Python 3中的Websocket实现

Har*_*yte 7 sockets websocket python-3.x mod-pywebsocket

尝试为Python3支持的应用程序创建Web前端.该应用程序将需要双向流,这听起来像是查看websockets的好机会.

我的第一个倾向是使用已经存在的东西,mod-pywebsocket的示例应用程序已被证明是有价值的.不幸的是,他们的API似乎并不容易扩展,而且它是Python2.

环顾博客圈,许多人为早期版本的websocket协议编写了​​自己的websocket服务器,大多数人都没有实现安全密钥哈希所以不行.

阅读RFC 6455我决定自己尝试一下,并提出以下建议:

#!/usr/bin/env python3

"""
A partial implementation of RFC 6455
http://tools.ietf.org/pdf/rfc6455.pdf
Brian Thorne 2012
"""

import socket
import threading
import time
import base64
import hashlib

def calculate_websocket_hash(key):
    magic_websocket_string = b"258EAFA5-E914-47DA-95CA-C5AB0DC85B11"
    result_string = key + magic_websocket_string
    sha1_digest = hashlib.sha1(result_string).digest()
    response_data = base64.encodestring(sha1_digest)
    response_string = response_data.decode('utf8')
    return response_string

def is_bit_set(int_type, offset):
    mask = 1 << offset
    return not 0 == (int_type & mask)

def set_bit(int_type, offset):
    return int_type | (1 << offset)

def bytes_to_int(data):
    # note big-endian is the standard network byte order
    return int.from_bytes(data, byteorder='big')


def pack(data):
    """pack bytes for sending to client"""
    frame_head = bytearray(2)

    # set final fragment
    frame_head[0] = set_bit(frame_head[0], 7)

    # set opcode 1 = text
    frame_head[0] = set_bit(frame_head[0], 0)

    # payload length
    assert len(data) < 126, "haven't implemented that yet"
    frame_head[1] = len(data)

    # add data
    frame = frame_head + data.encode('utf-8')
    print(list(hex(b) for b in frame))
    return frame

def receive(s):
    """receive data from client"""

    # read the first two bytes
    frame_head = s.recv(2)

    # very first bit indicates if this is the final fragment
    print("final fragment: ", is_bit_set(frame_head[0], 7))

    # bits 4-7 are the opcode (0x01 -> text)
    print("opcode: ", frame_head[0] & 0x0f)

    # mask bit, from client will ALWAYS be 1
    assert is_bit_set(frame_head[1], 7)

    # length of payload
    # 7 bits, or 7 bits + 16 bits, or 7 bits + 64 bits
    payload_length = frame_head[1] & 0x7F
    if payload_length == 126:
        raw = s.recv(2)
        payload_length = bytes_to_int(raw)
    elif payload_length == 127:
        raw = s.recv(8)
        payload_length = bytes_to_int(raw)
    print('Payload is {} bytes'.format(payload_length))

    """masking key
    All frames sent from the client to the server are masked by a
    32-bit nounce value that is contained within the frame
    """
    masking_key = s.recv(4)
    print("mask: ", masking_key, bytes_to_int(masking_key))

    # finally get the payload data:
    masked_data_in = s.recv(payload_length)
    data = bytearray(payload_length)

    # The ith byte is the XOR of byte i of the data with
    # masking_key[i % 4]
    for i, b in enumerate(masked_data_in):
        data[i] = b ^ masking_key[i%4]

    return data

def handle(s):
    client_request = s.recv(4096)

    # get to the key
    for line in client_request.splitlines():
        if b'Sec-WebSocket-Key:' in line:
            key = line.split(b': ')[1]
            break
    response_string = calculate_websocket_hash(key)

    header = '''HTTP/1.1 101 Switching Protocols\r
Upgrade: websocket\r
Connection: Upgrade\r
Sec-WebSocket-Accept: {}\r
\r
'''.format(response_string)
    s.send(header.encode())

