Wideband autonomous SDR analysis engine forked from sdr-visual-suite
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

374 lines
14KB

  1. package main
  2. import (
  3. "context"
  4. "encoding/json"
  5. "log"
  6. "net/http"
  7. "os"
  8. "path/filepath"
  9. "strconv"
  10. "strings"
  11. "sync"
  12. "time"
  13. "sdr-wideband-suite/internal/config"
  14. "sdr-wideband-suite/internal/detector"
  15. "sdr-wideband-suite/internal/events"
  16. fftutil "sdr-wideband-suite/internal/fft"
  17. "sdr-wideband-suite/internal/pipeline"
  18. "sdr-wideband-suite/internal/recorder"
  19. "sdr-wideband-suite/internal/runtime"
  20. )
  21. func registerAPIHandlers(mux *http.ServeMux, cfgPath string, cfgManager *runtime.Manager, srcMgr *sourceManager, dspUpdates chan dspUpdate, gpuState *gpuStatus, recMgr *recorder.Manager, sigSnap *signalSnapshot, eventMu *sync.RWMutex, phaseSnap *phaseSnapshot) {
  22. mux.HandleFunc("/api/config", func(w http.ResponseWriter, r *http.Request) {
  23. w.Header().Set("Content-Type", "application/json")
  24. switch r.Method {
  25. case http.MethodGet:
  26. _ = json.NewEncoder(w).Encode(cfgManager.Snapshot())
  27. case http.MethodPost:
  28. var update runtime.ConfigUpdate
  29. if err := json.NewDecoder(r.Body).Decode(&update); err != nil {
  30. http.Error(w, "invalid json", http.StatusBadRequest)
  31. return
  32. }
  33. prev := cfgManager.Snapshot()
  34. next, err := cfgManager.ApplyConfig(update)
  35. if err != nil {
  36. http.Error(w, err.Error(), http.StatusBadRequest)
  37. return
  38. }
  39. if update.Pipeline != nil && update.Pipeline.Profile != nil {
  40. if prof, ok := pipeline.ResolveProfile(next, *update.Pipeline.Profile); ok {
  41. pipeline.MergeProfile(&next, prof)
  42. cfgManager.Replace(next)
  43. }
  44. }
  45. sourceChanged := prev.CenterHz != next.CenterHz || prev.SampleRate != next.SampleRate || prev.GainDb != next.GainDb || prev.AGC != next.AGC || prev.TunerBwKHz != next.TunerBwKHz
  46. if sourceChanged {
  47. if err := srcMgr.ApplyConfig(next); err != nil {
  48. cfgManager.Replace(prev)
  49. http.Error(w, "failed to apply source config", http.StatusInternalServerError)
  50. return
  51. }
  52. }
  53. if err := config.Save(cfgPath, next); err != nil {
  54. log.Printf("config save failed: %v", err)
  55. }
  56. detChanged := prev.Detector.ThresholdDb != next.Detector.ThresholdDb ||
  57. prev.Detector.MinDurationMs != next.Detector.MinDurationMs ||
  58. prev.Detector.HoldMs != next.Detector.HoldMs ||
  59. prev.Detector.EmaAlpha != next.Detector.EmaAlpha ||
  60. prev.Detector.HysteresisDb != next.Detector.HysteresisDb ||
  61. prev.Detector.MinStableFrames != next.Detector.MinStableFrames ||
  62. prev.Detector.GapToleranceMs != next.Detector.GapToleranceMs ||
  63. prev.Detector.CFARMode != next.Detector.CFARMode ||
  64. prev.Detector.CFARGuardHz != next.Detector.CFARGuardHz ||
  65. prev.Detector.CFARTrainHz != next.Detector.CFARTrainHz ||
  66. prev.Detector.CFARRank != next.Detector.CFARRank ||
  67. prev.Detector.CFARScaleDb != next.Detector.CFARScaleDb ||
