server.pykeine Daten
from twisted.python import log
from twisted.internet import reactor,ssl, protocol
import config
import uuid
import json
import header
class cl:
clients = list()
source = None
sourceID = None
sent_header = list()
id3_headers = {
"pyc-title": "None",
"pyc-length": "0",
}
class RadioServer(protocol.Protocol):
def connectionMade(self):
if config.PyCasterMaxListeners != len(cl.clients):
self.id = str(uuid.uuid4())
self.peer = str(self.transport.getPeer())
self.transport.write(header.header)
cl.clients.append(self)
print("Client-Connected-IP: "+self.peer)
print("Client-Connected-ID: " + self.id)
else:
self.transport.abortConnection()
def connectionLost(self, reason):
if self.id == cl.sourceID:
print("Source-Closed: "+ str(reason))
cl.sourceID = None
cl.source = None
else:
self.removeClient(self.id)
print("Client-Closed-Reason: " + reason)
print("Client-Closed-IP: " + self.peer)
print("Client-Closed-ID: " + self.id)
def dataReceived(self, data):
dct = json.loads(data, encoding="utf8")
if dct.has_key("PyCasterAuth"):
if not cl.sourceID:
auth = dct['PyCasterAuth']
if auth == config.PyCasterAuth:
cl.source = self
cl.sourceID = self.id
self.transport.write("ok")
print("Source-Registered")
print("Source-ID: " + self.id)
else:
cl.source.transport.write("denied")
print("Source-Login-Denied-IP: " + self.peer)
print("Source-Login-Denied-ID: " + self.id)
else:
print("Source-Exists-IP: " + self.peer)
print("Source-Exists-ID: " + self.id)
self.closeCl(self.id)
elif dct.has_key("buffer"):
buffer = dct['buffer']
self.sendClients(buffer, bin=True)
elif dct.has_key("info"):
cl.id3_headers = dct['info']
def removeClient(self, id):
for client in cl.clients:
if client.id == id:
cl.clients.remove(cl)
if client in cl.sent_header:
cl.sent_header.remove(client)
def closeCl(self, id):
for client in cl.clients:
if client.id == id:
self.removeClient(id)
client.transport.abortConnection()
print("Server-Closed-Client: (%s, %s)" % (id, client.peer))
def sendClients(self, msg, bin=False):
for client in cl.clients:
if bin:
if client not in cl.sent_header:
head = header.header
for k, v in iter(cl.id3_headers.items()):
head += k + ":" + v
client.transport.write("HTTP/1.1 200 OK\r\n")
client.transport.write(head)
client.transport.write(msg)
if config.PyCasterSendLogging:
print("SENT %i bytes TO %s" % (len(msg), client.id))
if __name__=="__main__":
import sys
key = config.PyCasterSSLKey
cert = config.PyCasterSSLCert
factory = protocol.Factory()
log.startLogging(sys.stdout)
factory.protocol = RadioServer
if config.PyCasterSSL:
reactor.listenSSL(config.PyCasterPort, factory, ssl.DefaultOpenSSLContextFactory(key, cert))
reactor.run()
else:
reactor.listenTCP(config.PyCasterPort, factory)
reactor.run()
config.py
PyCasterAuth = "123abc"
PyCasterPort = 4446
PyCasterSSL = False
PyCasterSSLKey = None
PyCasterSSLCert = None
PyCasterMaxListeners = 32
PyCasterSendLogging = True
PyCasterLogFile=open("pycaster.log", "w") #can be sys.stdout
header.py
enthält eine Variable der Kopfdaten zu senden
I bereitgestellt, um die ganze gesendet werden Server, damit Sie mein Problem ausführen und verstehen können. Nachdem die Authentifizierung gesendet wird, wenn sie korrekt ist, sendet der Server ok
, aber das Problem ist self.transport.write("ok")
wird nicht vom Client gesehen. Ich habe versucht zu googeln, aber ich habe keine Korrekturen.