVALID:
|
|
signature_string = "Invalid signature"
|
|
if message.unverified_reason == LXMF.LXMessage.SOURCE_UNKNOWN:
|
|
signature_string = "Cannot verify, source is unknown"
|
|
|
|
if message.stamp_valid:
|
|
stamp_string = "Validated"
|
|
else:
|
|
stamp_string = "Invalid"
|
|
|
|
RNS.log("\t+--- LXMF Delivery ---------------------------------------------")
|
|
RNS.log("\t| Source hash : "+RNS.prettyhexrep(message.source_hash))
|
|
RNS.log("\t| Source instance : "+str(message.get_source()))
|
|
RNS.log("\t| Destination hash : "+RNS.prettyhexrep(message.destination_hash))
|
|
RNS.log("\t| Destination instance : "+str(message.get_destination()))
|
|
RNS.log("\t| Transport Encryption : "+str(message.transport_encryption))
|
|
RNS.log("\t| Timestamp : "+time_string)
|
|
RNS.log("\t| Title : "+message.title_as_string())
|
|
RNS.log("\t| Content : "+message.content_as_string())
|
|
RNS.log("\t| Fields : "+str(message.fields))
|
|
RNS.log("\t| Message signature : "+signature_string)
|
|
RNS.log("\t| Stamp : "+stamp_string)
|
|
RNS.log("\t+---------------------------------------------------------------")
|
|
|
|
r = RNS.Reticulum()
|
|
|
|
router = LXMF.LXMRouter(storagepath="./tmp1", enforce_stamps=enforce_stamps)
|
|
identity = RNS.Identity()
|
|
my_lxmf_destination = router.register_delivery_identity(identity, stamp_cost=required_stamp_cost)
|
|
router.register_delivery_callback(delivery_callback)
|
|
|
|
RNS.log("Ready to receive on: "+RNS.prettyhexrep(my_lxmf_destination.hash))
|
|
|
|
|
|
# You can set a propagation node address to test receiving
|
|
# messages from a propagation node, instead of directly
|
|
|
|
# router.set_outbound_propagation_node(bytes.fromhex("e75d9b6a69f82b48b6077cf2242d7499"))
|
|
|
|
|
|
# This loop allows you to execute various actions for testing
|
|
# and experimenting with the example scripts.
|
|
while True:
|
|
input()
|
|
RNS.log("Announcing lxmf.delivery destination...")
|
|
router.announce(my_lxmf_destination.hash)
|
|
|
|
# input()
|
|
# RNS.log("Requesting messages from propagation node...")
|
|
# router.request_messages_from_propagation_node(identity) |