  68. prev.Detector.CFARWrapAround != next.Detector.CFARWrapAround ||
  69. prev.SampleRate != next.SampleRate ||
  70. prev.FFTSize != next.FFTSize
  71. windowChanged := prev.FFTSize != next.FFTSize
  72. var newDet *detector.Detector
  73. var newWindow []float64
  74. if detChanged {
  75. newDet = detector.New(next.Detector, next.SampleRate, next.FFTSize)
  76. }
  77. if windowChanged {
  78. newWindow = fftutil.Hann(next.FFTSize)
  79. }
  80. pushDSPUpdate(dspUpdates, dspUpdate{cfg: next, det: newDet, window: newWindow, dcBlock: next.DCBlock, iqBalance: next.IQBalance, useGPUFFT: next.UseGPUFFT})
  81. _ = json.NewEncoder(w).Encode(next)
  82. default:
  83. http.Error(w, "method not allowed", http.StatusMethodNotAllowed)
  84. }
  85. })
  86. mux.HandleFunc("/api/sdr/settings", func(w http.ResponseWriter, r *http.Request) {
  87. w.Header().Set("Content-Type", "application/json")
  88. if r.Method != http.MethodPost {
  89. http.Error(w, "method not allowed", http.StatusMethodNotAllowed)
  90. return
  91. }
  92. var update runtime.SettingsUpdate
  93. if err := json.NewDecoder(r.Body).Decode(&update); err != nil {
  94. http.Error(w, "invalid json", http.StatusBadRequest)
  95. return
  96. }
  97. prev := cfgManager.Snapshot()
  98. next, err := cfgManager.ApplySettings(update)
  99. if err != nil {
  100. http.Error(w, err.Error(), http.StatusBadRequest)
  101. return
  102. }
  103. if prev.AGC != next.AGC || prev.TunerBwKHz != next.TunerBwKHz {
  104. if err := srcMgr.ApplyConfig(next); err != nil {
  105. cfgManager.Replace(prev)
  106. http.Error(w, "failed to apply sdr settings", http.StatusInternalServerError)
  107. return
  108. }
  109. }
  110. if prev.DCBlock != next.DCBlock || prev.IQBalance != next.IQBalance {
  111. pushDSPUpdate(dspUpdates, dspUpdate{cfg: next, dcBlock: next.DCBlock, iqBalance: next.IQBalance})
  112. }
  113. if err := config.Save(cfgPath, next); err != nil {
  114. log.Printf("config save failed: %v", err)
  115. }
  116. _ = json.NewEncoder(w).Encode(next)
  117. })
  118. mux.HandleFunc("/api/stats", func(w http.ResponseWriter, r *http.Request) {
  119. w.Header().Set("Content-Type", "application/json")
  120. _ = json.NewEncoder(w).Encode(srcMgr.Stats())
  121. })
  122. mux.HandleFunc("/api/gpu", func(w http.ResponseWriter, r *http.Request) {
  123. w.Header().Set("Content-Type", "application/json")
  124. _ = json.NewEncoder(w).Encode(gpuState.snapshot())
  125. })
  126. mux.HandleFunc("/api/pipeline/policy", func(w http.ResponseWriter, r *http.Request) {
  127. w.Header().Set("Content-Type", "application/json")
  128. cfg := cfgManager.Snapshot()
  129. _ = json.NewEncoder(w).Encode(pipeline.PolicyFromConfig(cfg))
  130. })
  131. mux.HandleFunc("/api/pipeline/recommendations", func(w http.ResponseWriter, r *http.Request) {
  132. w.Header().Set("Content-Type", "application/json")
  133. cfg := cfgManager.Snapshot()
  134. policy := pipeline.PolicyFromConfig(cfg)
  135. budget := pipeline.BudgetModelFromPolicy(policy)
  136. recommend := map[string]any{
  137. "profile": policy.Profile,
