Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in
Toggle navigation
W
wspy
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Analytics
Analytics
CI / CD
Repository
Value Stream
Wiki
Wiki
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
Taddeüs Kroes
wspy
Commits
b3045051
Commit
b3045051
authored
Nov 02, 2013
by
Taddeüs Kroes
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Started adding asynchronous methods
parent
364f446c
Changes
3
Show whitespace changes
Inline
Side-by-side
Showing
3 changed files
with
143 additions
and
24 deletions
+143
-24
__init__.py
__init__.py
+4
-3
frame.py
frame.py
+71
-20
websocket.py
websocket.py
+68
-1
No files found.
__init__.py
View file @
b3045051
from
websocket
import
websocket
from
websocket
import
websocket
,
STATE_INIT
,
STATE_READ
,
STATE_WRITE
,
\
STATE_CLOSE
from
server
import
Server
from
server
import
Server
from
frame
import
Frame
,
ControlFrame
,
OPCODE_CONTINUATION
,
OPCODE_TEXT
,
\
from
frame
import
Frame
,
ControlFrame
,
OPCODE_CONTINUATION
,
OPCODE_TEXT
,
\
OPCODE_BINARY
,
OPCODE_CLOSE
,
OPCODE_PING
,
OPCODE_PONG
,
CLOSE_NORMAL
,
\
OPCODE_BINARY
,
OPCODE_CLOSE
,
OPCODE_PING
,
OPCODE_PONG
,
CLOSE_NORMAL
,
\
CLOSE_GOING_AWAY
,
CLOSE_PROTOCOL_ERROR
,
CLOSE_NOACCEPT_DTYPE
,
\
CLOSE_GOING_AWAY
,
CLOSE_PROTOCOL_ERROR
,
CLOSE_NOACCEPT_DTYPE
,
\
CLOSE_INVALID_DATA
,
CLOSE_POLICY
,
CLOSE_MESSAGE_TOOBIG
,
\
CLOSE_INVALID_DATA
,
CLOSE_POLICY
,
CLOSE_MESSAGE_TOOBIG
,
\
CLOSE_MISSING_EXTENSIONS
,
CLOSE_UNABLE
CLOSE_MISSING_EXTENSIONS
,
CLOSE_UNABLE
,
read_frame
,
pop_frame
,
\
contains_frame
from
connection
import
Connection
from
connection
import
Connection
from
message
import
Message
,
TextMessage
,
BinaryMessage
from
message
import
Message
,
TextMessage
,
BinaryMessage
from
errors
import
SocketClosed
,
HandshakeError
,
PingError
,
SSLError
from
errors
import
SocketClosed
,
HandshakeError
,
PingError
,
SSLError
from
extension
import
Extension
from
extension
import
Extension
from
deflate_frame
import
DeflateFrame
,
WebkitDeflateFrame
from
deflate_frame
import
DeflateFrame
,
WebkitDeflateFrame
#from multiplex import Multiplex
frame.py
View file @
b3045051
...
@@ -194,12 +194,8 @@ class ControlFrame(Frame):
...
@@ -194,12 +194,8 @@ class ControlFrame(Frame):
return
code
,
reason
return
code
,
reason
def
receive_frame
(
sock
):
def
decode_frame
(
reader
):
"""
b1
,
b2
=
struct
.
unpack
(
'!BB'
,
reader
.
recvn
(
2
))
Receive a single frame on socket `sock`. The frame scheme is explained in
the docs of Frame.pack().
"""
b1
,
b2
=
struct
.
unpack
(
'!BB'
,
recvn
(
sock
,
2
))
final
=
bool
(
b1
&
0x80
)
final
=
bool
(
b1
&
0x80
)
rsv1
=
bool
(
b1
&
0x40
)
rsv1
=
bool
(
b1
&
0x40
)
...
@@ -211,16 +207,16 @@ def receive_frame(sock):
...
