Files
MicroPythonOS/draft_code/modwebsocket_test.py
T
Thomas Farstrike 25a7aa37b5 improve websocket
2025-05-18 17:04:53 +02:00

141 lines
4.0 KiB
Python

import socket
import ssl
import ubinascii
from websocket import websocket
# Connect to Wi-Fi (disabled as per your code)
if False:
wlan = network.WLAN(network.STA_IF)
wlan.active(True)
wlan.connect('your_ssid', 'your_password')
while not wlan.isconnected():
pass
print('Connected:', wlan.ifconfig())
# Resolve hostname
host = 'echo.websocket.events'
port = 443
try:
addr_info = socket.getaddrinfo(host, port)[0][-1]
print('Resolved address:', addr_info)
except Exception as e:
print('DNS resolution failed:', e)
raise
# Create and connect socket
sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
try:
sock.connect(addr_info)
print('Socket connected')
except Exception as e:
print('Connect failed:', e)
sock.close()
raise
# Wrap socket with SSL
try:
ssl_sock = ssl.wrap_socket(sock, server_hostname=host)
print('SSL connection established')
except Exception as e:
print('SSL wrap failed:', e)
sock.close()
raise
# Perform WebSocket handshake
key = ubinascii.b2a_base64(b'random_bytes_here').strip()
handshake = (
'GET / HTTP/1.1\r\n'
'Host: {}\r\n'
'Upgrade: websocket\r\n'
'Connection: Upgrade\r\n'
'Sec-WebSocket-Key: {}\r\n'
'Sec-WebSocket-Version: 13\r\n'
'\r\n'
).format(host, key.decode())
# Send handshake request
try:
bytes_written = ssl_sock.write(handshake.encode())
print('Handshake sent, bytes written:', bytes_written)
print('Handshake request:', handshake)
except Exception as e:
print('Failed to send handshake:', e)
ssl_sock.close()
raise
# Read HTTP response until \r\n\r\n
response_bytes = bytearray()
max_read = 1024 # Maximum bytes to read
read_timeout = 2 # Reduced timeout (seconds)
import time
start_time = time.time()
while len(response_bytes) < max_read:
try:
chunk = ssl_sock.read(128)
if not chunk:
print('No more data received (EOF)')
break
print('Received chunk, length:', len(chunk), 'bytes:', chunk)
response_bytes.extend(chunk)
print('Total bytes received:', len(response_bytes))
# Check for end of HTTP headers (\r\n\r\n)
if b'\r\n\r\n' in response_bytes:
print('End of HTTP headers detected')
break
except Exception as e:
print('Error reading chunk:', e)
break
if time.time() - start_time > read_timeout:
print('Read timeout reached')
break
# Inspect raw bytes
print('Raw response bytes:', response_bytes)
print('Raw response hex:', response_bytes.hex())
# Split HTTP response from any subsequent data
http_end = response_bytes.find(b'\r\n\r\n') + 4
if http_end < 4:
ssl_sock.close()
raise Exception('Invalid HTTP response: no headers found')
http_response_bytes = response_bytes[:http_end]
extra_bytes = response_bytes[http_end:] if http_end < len(response_bytes) else b''
print('HTTP response bytes:', http_response_bytes)
print('Extra bytes (if any):', extra_bytes)
# Decode HTTP response
try:
response = http_response_bytes.decode('utf-8')
print('Decoded HTTP response:', response)
except UnicodeError as e:
print('UnicodeError during decode:', e)
# Dump printable characters as fallback
printable = ''.join(c if 32 <= ord(c) < 127 else '.' for c in http_response_bytes.decode('latin-1'))
print('Printable characters:', printable)
ssl_sock.close()
raise Exception('Failed to decode HTTP response')
# Check for valid WebSocket handshake
if '101 Switching Protocols' not in response:
print('Handshake response:', response)
ssl_sock.close()
raise Exception('Handshake failed')
# Push back extra bytes (WebSocket frame) to the socket
if extra_bytes:
print('Note: Extra bytes detected, will be handled by websocket module')
# Create WebSocket object
ws = websocket(ssl_sock, True)
# Send and receive data
ws.write('Hello, Secure WebSocket!')
for _ in range(50):
data = ws.read(1024)
print('Received:', data)
time.sleep_ms(100)
# Close connection
ws.close()