APRS Cursor-on-Target Gateway.
Project description
aprscot receives APRS Frames from APRS-IS and outputs them in Cursor-on-Target XML Formatted events, for use with CoT systems such as ATAK, WinTAK, RaptorX, Falconview, etc. See https://www.civtak.org/ for more information on the TAK program.
Currently supports APRS-IS and Location-type APRS messages, and sending to UDP CoT Hosts.
Installation
The command-line daemon aprscot can be install from this source tree (A), or from the Python Package Index (PyPI) (B).
To install from this source tree:
$ git checkout https://github.com/ampledata/aprscot.git $ cd aprscot/ $ python setup.py install
To install from PyPI:
$ pip install aprscot
Usage
The aprscot daemon has several runtime arguments:
$ aprscot --help
usage: aprscot [-h] -c CALLSIGN -p PASSCODE -C COT_HOST [-f FILTER]
optional arguments:
-h, --help show this help message and exit
-c CALLSIGN, --callsign CALLSIGN
APRS-IS Login Callsign
-p PASSCODE, --passcode PASSCODE
APRS-IS Passcode
-C COT_HOST, --cot_host COT_HOST[:PORT]
Cursor-on-Target Host or Host:Port
-f FILTER, --filter FILTER
APRS-IS Filter, see: http://www.aprs-is.net/javAPRSFilter.aspx
For minimum operation, -c CALLSIGN & -C COT_HOST are required.
The following example forwards all APRS Frames within 50 meters of W2GMD-9’s last known location to the Cursor-on-Target host at 10.1.2.3 port 4242 (UDP):
aprscot -c W2GMD-9 -C 10.1.2.3:4242 -f m/50
Example Cursor-on-Target Event
The aprscot daemon will output CoT XML Events similar to this example:
<?xml version="1.0" encoding="UTF-8" standalone="yes" ?>
<event version="1.0" type="a-f-G-E-V-C" uid="APRS.W2GMD-1"
time="2020-09-24T14:53:28.945221Z" start="2020-09-24T14:53:28.945221Z"
stale="2020-09-24T15:53:28.945221Z" how="h-e">
<point lat="38.51167" lon="-122.99883" hae="10" ce="10" le="10" />
</event>
Build Status
Master:
Develop:
Source
Copyright
Copyright 2020 Greg Albrecht
Automatic Packet Reporting System (APRS) is Copyright Bob Bruninga WB4APR wb4apr@amsat.org
License
Apache License, Version 2.0. See LICENSE for details.
Debugging Cursor-on-Target
The publicly available ATAK source was a good reference for some of the parsing errors the ATAK-Civ Development Build was giving me, namely Invalid CoT message received: Missing or invalid CoT event and/or point attributes. Many errors are unfortunately caught in a single try/catch block:
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
File details
Details for the file aprscot-2.0.0.tar.gz.
File metadata
- Download URL: aprscot-2.0.0.tar.gz
- Upload date:
- Size: 5.9 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: Python-urllib/3.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
e55985eb3d36515af97f0139747e1d60d3e502d57c3a912cf7411d0e8a86965d
|
|
| MD5 |
61bbe74880f623c5a43487dcee652b5b
|
|
| BLAKE2b-256 |
1e7bfe2e60ce855fc2b5c354154056ea2d9f03b6a55ddd58aa387cc5d5368bad
|