/ws-emit

Easily emit websocket events from any sources (python, php, bash, whatever) using redis or HTTP interface

Primary LanguagePythonMIT LicenseMIT

WS-Emit

WS-Emit is simple microservice app to send instant messages (websocket events) from backend to frontend web applications running in browser (one way). ws-emit handles CORS configuration and authentication mechanism for different room-spaces.

Example usages:

  • ecommerce website may update prices, stock and orders information on page in realtime, without need to refresh.
  • social network may show user if someone is writing new comment right now and display comment when it will be submitted
  • backend may update frontend about status of long-running requests, such as 'build is N% ready', 'deploying'

WS-Emit benefits:

  • Isolated microservice, not requires any integration with your application
  • Compatible with application in any programming languages (if they can send HTTP requests or publish data to redis), any frameworks, any application web server

WS-Emit is based on Flask-SocketIO and sending message is as simple as in any other flask-socketio application:

socketio.emit('update', data, room='time')

or via HTTP interface (see below):

curl -d @x.json -H "Content-Type: application/json" -X POST http://localhost:8899/emit

Screencast

See below for detailed explanation what every example does.

ws-emit screencast

Installation

pip3 install ws-emit

or, install right from github repo:

pip3 install git+https://github.com/yaroslaff/ws-emit

If you want to install as systemd service:

cp /usr/local/ws-emit/contrib/ws-emit /etc/default/
cp /usr/local/ws-emit/contrib/ws-emit.service /etc/systemd/system/
systemctl daemon-reload
systemctl enable ws-emit
systemctl start ws-emit

If you want to adjust CORS, ADDRESS or SECRET settings, edit /etc/default/ws-emit and restart service.

If you want to run manually from shell:

# specify default parameters
ws-emit.py -a 0.0.0.0:8899 --cors http://localhost:7788 --secret 123

Authentication and room-spaces

Room name optionally may have format roomspace::roomname (separated by '::'). When client wants to join such room it must provide secret matching redis key ws-emit::secret::*roomspace*. If secrets aren't match, join request is ignored. All rooms in same roomspace shares same secret. Backend must set this key in redis (e.g. SET ws-emit::secret::myroom MySecret_123) and pass secret to frontend.

Rooms without '::' in name, are public, anyone can join it. They are not suited to send any sensitive info.

Emitting messages over HTTP(s)

It's possible to emit messages from any sources (any programming languages, even from PHP or Perl or shell scripts. really.) using HTTP interface. Here is simple example how to emit websocket events right from shell using curl.

HTTP emitting requres secret, like:

./ws-emit.py --secret MySecret

or set SECRET=MySecret in /etc/default/ws-emit and restart ws-emit service.

JSON file x.json:

{
	"event": "update",
	"room": "time",
	"data": {
		"time": 111111
	},
	"namespace": null,
	"secret": "123"
}

command:

curl -d @x.json -H "Content-Type: application/json" -X POST http://localhost:8899/emit

You may run time.py example (see below) and execute this curl statement, it will send time 111111 and it will be displayed in browser for short time (less then 1s) until overwritten by next update.

ws-emit over nginx as https (wss://) proxy

run ws-emit at other port, edit /etc/default/ws-emit:

...
ADDRESS="127.0.0.1:8898"
...

/etc/nginx/sites-available/ws-emit:

map $http_upgrade $connection_upgrade {
    default Upgrade;
    ''      close;
}

server {
	listen 8899 ssl;
	server_name ...;
	ssl_certificate ...;
	ssl_certificate_key ...;
	
	location / {
		proxy_pass http://127.0.0.1:8898;
		proxy_http_version 1.1;
		proxy_set_header Upgrade $http_upgrade;
		proxy_set_header Connection $connection_upgrade;
		proxy_set_header Host $host;
   	}	
}

Examples

time

Time is simplest example. No authentication at all.

Start /usr/local/ws-emit/example/time.py in console. Navigate browser to http://localhost:7788/. You will see current system unixtime, it will update every second.

Make sure addresses are exactly matching to CORS value in ws-emit (--cors option or CORS= parameter in /etc/default/ws-emit), http://localhost:7788 (default) and http://127.0.0.1:7788 are different

dir2web

Dir2web is more complex example with authentication and room-spaces.

Create test web directory, e.g. mkdir /tmp/ws-emit. Start /usr/local/ws-emit/example/dir2web.py /tmp/ws-emit in console and open http://localhost:7788 in browser. You will see all files in this directory, if you will create new file (echo aaa > /tmp/ws-emit/aaa.txt), it will be immediately listed in browser. You can open file in browser, and if you will change file content (echo aaa2 > /tmp/ws-emit/aaa.txt) it will be immediately updated in browser.

dir2web uses roomspace dir and sets access key to this roomspace as redis-key ws-emit::room_secret::dir. This key is provided to JS code running in browser, and then JS code send key when join rooms inside this roomspace.

subspy

Subspy /usr/local/ws-emit/example/subspy.py it simple utility to sniff traffic in publish/subscribe redis channel.

Example output (from time.py example):

# /usr/local/ws-emit/example/subspy.py 
All channels: [b'flask-socketio']
INT: 1
{'method': 'emit', 'event': 'update', 'data': {'time': 1639178370}, 'namespace': '/', 'room': 'time', 'skip_sid': None, 'callback': None, 'host_id': 'ce56fbc176624c7e8511a583cd5030a8'}
{'method': 'emit', 'event': 'update', 'data': {'time': 1639178371}, 'namespace': '/', 'room': 'time', 'skip_sid': None, 'callback': None, 'host_id': 'ce56fbc176624c7e8511a583cd5030a8'}

You may use subspy to generate websocket events in other languages (But messages must be serialized in python pickle format).