  138. "mode": policy.Mode,
  139. "intent": policy.Intent,
  140. "surveillance_strategy": policy.SurveillanceStrategy,
  141. "refinement_strategy": policy.RefinementStrategy,
  142. "monitor_center_hz": policy.MonitorCenterHz,
  143. "monitor_start_hz": policy.MonitorStartHz,
  144. "monitor_end_hz": policy.MonitorEndHz,
  145. "monitor_span_hz": policy.MonitorSpanHz,
  146. "signal_priorities": policy.SignalPriorities,
  147. "auto_record_classes": policy.AutoRecordClasses,
  148. "auto_decode_classes": policy.AutoDecodeClasses,
  149. "refinement_jobs": policy.MaxRefinementJobs,
  150. "refinement_detail_fft": policy.RefinementDetailFFTSize,
  151. "refinement_auto_span": policy.RefinementAutoSpan,
  152. "refinement_min_span_hz": policy.RefinementMinSpanHz,
  153. "refinement_max_span_hz": policy.RefinementMaxSpanHz,
  154. "budgets": budget,
  155. }
  156. _ = json.NewEncoder(w).Encode(recommend)
  157. })
  158. mux.HandleFunc("/api/refinement", func(w http.ResponseWriter, r *http.Request) {
  159. w.Header().Set("Content-Type", "application/json")
  160. snap := phaseSnap.Snapshot()
  161. windowStats := buildWindowStats(snap.refinement.Input.Windows)
  162. arbitration := buildArbitrationSnapshot(snap.refinement, snap.arbitration)
  163. levelSet := snap.surveillance.LevelSet
  164. spectraBins := map[string]int{}
  165. for _, spec := range snap.surveillance.Spectra {
  166. if len(spec.Spectrum) == 0 {
  167. continue
  168. }
  169. spectraBins[spec.Level.Name] = len(spec.Spectrum)
  170. }
  171. levelSummaries := buildSurveillanceLevelSummaries(levelSet, snap.surveillance.Spectra)
  172. candidateSources := buildCandidateSourceSummary(snap.surveillance.Candidates)
  173. candidateEvidence := buildCandidateEvidenceSummary(snap.surveillance.Candidates)
  174. candidateEvidenceStates := buildCandidateEvidenceStateSummary(snap.surveillance.Candidates)
  175. out := map[string]any{
  176. "plan": snap.refinement.Input.Plan,
  177. "windows": snap.refinement.Input.Windows,
  178. "window_stats": windowStats,
  179. "request": snap.refinement.Input.Request,
  180. "context": snap.refinement.Input.Context,
  181. "detail_level": snap.refinement.Input.Detail,
  182. "arbitration": arbitration,
  183. "work_items": snap.refinement.Input.WorkItems,
  184. "candidates": len(snap.refinement.Input.Candidates),
  185. "scheduled": len(snap.refinement.Input.Scheduled),
  186. "signals": len(snap.refinement.Result.Signals),
  187. "decisions": len(snap.refinement.Result.Decisions),
  188. "surveillance_level": snap.surveillance.Level,
  189. "surveillance_levels": snap.surveillance.Levels,
  190. "surveillance_level_set": levelSet,
  191. "surveillance_active_levels": func() []pipeline.AnalysisLevel {
  192. if len(levelSet.All) > 0 {
  193. return levelSet.All
  194. }
  195. active := make([]pipeline.AnalysisLevel, 0, len(snap.surveillance.Levels)+1)
  196. if snap.surveillance.Level.Name != "" {
  197. active = append(active, snap.surveillance.Level)
  198. }
  199. active = append(active, snap.surveillance.Levels...)
