本文整理汇总了Python中ws4py.framing.Frame类的典型用法代码示例。如果您正苦于以下问题:Python Frame类的具体用法?Python Frame怎么用?Python Frame使用的例子?那么恭喜您, 这里精选的类代码示例或许可以为您提供帮助。
在下文中一共展示了Frame类的15个代码示例,这些例子默认根据受欢迎程度排序。您可以为喜欢或者感觉有用的代码点赞,您的评价将有助于系统推荐出更棒的Python代码示例。
示例1: test_masking
def test_masking(self):
mask = "7\xfa!="
f = Frame(opcode=OPCODE_TEXT,
body='Hello', masking_key=mask, fin=1)
spec_says = '\x81\x857\xfa!=\x7f\x9fMQX'
self.assertEqual(f.build(), spec_says)
示例2: test_connect_and_close
def test_connect_and_close(self, sock):
s = MagicMock()
sock.socket.return_value = s
sock.getaddrinfo.return_value = [(socket.AF_INET, socket.SOCK_STREAM, 0, "",
("127.0.0.1", 80, 0, 0))]
c = WebSocketBaseClient(url="ws://127.0.0.1/?token=value")
s.recv.return_value = b"\r\n".join([
b"HTTP/1.1 101 Switching Protocols",
b"Connection: Upgrade",
b"Sec-Websocket-Version: 13",
b"Content-Type: text/plain;charset=utf-8",
b"Sec-Websocket-Accept: " + b64encode(sha1(c.key + WS_KEY).digest()),
b"Upgrade: websocket",
b"Date: Sun, 26 Jul 2015 12:32:55 GMT",
b"Server: ws4py/test",
b"\r\n"
])
c.connect()
s.connect.assert_called_once_with(("127.0.0.1", 80))
s.reset_mock()
c.close(code=1006, reason="boom")
args = s.sendall.call_args_list[0]
f = Frame()
f.parser.send(args[0][0])
f.parser.close()
self.assertIn(b'boom', f.unmask(f.body))
示例3: test_63_bit_length
def test_63_bit_length(self):
f = Frame(opcode=OPCODE_TEXT, body=b"*" * 65536, fin=1)
self.assertEqual(len(f.build()), 65546)
mask = os.urandom(4)
f = Frame(opcode=OPCODE_TEXT, body=b"*" * 65536, masking_key=mask, fin=1)
self.assertEqual(len(f.build()), 65550)
示例4: test_opcodes
def test_opcodes(self):
for opcode in [OPCODE_CONTINUATION, OPCODE_TEXT, OPCODE_BINARY, OPCODE_CLOSE, OPCODE_PING, OPCODE_PONG]:
f = Frame(opcode=opcode, body=b"", fin=1)
byte = ord(f.build()[0])
self.assertTrue(byte & opcode == opcode)
f = Frame(opcode=0x3, body=b"", fin=1)
self.assertRaises(ValueError, f.build)
示例5: test_masking
def test_masking(self):
if py3k: mask = b"7\xfa!="
else: mask = "7\xfa!="
f = Frame(opcode=OPCODE_TEXT,
body=enc('Hello'),
masking_key=mask, fin=1)
if py3k: spec_says = b'\x81\x857\xfa!=\x7f\x9fMQX'
else: spec_says = '\x81\x857\xfa!=\x7f\x9fMQX'
self.assertEqual(f.build(), spec_says)
示例6: received_message
def received_message(self, m):
# Assuming type of arraybuffer
xx = N.fromstring(m.data, N.int16, count=5)
# xx = N.fromstring(m.data, N.float32, count=4)
print xx
xx = xx*2;
f = Frame(OPCODE_BINARY, xx.tostring(), fin=1)
b = f.build()
yy = BinaryMessage(b)
for conn in SUBSCRIBERS:
conn.send(yy)
示例7: test_protocol_exception_from_frame_parsing
def test_protocol_exception_from_frame_parsing(self):
payload = struct.pack("!H", 1000) + b'hello'
f = Frame(opcode=OPCODE_CLOSE, body=payload,
fin=1, masking_key=os.urandom(4))
f.rsv1 = 1
f = f.build()
s = Stream()
self.assertEqual(len(s.errors), 0)
self.assertEqual(s.closing, None)
s.parser.send(f)
self.assertEqual(s.closing, None)
self.assertEqual(type(s.errors[0]), CloseControlMessage)
self.assertEqual(s.errors[0].code, 1002)
示例8: test_frame_sized_127