@@ -211,16 +207,16 @@ def receive_frame(sock):
payload_len
=
b2
&
0x7F
payload_len
=
b2
&
0x7F
if
payload_len
==
126
:
if
payload_len
==
126
:
payload_len
=
struct
.
unpack
(
'!H'
,
re
cvn
(
sock
,
2
))
payload_len
=
struct
.
unpack
(
'!H'
,
re
ader
.
recvn
(
2
))
elif
payload_len
==
127
:
elif
payload_len
==
127
:
payload_len
=
struct
.
unpack
(
'!Q'
,
re
cvn
(
sock
,
8
))
payload_len
=
struct
.
unpack
(
'!Q'
,
re
ader
.
recvn
(
8
))
if
masked
:
if
masked
:
masking_key
=
re
cvn
(
sock
,
4
)
masking_key
=
re
ader
.
recvn
(
4
)
payload
=
mask
(
masking_key
,
re
cvn
(
sock
,
payload_len
))
payload
=
mask
(
masking_key
,
re
ader
.
recvn
(
payload_len
))
else
:
else
:
masking_key
=
''
masking_key
=
''
payload
=
re
cvn
(
sock
,
payload_len
)
payload
=
re
ader
.
recvn
(
payload_len
)
# Control frames have most significant bit 1
# Control frames have most significant bit 1
cls
=
ControlFrame
if
opcode
&
0x8
else
Frame
cls
=
ControlFrame
if
opcode
&
0x8
else
Frame
...
@@ -229,14 +225,43 @@ def receive_frame(sock):
...
@@ -229,14 +225,43 @@ def receive_frame(sock):
rsv1
=
rsv1
,
rsv2
=
rsv2
,
rsv3
=
rsv3
)
rsv1
=
rsv1
,
rsv2
=
rsv2
,
rsv3
=
rsv3
)
def
recvn
(
sock
,
n
):
def
receive_frame
(
sock
):
return
decode_frame
(
BlockingSocket
(
sock
))
def
read_frame
(
data
):
reader
=
BufferedReader
(
data
)
frame
=
decode_frame
(
reader
)
return
frame
,
len
(
data
)
-
reader
.
offset
def
pop_frame
(
data
):
frame
,
l
=
read_frame
(
data
)
class
BufferedReader
(
object
):
def
__init__
(
self
,
data
):
self
.
data
=
data
self
.
offset
=
0
def
recvn
(
self
,
n
):
assert
len
(
self
.
data
)
-
self
.
offset
>=
n
self
.
offset
+=
n
return
self
.
data
[
self
.
offset
-
n
:
self
.
offset
]
class
BlockingSocket
(
object
):
def
__init__
(
self
,
sock
):
self
.
sock
=
sock
def
recvn
(
self
,
n
):
"""
"""
Keep receiving data from `sock`
until exactly `n` bytes have been read.
Keep receiving data
until exactly `n` bytes have been read.
"""
"""
data
=
''
data
=
''
while
len
(
data
)
<
n
:
while
len
(
data
)
<
n
:
received
=
sock
.
recv
(
n
-
len
(
data
))
received
=
self
.
sock
.
recv
(
n
-
len
(
data
))
if
not
len
(
received
):
if
not
len
(
received
):
raise
socket
.
error
(
'no data read from socket'
)
raise
socket
.
error
(
'no data read from socket'
)
...
@@ -246,6 +271,32 @@ def recvn(sock, n):
...
@@ -246,6 +271,32 @@ def recvn(sock, n):
return
data
return
data
def
contains_frame
(
data
):
"""
Read the frame length from the start of `data` and check if the data is
long enough to contain the entire frame.
"""
if
len
(
data
)
<
2
:
return
False
b2
=
struct
.
unpack
(
'!B'
,
data
[
1
])
payload_len
=
b2
&
0x7F
payload_start
=
2
if
payload_len
==
126
:
if
len
(
data
)
>
4
:
payload_len
=
struct
.
unpack
(
'!H'
,
data
[
2
:
4
])
payload_start
=
4
elif
payload_len
==
127
:
if
len
(
data
)
>
12
:
payload_len
=
struct
.
unpack
(
'!Q'
,
data
[
4
:
12
])
payload_start
=
12
return
len
(
data
)
>=
payload_len
+
payload_start
def
mask
(
key
,
original
):
def
mask
(
key
,
original
):
"""
"""
Mask an octet string using the given masking key.
Mask an octet string using the given masking key.
...
...
websocket.py
View file @
b3045051
import
socket
import
socket
import
ssl
import
ssl
from
frame
import
receive_frame
from
frame
import
receive_frame
,
pop_frame
,
contains_frame
from
handshake
import
ServerHandshake
,
ClientHandshake
from
handshake
import
ServerHandshake
,
ClientHandshake
from
errors
import
SSLError
from
errors
import
SSLError
...
@@ -11,6 +11,11 @@ INHERITED_ATTRS = ['bind', 'close', 'listen', 'fileno', 'getpeername',
...
