用Python实现一个简单的WebSocket服务器(server)_codestorm_新浪博客

转自: http://blog.csdn.net/jiht594/article/details/43764941

ubuntu下python2.76

windows python 2.79, chrome37 firefox35通过

代码是在别人(cddn有人提问)基础上改的, 主要改动了parsedata和sendmessage这2个函数.

改代码参考下面了这段文档. 主要是第5条, 发送的数据长度分别是 8bit和 16bit和 64 bit(即 127, 65535,和2^64-1)三种情况 

发送和收取是一样的, 例如

1.长度小于125(由于使用126, 127用作标志位.)

2. 数据长度在128-65525之间时, Payload Length位设为126, 后面额外使用16bit表示长度(前面的126不再是长度的一部分)

3.数据长度在65526-2^64-1之间时, Payload Length位设为127, 后面额外使用64bit表示长度(前面的127不再是长度的一部分)

 

  1. Fin (bit 0): determines if this is the last frame in the message. This would be set to 1 on the end of a series of frames, or in a single-frame message, it would be set to 1 as it is both the first and last frame.
  2. RSV1, RSV2, RSV3 (bits 1-3): these three bits are reserved for websocket extensions, and should be 0 unless a specific extension requires the use of any of these bytes.
  3. Opcode (bits 4-7): these four bits deterimine the type of the frame. Control frames communicate WebSocket state, while non-control frames communicate data. The various types of codes include:

    1. x0: continuation frame; this frame contains data that should be appended to the previous frame
    2. x1: text frame; this frame (and any following) contains text
    3. x2: binary frame; this frame (and any following) contains binary data
    4. x3 - x7: non-control reserved frames; these are reserved for possible websocket extensions
    5. x8: close frame; this frame should end the connection
    6. x9: ping frame
    7. xA: pong frame
    8. xB - xF: control reserved frames
  4. Mask (bit 8): this bit determines whether this specific frame uses a mask or not.
  5. Payload Length (bits 9-15, or 16-31, or 16-79): these seven bytes determine the payload length. If the length is 126, the length is actually determined by bits 16 through 31 (that is, the following two bytes). If the length is 127, the length is actually determined by bits 16 through 79 (that is, the following eight bytes).
  6. Masking Key (the following four bytes): this represents the mask, if the Mask bit is set to 1.
  7. Payload Data (the following data): finally, the data. The payload data may be sent over multiple frames; we know the size of the entire message by the payload length that was sent, and can append data together to form a single message until we receive the message with the Fin flag. Each consecutive payload, if it exists, will contain the 0 “continuation frame” opcode.

 


服务器

 