def test_frame_sized_127(self):
body = b'*'*65536
bytes = Frame(opcode=OPCODE_TEXT, body=body, fin=1).build()
f = Frame()
# determine how the size is stored
f.parser.send(bytes[:3])
self.assertTrue(f.masking_key is None)
# that's a large frame indeed
self.assertEqual(f.payload_length, 127)
# this will compute the actual application data size
# it will also read the first byte of data
# indeed the length is found from byte 3 to 10
f.parser.send(bytes[3:11])
self.assertEqual(f.payload_length, 65536)
# parse the rest of our data
f.parser.send(bytes[11:])
self.assertEqual(f.body, body)
# The same but this time we provide enough
# bytes so that the application's data length
# can be computed from the first generator's send call
f = Frame()
f.parser.send(bytes[:10])
self.assertTrue(f.masking_key is None)
self.assertEqual(f.payload_length, 65536)
# parse the rest of our data
f.parser.send(bytes[10:])
self.assertEqual(f.body, body)
# The same with masking given out gradually
mask = os.urandom(4)
bytes = Frame(opcode=OPCODE_TEXT, body=body, fin=1, masking_key=mask).build()
f = Frame()
f.parser.send(bytes[:10])
self.assertTrue(f.masking_key is None)
self.assertEqual(f.payload_length, 65536)
# parse the mask gradually
f.parser.send(bytes[10:12])
f.parser.send(bytes[12:])
self.assertEqual(f.unmask(f.body), body)
示例9: test_16_bit_length
def test_16_bit_length(self):
f = Frame(opcode=OPCODE_TEXT, body=b"*" * 126, fin=1)
self.assertEqual(len(f.build()), 130)
f = Frame(opcode=OPCODE_TEXT, body=b"*" * 65535, fin=1)
self.assertEqual(len(f.build()), 65539)
mask = os.urandom(4)
f = Frame(opcode=OPCODE_TEXT, body=b"*" * 126, masking_key=mask, fin=1)
self.assertEqual(len(f.build()), 134)
f = Frame(opcode=OPCODE_TEXT, body=b"*" * 65535, masking_key=mask, fin=1)
self.assertEqual(len(f.build()), 65543)
示例10: test_7_bit_length
def test_7_bit_length(self):
f = Frame(opcode=OPCODE_TEXT, body=b"", fin=1)
self.assertEqual(len(f.build()), 2)
f = Frame(opcode=OPCODE_TEXT, body=b"*" * 125, fin=1)
self.assertEqual(len(f.build()), 127)
mask = os.urandom(4)
f = Frame(opcode=OPCODE_TEXT, body=b"", masking_key=mask, fin=1)
self.assertEqual(len(f.build()), 6)
f = Frame(opcode=OPCODE_TEXT, body=b"*" * 125, masking_key=mask, fin=1)
self.assertEqual(len(f.build()), 131)
示例11: receiver
def receiver(self):
"""
Parser that keeps trying to interpret bytes it is fed with as
incoming frames part of a message.
Control message are single frames only while data messages, like text
and binary, may be fragmented accross frames.
The way it works is by instanciating a :class:`wspy.framing.Frame` object,
then running its parser generator which yields how much bytes
it requires to performs its task. The stream parser yields this value
to its caller and feeds the frame parser.
When the frame parser raises :exc:`StopIteration`, the stream parser
tries to make sense of the parsed frame. It dispatches the frame's bytes
to the most appropriate message type based on the frame's opcode.
Overall this makes the stream parser totally agonstic to
the data provider.