    # this works
    print(receive(s))

    # this doesn't
    s.send(pack('Hello'))

    s.close()

s = socket.socket( socket.AF_INET, socket.SOCK_STREAM)
s.setsockopt(socket.SOL_SOCKET, socket.SO_REUSEADDR, 1)
s.bind(('', 9876))
s.listen(1)

while True:
    t,_ = s.accept()
    threading.Thread(target=handle, args = (t,)).start()
Run Code Online (Sandbox Code Playgroud)

使用这个基本测试页面(使用mod-pywebsocket):

<!DOCTYPE html>
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
    <title>Web Socket Example</title>
    <meta charset="UTF-8">
</head>
<body>
    <div id="serveroutput"></div>
    <form id="form">
        <input type="text" value="Hello World!" id="msg" />
        <input type="submit" value="Send" onclick="sendMsg()" />
    </form>
<script>
    var form = document.getElementById('form');
    var msg = document.getElementById('msg');
    var output = document.getElementById('serveroutput');
    var s = new WebSocket("ws://"+window.location.hostname+":9876");
    s.onopen = function(e) {
        console.log("opened");
        out('Connected.');
    }
    s.onclose = function(e) {
        console.log("closed");
        out('Connection closed.');
    }
    s.onmessage = function(e) {
        console.log("got: " + e.data);
        out(e.data);
    }
    form.onsubmit = function(e) {
        e.preventDefault();
        msg.value = '';
        window.scrollTop = window.scrollHeight;
    }
    function sendMsg() {
        s.send(msg.value);
    }
    function out(text) {
        var el = document.createElement('p');
        el.innerHTML = text;
        output.appendChild(el);
    }
    msg.focus();
</script>
</body>
</html>
Run Code Online (Sandbox Code Playgroud)

这会正确接收数据并对其进行解掩码,但我无法使传输路径正常工作.

作为向套接字写入"Hello"的测试,上面的程序计算要写入套接字的字节:

['0x81', '0x5', '0x48', '0x65', '0x6c', '0x6c', '0x6f']
Run Code Online (Sandbox Code Playgroud)

它与RFC的5.7节中给出的十六进制值匹配.不幸的是,这个框架从未出现在Chrome的开发者工具中.

知道我错过了什么吗?或者当前正在运行的Python3 websocket示例?

Phi*_*xon 7

当我尝试在Lion上使用Safari 6.0.1中的python代码时,我得到了

Unexpected LF in Value at ...
Run Code Online (Sandbox Code Playgroud)

在Javascript控制台中.我也IndexError从Python代码中得到一个例外.

当我在Lion上使用Chrome版本24.0.1290.1开发的python代码时,我没有收到任何Javascript错误.在你的javascript 中调用onopen()onclose()方法,但不是onmessage().python代码不会抛出任何异常,并且似乎有接收消息并发送它的响应,即您看到的行为.

由于Safari不喜欢标题中的尾随LF,我尝试删除它,即

header = '''HTTP/1.1 101 Switching Protocols\r
Upgrade: websocket\r
Connection: Upgrade\r
Sec-WebSocket-Accept: {}\r
'''.format(response_string)
Run Code Online (Sandbox Code Playgroud)

当我进行此更改时,Chrome可以看到您的回复消息,即

got: Hello
Run Code Online (Sandbox Code Playgroud)

显示在javascript控制台中.

Safari仍然无法正常工作.现在,当我尝试发送消息时,它会引发一个不同的问题.

websocket.html:36 INVALID_STATE_ERR: DOM Exception 11: An attempt was made to use an object that is not, or is no longer, usable.
Run Code Online (Sandbox Code Playgroud)

没有任何javascript websocket事件处理程序触发,我仍然看到IndexErrorpython 的异常.

结论.您的Python代码无法使用Chrome,因为标头响应中有额外的LF.还有其他事情正在发生,因为与Chrome配合使用的代码无法与Safari配合使用.

更新

我已经解决了潜在的问题,现在让这个例子在Safari和Chrome中运行.

base64.encodestring()总是\n为它的回报添加一个尾随.这是Safari抱怨的LF的来源.

调用.strip()返回值calculate_websocket_hash并使用原始标题模板在Safari和Chrome上正常工作.