[python]  view plain  copy
  在CODE上查看代码片
  1. #coding=utf8  
  2. #!/usr/bin/python  
  3.   
  4.   
  5. import struct,socket  
  6. import hashlib  
  7. import threading,random  
  8. import time  
  9. import struct  
  10. from base64 import b64encode, b64decode  
  11.   
  12.   
  13. connectionlist = {}  
  14. g_code_length = 0  
  15. g_header_length = 0  
  16.   
  17.   
  18. def hex2dec(string_num):  
  19.     return str(int(string_num.upper(), 16))  
  20.   
  21.   
  22.   
  23.   
  24. def get_datalength(msg):  
  25.     global g_code_length  
  26.     global g_header_length      
  27.       
  28.     print (len(msg))  
  29.     g_code_length = ord(msg[1]) & 127  
  30.     received_length = 0;  
  31.     if g_code_length == 126:  
  32.         #g_code_length = msg[2:4]  
  33.         #g_code_length = (ord(msg[2])<<8) + (ord(msg[3]))  
  34.         g_code_length = struct.unpack('>H', str(msg[2:4]))[0]  
  35.         g_header_length = 8  
  36.     elif g_code_length == 127:  
  37.         #g_code_length = msg[2:10]  
  38.         g_code_length = struct.unpack('>Q', str(msg[2:10]))[0]  
  39.         g_header_length = 14  
  40.     else:  
  41.         g_header_length = 6  
  42.     g_code_length = int(g_code_length)  
  43.     return g_code_length  
  44.           
  45. def parse_data(msg):  
  46.     global g_code_length  
  47.     g_code_length = ord(msg[1]) & 127  
  48.     received_length = 0;  
  49.     if g_code_length == 126:  
  50.         g_code_length = struct.unpack('>H', str(msg[2:4]))[0]  
  51.         masks = msg[4:8]  
  52.         data = msg[8:]  
  53.     elif g_code_length == 127:  
  54.         g_code_length = struct.unpack('>Q', str(msg[2:10]))[0]  
  55.         masks = msg[10:14]  
  56.         data = msg[14:]  
  57.     else:  
  58.         masks = msg[2:6]  
  59.         data = msg[6:]  
  60.   
  61.   
  62.     i = 0  
  63.     raw_str = ''  
  64.   
  65.   
  66.     for d in data:  
  67.         raw_str += chr(ord(d) ^ ord(masks[i%4]))  
  68.         i += 1  
  69.   
  70.   
  71.     print (u"总长度是:%d" % int(g_code_length))      
  72.     return raw_str    
  73.   
  74.   
  75. def sendMessage(message):  
  76.     global connectionlist  
  77.       
  78.     message_utf_8 = message.encode('utf-8')  
  79.     for connection in connectionlist.values():  
  80.         back_str = []  
  81.         back_str.append('\x81')  
  82.         data_length = len(message_utf_8)  
  83.   
  84.   
  85.         if data_length <= 125:  
  86.             back_str.append(chr(data_length))  
  87.         elif data_length <= 65535 :  
  88.             back_str.append(struct.pack('b'126))  
  89.             back_str.append(struct.pack('>h', data_length))  
  90.             #back_str.append(chr(data_length >> 8))  
  91.             #back_str.append(chr(data_length & 0xFF))  
  92.             #a = struct.pack('>h', data_length)  
  93.             #b = chr(data_length >> 8)  
  94.             #c = chr(data_length & 0xFF)  
  95.         elif data_length <= (2^64-1):  
  96.             #back_str.append(chr(127))  
  97.             back_str.append(struct.pack('b'127))  
  98.             back_str.append(struct.pack('>q', data_length))  
  99.             #back_str.append(chr(data_length >> 8))  
  100.             #back_str.append(chr(data_length & 0xFF))        
  101.         else :  
  102.                 print (u'太长了')          
  103.         msg = ''  
  104.         for c in back_str:  
  105.             msg += c;  
  106.         back_str = str(msg)   + message_utf_8#.encode('utf-8')      
  107.         #connection.send(str.encode(str(u"\x00%s\xFF\n\n" % message))) #这个是旧版  
  108.         #print (u'send message:' +  message)  
  109.         if back_str != None and len(back_str) > 0:  
  110.             print (back_str)  
  111.             connection.send(back_str)  
  112.   
  113.   
  114. def deleteconnection(item):  
  115.     global connectionlist  
  116.     del connectionlist['connection'+item]  
  117.   
  118.   
  119. class WebSocket(threading.Thread):#继承Thread  
  120.   
  121.   
  122.     GUID = "258EAFA5-E914-47DA-95CA-C5AB0DC85B11"  
  123.   
  124.   
  125.     def __init__(self,conn,index,name,remote, path="/"):  
  126.         threading.Thread.__init__(self)#初始化父类Thread  
  127.         self.conn = conn  
  128.         self.index = index  
  129.         self.name = name  
  130.         self.remote = remote  
  131.         self.path = path  
  132.         self.buffer = ""  
  133.         self.buffer_utf8 = ""  
  134.         self.length_buffer = 0  
  135.     def run(self):#重载Thread的run  
  136.         print('Socket%s Start!' % self.index)  
  137.         headers = {}  
  138.         self.handshaken = False  
  139.   
  140.   
  141.         while True:  
  142.             if self.handshaken == False:  