"""
utf8validator = Utf8Validator()
running = True
frame = None
while running:
frame = Frame()
while 1:
try:
bytes = (yield next(frame.parser))
frame.parser.send(bytes)
except StopIteration:
frame._cleanup()
bytes = frame.body
# Let's avoid unmasking when there is no payload
if bytes:
if frame.masking_key and self.expect_masking:
bytes = frame.unmask(bytes)
elif not frame.masking_key and self.expect_masking:
msg = CloseControlMessage(code=1002, reason='Missing masking when expected')
self.errors.append(msg)
break
elif frame.masking_key and not self.expect_masking:
msg = CloseControlMessage(code=1002, reason='Masked when not expected')
self.errors.append(msg)
break
else:
bytes = bytearray(bytes)
if frame.opcode == OPCODE_TEXT:
if self.message and not self.message.completed:
# We got a text frame before we completed the previous one
msg = CloseControlMessage(code=1002, reason='Received a new message before completing previous')
self.errors.append(msg)
break
m = TextMessage(bytes)
m.completed = (frame.fin == 1)
self.message = m
if bytes:
is_valid, end_on_code_point, _, _ = utf8validator.validate(bytes)
if not is_valid or (m.completed and not end_on_code_point):
self.errors.append(CloseControlMessage(code=1007, reason='Invalid UTF-8 bytes'))
break
elif frame.opcode == OPCODE_BINARY:
m = BinaryMessage(bytes)
m.completed = (frame.fin == 1)
self.message = m
elif frame.opcode == OPCODE_CONTINUATION:
m = self.message
if m is None:
self.errors.append(CloseControlMessage(code=1002, reason='Message not started yet'))
break
m.extend(bytes)
m.completed = (frame.fin == 1)
if m.opcode == OPCODE_TEXT:
if bytes:
is_valid, end_on_code_point, _, _ = utf8validator.validate(bytes)
if not is_valid or (m.completed and not end_on_code_point):
self.errors.append(CloseControlMessage(code=1007, reason='Invalid UTF-8 bytes'))
break
elif frame.opcode == OPCODE_CLOSE:
code = 1000
reason = ""
if frame.payload_length == 0:
self.closing = CloseControlMessage(code=1000)
elif frame.payload_length == 1:
self.closing = CloseControlMessage(code=1002, reason='Payload has invalid length')
else:
try:
code = int(unpack("!H", enc(bytes[0:2]))[0])
except TypeError:
code = 1002
reason = 'Invalid Closing Frame Code Type'
#.........这里部分代码省略.........
示例12: test_passing_encoded_string
def test_passing_encoded_string(self):
# once encoded the u'\xe9' character will be of length 2
f = Frame(opcode=OPCODE_TEXT, body=u'\xe9trange'.encode('utf-8'), fin=1)
self.assertEqual(len(f.build()), 10)
示例13: test_frame_too_large
def test_frame_too_large(self):
f = Frame(opcode=OPCODE_TEXT, body=b'', fin=1)
# fake huge length
f.payload_length = 1 << 63
self.assertRaises(FrameTooLargeException, f.build)
示例14: receiver
def receiver(self):
global logAudio
"""
Parser that keeps trying to interpret bytes it is fed with as
incoming frames part of a message.
Control message are single frames only while data messages, like text
and binary, may be fragmented accross frames.
The way it works is by instanciating a :class:`wspy.framing.Frame` object,
then running its parser generator which yields how much bytes
it requires to performs its task. The stream parser yields this value
to its caller and feeds the frame parser.
When the frame parser raises :exc:`StopIteration`, the stream parser
tries to make sense of the parsed frame. It dispatches the frame's bytes
to the most appropriate message type based on the frame's opcode.
Overall this makes the stream parser totally agonstic to
the data provider.
"""
logAudio=settings.getVal("logAudio")
print("debug: streaming.py in receiver function | logAudio=%s" % logAudio)
utf8validator = Utf8Validator()
running = True
frame = None
while running:
frame = Frame()
while 1:
try:
some_bytes = (yield next(frame.parser))
frame.parser.send(some_bytes)
except GeneratorExit:
running = False
break
except StopIteration:
frame._cleanup()
some_bytes = frame.body
# Let's avoid unmasking when there is no payload
if some_bytes:
if frame.masking_key and self.expect_masking:
some_bytes = frame.unmask(some_bytes)
elif not frame.masking_key and self.expect_masking:
msg = CloseControlMessage(code=1002, reason='Missing masking when expected')
self.errors.append(msg)
break
elif frame.masking_key and not self.expect_masking:
msg = CloseControlMessage(code=1002, reason='Masked when not expected')
self.errors.append(msg)
break
else:
# If we reach this stage, it's because
# the frame wasn't masked and we didn't expect
# it anyway. Therefore, on py2k, the bytes
# are actually a str object and can't be used
# in the utf8 validator as we need integers
# when we get each byte one by one.
# Our only solution here is to convert our
# string to a bytearray.
some_bytes = bytearray(some_bytes)
if frame.opcode == OPCODE_TEXT:
if self.message and not self.message.completed:
# We got a text frame before we completed the previous one
msg = CloseControlMessage(code=1002, reason='Received a new message before completing previous')
self.errors.append(msg)
break
m = TextMessage(some_bytes)
m.completed = (frame.fin == 1)
self.message = m
if some_bytes:
is_valid, end_on_code_point, _, _ = utf8validator.validate(some_bytes)
if not is_valid or (m.completed and not end_on_code_point):
self.errors.append(CloseControlMessage(code=1007, reason='Invalid UTF-8 bytes'))
break
elif frame.opcode == OPCODE_BINARY:
if self.message and not self.message.completed:
# We got a text frame before we completed the previous one
msg = CloseControlMessage(code=1002, reason='Received a new message before completing previous')
self.errors.append(msg)
break
if logAudio != "0":
print("debug:: received a binary frame with %d bytes, log it via localhost listner (port:%s)" % (len(some_bytes),logAudio))
#bstr1=""
#for i in range(20):
# str1="%d " % some_bytes[i]
# bstr1 = bstr1 + " " + str1
#print("binary msg 1st 20 bytes: %s" % bstr1)
# Create a TCP/IP socket
sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
#.........这里部分代码省略.........
示例15: receiver
def receiver(self):
"""
Parser that keeps trying to interpret bytes it is fed with as
incoming frames part of a message.
Control message are single frames only while data messages, like text
and binary, may be fragmented accross frames.
The way it works is by instanciating a framing.Frame object,
then running its parser generator which yields how much bytes
it requires to performs its task. The stream parser yields this value
to its caller and feeds the frame parser.
When the frame parser raises StopIteration, the stream parser
tries to make sense of the parsed frame. It dispatches the frame's bytes
to the most appropriate message type based on the frame's opcode.
Overall this makes the stream parser totally agonstic to
the data provider.
"""
utf8validator = Utf8Validator()
running = True
while running:
frame = Frame()
while True:
try:
bytes = (yield frame.parser.next())
if bytes is None:
raise InvalidBytesError()
frame.parser.send(bytes)
except StopIteration:
bytes = frame.body or ''
if frame.masking_key and bytes:
bytes = frame.unmask(bytes)
if frame.opcode == OPCODE_TEXT:
if self.message and not self.message.completed:
# We got a text frame before we completed the previous one
self.errors.append(CloseControlMessage(code=1002))
break
is_valid, _, _, _ = utf8validator.validate(bytes)
if is_valid or (not is_valid and frame.fin == 0):
m = TextMessage(bytes)
m.completed = (frame.fin == 1)
self.message = m
elif not is_valid and frame.fin == 1:
self.errors.append(CloseControlMessage(code=1007))
elif frame.opcode == OPCODE_BINARY:
m = BinaryMessage(bytes)
m.completed = (frame.fin == 1)
self.message = m
elif frame.opcode == OPCODE_CONTINUATION:
m = self.message
if m is None:
self.errors.append(CloseControlMessage(code=1002))
break
m.completed = (frame.fin == 1)
if m.opcode == OPCODE_TEXT:
is_valid, _, _, _ = utf8validator.validate(bytes)
if is_valid:
m.extend(bytes)
else:
self.errors.append(CloseControlMessage(code=1007))
#except UnicodeDecodeError:
# self.errors.append(CloseControlMessage(code=1007))
# break
else:
m.extend(bytes)
elif frame.opcode == OPCODE_CLOSE:
code = 1000
reason = ""
if len(bytes) == 0:
self.errors.append(CloseControlMessage(code=1000))
elif 1 < len(bytes) < 126:
code = struct.unpack("!H", str(bytes[0:2]))[0]
try:
code = int(code)
except TypeError:
code = 1002
reason = 'Invalid Closing Frame Code Type'
else:
# Those codes are reserved or plainly forbidden
if code < 1000 or code in [1004, 1005, 1006, 1012, 1013, 1014, 1015,
1016, 1100, 2000, 2999, 5000, 65536]:
code = 1002
reason = 'Invalid Closing Frame Code'
else:
if len(bytes) > 2:
try:
reason = frame.body[2:].decode("utf-8")
except UnicodeDecodeError:
code = 1007
#.........这里部分代码省略.........