  200. if snap.surveillance.DisplayLevel.Name != "" {
  201. active = append(active, snap.surveillance.DisplayLevel)
  202. }
  203. return active
  204. }(),
  205. "surveillance_level_summary": levelSummaries,
  206. "surveillance_spectra_bins": spectraBins,
  207. "candidate_sources": candidateSources,
  208. "candidate_evidence": candidateEvidence,
  209. "candidate_evidence_states": candidateEvidenceStates,
  210. "display_level": snap.surveillance.DisplayLevel,
  211. "refinement_level": snap.refinement.Input.Level,
  212. "presentation_level": snap.presentation,
  213. }
  214. _ = json.NewEncoder(w).Encode(out)
  215. })
  216. mux.HandleFunc("/api/events", func(w http.ResponseWriter, r *http.Request) {
  217. w.Header().Set("Content-Type", "application/json")
  218. limit := 200
  219. if v := r.URL.Query().Get("limit"); v != "" {
  220. if parsed, err := strconv.Atoi(v); err == nil {
  221. limit = parsed
  222. }
  223. }
  224. var since time.Time
  225. if v := r.URL.Query().Get("since"); v != "" {
  226. if parsed, err := parseSince(v); err == nil {
  227. since = parsed
  228. } else {
  229. http.Error(w, "invalid since", http.StatusBadRequest)
  230. return
  231. }
  232. }
  233. snap := cfgManager.Snapshot()
  234. eventMu.RLock()
  235. evs, err := events.ReadRecent(snap.EventPath, limit, since)
  236. eventMu.RUnlock()
  237. if err != nil {
  238. http.Error(w, "failed to read events", http.StatusInternalServerError)
  239. return
  240. }
  241. _ = json.NewEncoder(w).Encode(evs)
  242. })
  243. mux.HandleFunc("/api/signals", func(w http.ResponseWriter, r *http.Request) {
  244. w.Header().Set("Content-Type", "application/json")
  245. if sigSnap == nil {
  246. _ = json.NewEncoder(w).Encode([]detector.Signal{})
  247. return
  248. }
  249. _ = json.NewEncoder(w).Encode(sigSnap.get())
  250. })
  251. mux.HandleFunc("/api/candidates", func(w http.ResponseWriter, r *http.Request) {
  252. w.Header().Set("Content-Type", "application/json")
  253. if sigSnap == nil {
  254. _ = json.NewEncoder(w).Encode([]pipeline.Candidate{})
  255. return
  256. }
  257. sigs := sigSnap.get()
  258. _ = json.NewEncoder(w).Encode(pipeline.CandidatesFromSignals(sigs, "tracked-signal-snapshot"))
  259. })
  260. mux.HandleFunc("/api/decoders", func(w http.ResponseWriter, r *http.Request) {
  261. w.Header().Set("Content-Type", "application/json")
  262. _ = json.NewEncoder(w).Encode(decoderKeys(cfgManager.Snapshot()))
  263. })
  264. mux.HandleFunc("/api/recordings", func(w http.ResponseWriter, r *http.Request) {
  265. if r.Method != http.MethodGet {
  266. http.Error(w, "method not allowed", http.StatusMethodNotAllowed)
  267. return
  268. }
  269. w.Header().Set("Content-Type", "application/json")
  270. snap := cfgManager.Snapshot()
  271. list, err := recorder.ListRecordings(snap.Recorder.OutputDir)
  272. if err != nil {
  273. http.Error(w, "failed to list recordings", http.StatusInternalServerError)
  274. return
  275. }
  276. _ = json.NewEncoder(w).Encode(list)
  277. })
  278. mux.HandleFunc("/api/recordings/", func(w http.ResponseWriter, r *http.Request) {
  279. w.Header().Set("Content-Type", "application/json")
  280. id := strings.TrimPrefix(r.URL.Path, "/api/recordings/")
  281. if id == "" {
  282. http.Error(w, "missing id", http.StatusBadRequest)
  283. return
  284. }