  143.                 print ('Socket%s Start Handshaken with %s!' % (self.index,self.remote))  
  144.                 self.buffer += bytes.decode(self.conn.recv(1024))  
  145.   
  146.   
  147.                 if self.buffer.find('\r\n\r\n') != -1:  
  148.                     header, data = self.buffer.split('\r\n\r\n'1)  
  149.                     for line in header.split("\r\n")[1:]:  
  150.                         key, value = line.split(": "1)  
  151.                         headers[key] = value  
  152.   
  153.   
  154.                     headers["Location"] = ("ws://%s%s" %(headers["Host"], self.path))  
  155.                     key = headers['Sec-WebSocket-Key']  
  156.                     token = b64encode(hashlib.sha1(str.encode(str(key + self.GUID))).digest())  
  157.   
  158.   
  159.                     handshake="HTTP/1.1 101 Switching Protocols\r\n"\  
  160.                         "Upgrade: websocket\r\n"\  
  161.                         "Connection: Upgrade\r\n"\  
  162.                         "Sec-WebSocket-Accept: "+bytes.decode(token)+"\r\n"\  
  163.                         "WebSocket-Origin: "+str(headers["Origin"])+"\r\n"\  
  164.                         "WebSocket-Location: "+str(headers["Location"])+"\r\n\r\n"  
  165.   
  166.   
  167.                     self.conn.send(str.encode(str(handshake)))  
  168.                     self.handshaken = True    
  169.                     print ('Socket %s Handshaken with %s success!' %(self.index, self.remote))    
  170.                     sendMessage(u'Welcome, ' + self.name + ' !')    
  171.                     self.buffer_utf8 = ""  
  172.                     g_code_length = 0                      
  173.   
  174.   
  175.             else:  
  176.                 global g_code_length  
  177.                 global g_header_length  
  178.                 mm=self.conn.recv(128)  
  179.                 if len(mm) <= 0:  
  180.                     continue  
  181.                 if g_code_length == 0:  
  182.                     get_datalength(mm)  
  183.                 #接受的长度  
  184.                 self.length_buffer = self.length_buffer + len(mm)  
  185.                 self.buffer = self.buffer + mm  
  186.                 if self.length_buffer - g_header_length < g_code_length :  
  187.                     continue  
  188.                 else :  
  189.                     self.buffer_utf8 = parse_data(self.buffer) #utf8                  
  190.                     msg_unicode = str(self.buffer_utf8).decode('utf-8''ignore'#unicode  
  191.                     if msg_unicode=='quit':  
  192.                         print (u'Socket%s Logout!' % (self.index))  
  193.                         nowTime = time.strftime('%H:%M:%S',time.localtime(time.time()))  
  194.                         sendMessage(u'%s %s say: %s' % (nowTime, self.remote, self.name+' Logout'))                        
  195.                         deleteconnection(str(self.index))  
  196.                         self.conn.close()  
  197.                         break #退出线程  
  198.                     else:  
  199.                         #print (u'Socket%s Got msg:%s from %s!' % (self.index, msg_unicode, self.remote))  
  200.                         nowTime = time.strftime(u'%H:%M:%S',time.localtime(time.time()))  
  201.                         sendMessage(u'%s %s say: %s' % (nowTime, self.remote, msg_unicode))    
  202.                     #重置buffer和bufferlength  
  203.                     self.buffer_utf8 = ""  
  204.                     self.buffer = ""  
  205.                     g_code_length = 0  
  206.                     self.length_buffer = 0  
  207.             self.buffer = ""  
  208.   
  209.   
  210. class WebSocketServer(object):  
  211.     def __init__(self):  
  212.         self.socket = None  
  213.     def begin(self):  
  214.         print'WebSocketServer Start!')  
  215.         self.socket = socket.socket(socket.AF_INET, socket.SOCK_STREAM)  
  216.         self.socket.setsockopt(socket.SOL_SOCKET,socket.SO_REUSEADDR,1)  
  217.         self.socket.bind(("127.0.0.1",12345))  
  218.         self.socket.listen(50)  
  219.   
  220.   
  221.         global connectionlist  
  222.   
  223.   
  224.         i=0  
  225.         while True:  
  226.             connection, address = self.socket.accept()  
  227.   
  228.   
  229.             username=address[0]       
  230.             newSocket = WebSocket(connection,i,username,address)  
  231.             newSocket.start() #开始线程,执行run函数  
  232.             connectionlist['connection'+str(i)]=connection  
  233.             i = i + 1  
  234.   
  235.   
  236. if __name__ == "__main__":  
  237.     server = WebSocketServer()  
  238.     server.begin()  


  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 1
    评论
评论 1
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值