@@ -11,6 +11,11 @@ INHERITED_ATTRS = ['bind', 'close', 'listen', 'fileno', 'getpeername',
'settimeout'
,
'gettimeout'
,
'shutdown'
,
'family'
,
'type'
,
'settimeout'
,
'gettimeout'
,
'shutdown'
,
'family'
,
'type'
,
'proto'
]
'proto'
]
STATE_INIT
=
0
STATE_READ
=
1
STATE_WRITE
=
2
STATE_CLOSE
=
4
class
websocket
(
object
):
class
websocket
(
object
):
"""
"""
...
@@ -88,6 +93,11 @@ class websocket(object):
...
@@ -88,6 +93,11 @@ class websocket(object):
self
.
hooks_send
=
[]
self
.
hooks_send
=
[]
self
.
hooks_recv
=
[]
self
.
hooks_recv
=
[]
self
.
state
=
STATE_INIT
self
.
sendbuf
=
''
self
.
recvbuf
=
''
self
.
recv_callbacks
=
[]
self
.
sock
=
sock
or
socket
.
socket
(
sfamily
,
socket
.
SOCK_STREAM
,
sproto
)
self
.
sock
=
sock
or
socket
.
socket
(
sfamily
,
socket
.
SOCK_STREAM
,
sproto
)
def
__getattr__
(
self
,
name
):
def
__getattr__
(
self
,
name
):
...
@@ -153,6 +163,62 @@ class websocket(object):
...
@@ -153,6 +163,62 @@ class websocket(object):
"""
"""
return
[
self
.
recv
()
for
i
in
xrange
(
n
)]
return
[
self
.
recv
()
for
i
in
xrange
(
n
)]
def
queue_send
(
self
,
frame
):
"""
Enqueue `frame` to the send buffer so that it is send on the next
`do_async_send`.
"""
for
hook
in
self
.
hooks_send
:
frame
=
hook
(
frame
)
self
.
sendbuf
+=
frame
.
pack
()
self
.
state
|=
STATE_WRITE
def
queue_recv
(
self
,
callback
):
"""
Enqueue `callback` to be called when the next frame is recieved by
`do_async_recv`.
"""
self
.
recv_callbacks
.
push
(
callback
)
self
.
state
|=
STATE_READ
def
queue_close
(
self
):
self
.
state
|=
STATE_CLOSE
def
do_async_send
(
self
):
"""
Send any queued data. If all data is sent, STATE_WRITE is removed from
the state mask.
"""
assert
self
.
state
|
STATE_WRITE
assert
len
(
self
.
sendbuf
)
nwritten
=
self
.
sock
.
send
(
self
.
sendbuf
)
self
.
sendbuf
=
self
.
sendbuf
[
nwritten
:]
if
len
(
self
.
sendbuf
)
==
0
:
self
.
state
^=
STATE_WRITE
def
do_async_recv
(
self
,
bufsize
):
"""
"""
assert
self
.
state
|
STATE_READ
self
.
recvbuf
+=
self
.
sock
.
recv
(
bufsize
)
while
contains_frame
(
self
.
recvbuf
):
frame
,
self
.
recvbuf
=
pop_frame
(
self
.
recvbuf
)
if
len
(
self
.
recv_callbacks
)
==
0
:
raise
IndexError
(
'no callback installed for received frame %s'
%
frame
)
cb
=
self
.
recv_callbacks
.
pop
(
0
)
cb
(
frame
)
if
len
(
self
.
recvbuf
)
==
0
:
self
.
state
^=
STATE_READ
def
enable_ssl
(
self
,
*
args
,
**
kwargs
):
def
enable_ssl
(
self
,
*
args
,
**
kwargs
):
"""
"""
Transforms the regular socket.socket to an ssl.SSLSocket for secure
Transforms the regular socket.socket to an ssl.SSLSocket for secure
...
@@ -180,6 +246,7 @@ class websocket(object):
...
@@ -180,6 +246,7 @@ class websocket(object):
being sent and removes the instance for received data. This way, data
being sent and removes the instance for received data. This way, data
can be sent and received as if on a regular socket.
can be sent and received as if on a regular socket.
>>> import wspy
>>> import wspy
>>> sock = wspy.websocket()
>>> sock.add_hook(lambda data: tswpy.Frame(tswpy.OPCODE_TEXT, data),
>>> sock.add_hook(lambda data: tswpy.Frame(tswpy.OPCODE_TEXT, data),
>>> lambda frame: frame.payload)
>>> lambda frame: frame.payload)
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment