Har*_*yte 7 sockets websocket python-3.x mod-pywebsocket
尝试为Python3支持的应用程序创建Web前端.该应用程序将需要双向流,这听起来像是查看websockets的好机会.
我的第一个倾向是使用已经存在的东西,mod-pywebsocket的示例应用程序已被证明是有价值的.不幸的是,他们的API似乎并不容易扩展,而且它是Python2.
环顾博客圈,许多人为早期版本的websocket协议编写了自己的websocket服务器,大多数人都没有实现安全密钥哈希所以不行.
阅读RFC 6455我决定自己尝试一下,并提出以下建议:
#!/usr/bin/env python3
"""
A partial implementation of RFC 6455
http://tools.ietf.org/pdf/rfc6455.pdf
Brian Thorne 2012
"""
import socket
import threading
import time
import base64
import hashlib
def calculate_websocket_hash(key):
magic_websocket_string = b"258EAFA5-E914-47DA-95CA-C5AB0DC85B11"
result_string = key + magic_websocket_string
sha1_digest = hashlib.sha1(result_string).digest()
response_data = base64.encodestring(sha1_digest)
response_string = response_data.decode('utf8')
return response_string
def is_bit_set(int_type, offset):
mask = 1 << offset
return not 0 == (int_type & mask)
def set_bit(int_type, offset):
return int_type | (1 << offset)
def bytes_to_int(data):
# note big-endian is the standard network byte order
return int.from_bytes(data, byteorder='big')
def pack(data):
"""pack bytes for sending to client"""
frame_head = bytearray(2)
# set final fragment
frame_head[0] = set_bit(frame_head[0], 7)
# set opcode 1 = text
frame_head[0] = set_bit(frame_head[0], 0)
# payload length
assert len(data) < 126, "haven't implemented that yet"
frame_head[1] = len(data)
# add data
frame = frame_head + data.encode('utf-8')
print(list(hex(b) for b in frame))
return frame
def receive(s):
"""receive data from client"""
# read the first two bytes
frame_head = s.recv(2)
# very first bit indicates if this is the final fragment
print("final fragment: ", is_bit_set(frame_head[0], 7))
# bits 4-7 are the opcode (0x01 -> text)
print("opcode: ", frame_head[0] & 0x0f)
# mask bit, from client will ALWAYS be 1
assert is_bit_set(frame_head[1], 7)
# length of payload
# 7 bits, or 7 bits + 16 bits, or 7 bits + 64 bits
payload_length = frame_head[1] & 0x7F
if payload_length == 126:
raw = s.recv(2)
payload_length = bytes_to_int(raw)
elif payload_length == 127:
raw = s.recv(8)
payload_length = bytes_to_int(raw)
print('Payload is {} bytes'.format(payload_length))
"""masking key
All frames sent from the client to the server are masked by a
32-bit nounce value that is contained within the frame
"""
masking_key = s.recv(4)
print("mask: ", masking_key, bytes_to_int(masking_key))
# finally get the payload data:
masked_data_in = s.recv(payload_length)
data = bytearray(payload_length)
# The ith byte is the XOR of byte i of the data with
# masking_key[i % 4]
for i, b in enumerate(masked_data_in):
data[i] = b ^ masking_key[i%4]
return data
def handle(s):
client_request = s.recv(4096)
# get to the key
for line in client_request.splitlines():
if b'Sec-WebSocket-Key:' in line:
key = line.split(b': ')[1]
break
response_string = calculate_websocket_hash(key)
header = '''HTTP/1.1 101 Switching Protocols\r
Upgrade: websocket\r
Connection: Upgrade\r
Sec-WebSocket-Accept: {}\r
\r
'''.format(response_string)
s.send(header.encode())
# this works
print(receive(s))
# this doesn't
s.send(pack('Hello'))
s.close()
s = socket.socket( socket.AF_INET, socket.SOCK_STREAM)
s.setsockopt(socket.SOL_SOCKET, socket.SO_REUSEADDR, 1)
s.bind(('', 9876))
s.listen(1)
while True:
t,_ = s.accept()
threading.Thread(target=handle, args = (t,)).start()
Run Code Online (Sandbox Code Playgroud)
使用这个基本测试页面(使用mod-pywebsocket):
<!DOCTYPE html>
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Web Socket Example</title>
<meta charset="UTF-8">
</head>
<body>
<div id="serveroutput"></div>
<form id="form">
<input type="text" value="Hello World!" id="msg" />
<input type="submit" value="Send" onclick="sendMsg()" />
</form>
<script>
var form = document.getElementById('form');
var msg = document.getElementById('msg');
var output = document.getElementById('serveroutput');
var s = new WebSocket("ws://"+window.location.hostname+":9876");
s.onopen = function(e) {
console.log("opened");
out('Connected.');
}
s.onclose = function(e) {
console.log("closed");
out('Connection closed.');
}
s.onmessage = function(e) {
console.log("got: " + e.data);
out(e.data);
}
form.onsubmit = function(e) {
e.preventDefault();
msg.value = '';
window.scrollTop = window.scrollHeight;
}
function sendMsg() {
s.send(msg.value);
}
function out(text) {
var el = document.createElement('p');
el.innerHTML = text;
output.appendChild(el);
}
msg.focus();
</script>
</body>
</html>
Run Code Online (Sandbox Code Playgroud)
这会正确接收数据并对其进行解掩码,但我无法使传输路径正常工作.
作为向套接字写入"Hello"的测试,上面的程序计算要写入套接字的字节:
['0x81', '0x5', '0x48', '0x65', '0x6c', '0x6c', '0x6f']
Run Code Online (Sandbox Code Playgroud)
它与RFC的5.7节中给出的十六进制值匹配.不幸的是,这个框架从未出现在Chrome的开发者工具中.
知道我错过了什么吗?或者当前正在运行的Python3 websocket示例?
当我尝试在Lion上使用Safari 6.0.1中的python代码时,我得到了
Unexpected LF in Value at ...
Run Code Online (Sandbox Code Playgroud)
在Javascript控制台中.我也IndexError从Python代码中得到一个例外.
当我在Lion上使用Chrome版本24.0.1290.1开发的python代码时,我没有收到任何Javascript错误.在你的javascript 中调用onopen()和onclose()方法,但不是onmessage().python代码不会抛出任何异常,并且似乎有接收消息并发送它的响应,即您看到的行为.
由于Safari不喜欢标题中的尾随LF,我尝试删除它,即
header = '''HTTP/1.1 101 Switching Protocols\r
Upgrade: websocket\r
Connection: Upgrade\r
Sec-WebSocket-Accept: {}\r
'''.format(response_string)
Run Code Online (Sandbox Code Playgroud)
当我进行此更改时,Chrome可以看到您的回复消息,即
got: Hello
Run Code Online (Sandbox Code Playgroud)
显示在javascript控制台中.
Safari仍然无法正常工作.现在,当我尝试发送消息时,它会引发一个不同的问题.
websocket.html:36 INVALID_STATE_ERR: DOM Exception 11: An attempt was made to use an object that is not, or is no longer, usable.
Run Code Online (Sandbox Code Playgroud)
没有任何javascript websocket事件处理程序触发,我仍然看到IndexErrorpython 的异常.
结论.您的Python代码无法使用Chrome,因为标头响应中有额外的LF.还有其他事情正在发生,因为与Chrome配合使用的代码无法与Safari配合使用.
我已经解决了潜在的问题,现在让这个例子在Safari和Chrome中运行.
base64.encodestring()总是\n为它的回报添加一个尾随.这是Safari抱怨的LF的来源.
调用.strip()返回值calculate_websocket_hash并使用原始标题模板在Safari和Chrome上正常工作.