  285. snap := cfgManager.Snapshot()
  286. base := filepath.Clean(filepath.Join(snap.Recorder.OutputDir, id))
  287. if !strings.HasPrefix(base, filepath.Clean(snap.Recorder.OutputDir)) {
  288. http.Error(w, "invalid path", http.StatusBadRequest)
  289. return
  290. }
  291. if r.URL.Path == "/api/recordings/"+id+"/audio" {
  292. http.ServeFile(w, r, filepath.Join(base, "audio.wav"))
  293. return
  294. }
  295. if r.URL.Path == "/api/recordings/"+id+"/iq" {
  296. http.ServeFile(w, r, filepath.Join(base, "signal.cf32"))
  297. return
  298. }
  299. if r.URL.Path == "/api/recordings/"+id+"/decode" {
  300. mode := r.URL.Query().Get("mode")
  301. cmd := buildDecoderMap(cfgManager.Snapshot())[mode]
  302. if cmd == "" {
  303. http.Error(w, "decoder not configured", http.StatusBadRequest)
  304. return
  305. }
  306. meta, err := recorder.ReadMeta(filepath.Join(base, "meta.json"))
  307. if err != nil {
  308. http.Error(w, "meta read failed", http.StatusInternalServerError)
  309. return
  310. }
  311. audioPath := filepath.Join(base, "audio.wav")
  312. if _, errStat := os.Stat(audioPath); errStat != nil {
  313. audioPath = ""
  314. }
  315. res, err := recorder.DecodeOnDemand(cmd, filepath.Join(base, "signal.cf32"), meta.SampleRate, audioPath)
  316. if err != nil {
  317. http.Error(w, res.Stderr, http.StatusInternalServerError)
  318. return
  319. }
  320. _ = json.NewEncoder(w).Encode(res)
  321. return
  322. }
  323. http.ServeFile(w, r, filepath.Join(base, "meta.json"))
  324. })
  325. mux.HandleFunc("/api/streams", func(w http.ResponseWriter, r *http.Request) {
  326. w.Header().Set("Content-Type", "application/json")
  327. n := recMgr.ActiveStreams()
  328. _ = json.NewEncoder(w).Encode(map[string]any{"active_sessions": n})
  329. })
  330. mux.HandleFunc("/api/demod", func(w http.ResponseWriter, r *http.Request) {
  331. if r.Method != http.MethodGet {
  332. http.Error(w, "method not allowed", http.StatusMethodNotAllowed)
  333. return
  334. }
  335. q := r.URL.Query()
  336. freq, _ := strconv.ParseFloat(q.Get("freq"), 64)
  337. bw, _ := strconv.ParseFloat(q.Get("bw"), 64)
  338. sec, _ := strconv.Atoi(q.Get("sec"))
  339. if sec < 1 {
  340. sec = 1
  341. }
  342. if sec > 10 {
  343. sec = 10
  344. }
  345. mode := q.Get("mode")
  346. data, _, err := recMgr.DemodLive(freq, bw, mode, sec)
  347. if err != nil {
  348. http.Error(w, err.Error(), http.StatusBadRequest)
  349. return
  350. }
  351. w.Header().Set("Content-Type", "audio/wav")
  352. _, _ = w.Write(data)
  353. })
  354. }
  355. func newHTTPServer(addr string, webRoot string, h *hub, cfgPath string, cfgManager *runtime.Manager, srcMgr *sourceManager, dspUpdates chan dspUpdate, gpuState *gpuStatus, recMgr *recorder.Manager, sigSnap *signalSnapshot, eventMu *sync.RWMutex, phaseSnap *phaseSnapshot) *http.Server {
  356. mux := http.NewServeMux()
  357. registerWSHandlers(mux, h, recMgr)
  358. registerAPIHandlers(mux, cfgPath, cfgManager, srcMgr, dspUpdates, gpuState, recMgr, sigSnap, eventMu, phaseSnap)
  359. mux.Handle("/", http.FileServer(http.Dir(webRoot)))
  360. return &http.Server{Addr: addr, Handler: mux}
  361. }
  362. func shutdownServer(server *http.Server) {
  363. ctxTimeout, cancelTimeout := context.WithTimeout(context.Background(), 5*time.Second)
  364. defer cancelTimeout()
  365. _ = server.Shutdown(ctxTimeout)
  366. }