ua_services_session.c 6.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128
  1. #include "ua_services.h"
  2. #include "ua_server_internal.h"
  3. #include "ua_session_manager.h"
  4. #include "ua_types_generated_encoding_binary.h"
  5. void Service_CreateSession(UA_Server *server, UA_SecureChannel *channel,
  6. const UA_CreateSessionRequest *request,
  7. UA_CreateSessionResponse *response) {
  8. response->responseHeader.serviceResult =
  9. UA_Array_copy(server->endpointDescriptions, (void**)&response->serverEndpoints,
  10. &UA_TYPES[UA_TYPES_ENDPOINTDESCRIPTION], server->endpointDescriptionsSize);
  11. if(response->responseHeader.serviceResult != UA_STATUSCODE_GOOD)
  12. return;
  13. response->serverEndpointsSize = server->endpointDescriptionsSize;
  14. UA_Session *newSession;
  15. response->responseHeader.serviceResult = UA_SessionManager_createSession(&server->sessionManager,
  16. channel, request, &newSession);
  17. if(response->responseHeader.serviceResult != UA_STATUSCODE_GOOD)
  18. return;
  19. //TODO get maxResponseMessageSize internally
  20. newSession->maxResponseMessageSize = request->maxResponseMessageSize;
  21. response->sessionId = newSession->sessionId;
  22. response->revisedSessionTimeout = newSession->timeout;
  23. response->authenticationToken = newSession->authenticationToken;
  24. response->responseHeader.serviceResult = UA_String_copy(&request->sessionName, &newSession->sessionName);
  25. if(server->endpointDescriptions)
  26. response->responseHeader.serviceResult |=
  27. UA_ByteString_copy(&server->endpointDescriptions->serverCertificate, &response->serverCertificate);
  28. if(response->responseHeader.serviceResult != UA_STATUSCODE_GOOD) {
  29. UA_SessionManager_removeSession(&server->sessionManager, server, &newSession->authenticationToken);
  30. return;
  31. }
  32. }
  33. void Service_ActivateSession(UA_Server *server, UA_SecureChannel *channel,
  34. const UA_ActivateSessionRequest *request,
  35. UA_ActivateSessionResponse *response) {
  36. // make the channel know about the session
  37. UA_Session *foundSession =
  38. UA_SessionManager_getSession(&server->sessionManager,
  39. (const UA_NodeId*)&request->requestHeader.authenticationToken);
  40. if(foundSession == UA_NULL) {
  41. response->responseHeader.serviceResult = UA_STATUSCODE_BADSESSIONIDINVALID;
  42. return;
  43. } else if(foundSession->validTill < UA_DateTime_now()) {
  44. response->responseHeader.serviceResult = UA_STATUSCODE_BADSESSIONIDINVALID;
  45. return;
  46. }
  47. UA_UserIdentityToken token;
  48. UA_UserIdentityToken_init(&token);
  49. size_t offset = 0;
  50. UA_UserIdentityToken_decodeBinary(&request->userIdentityToken.body, &offset, &token);
  51. UA_UserNameIdentityToken username_token;
  52. UA_UserNameIdentityToken_init(&username_token);
  53. UA_String ap = UA_STRING(ANONYMOUS_POLICY);
  54. UA_String up = UA_STRING(USERNAME_POLICY);
  55. //(Compatibility notice)
  56. //Siemens OPC Scout v10 provides an empty policyId, this is not okay
  57. //For compatibility we will assume that empty policyId == ANONYMOUS_POLICY
  58. //if(token.policyId.data == UA_NULL) {
  59. // /* 1) no policy defined */
  60. // response->responseHeader.serviceResult = UA_STATUSCODE_BADIDENTITYTOKENINVALID;
  61. //} else
  62. //(End Compatibility notice)
  63. if(server->config.Login_enableAnonymous && (token.policyId.data == UA_NULL || UA_String_equal(&token.policyId, &ap))) {
  64. /* 2) anonymous logins */
  65. if(foundSession->channel && foundSession->channel != channel)
  66. UA_SecureChannel_detachSession(foundSession->channel, foundSession);
  67. UA_SecureChannel_attachSession(channel, foundSession);
  68. foundSession->activated = UA_TRUE;
  69. UA_Session_updateLifetime(foundSession);
  70. } else if(server->config.Login_enableUsernamePassword && UA_String_equal(&token.policyId, &up)) {
  71. /* 3) username logins */
  72. offset = 0;
  73. UA_UserNameIdentityToken_decodeBinary(&request->userIdentityToken.body, &offset, &username_token);
  74. if(username_token.encryptionAlgorithm.data != UA_NULL) {
  75. /* 3.1) we only support encryption */
  76. response->responseHeader.serviceResult = UA_STATUSCODE_BADIDENTITYTOKENINVALID;
  77. } else if(username_token.userName.length == -1 && username_token.password.length == -1){
  78. /* 3.2) empty username and password */
  79. response->responseHeader.serviceResult = UA_STATUSCODE_BADIDENTITYTOKENINVALID;
  80. } else {
  81. /* 3.3) ok, trying to match the username */
  82. UA_UInt32 i = 0;
  83. for(; i < server->config.Login_loginsCount; ++i) {
  84. UA_String user = UA_STRING(server->config.Login_usernames[i]);
  85. UA_String pw = UA_STRING(server->config.Login_passwords[i]);
  86. if(UA_String_equal(&username_token.userName, &user) &&
  87. UA_String_equal(&username_token.password, &pw)) {
  88. /* success - activate */
  89. if(foundSession->channel && foundSession->channel != channel)
  90. UA_SecureChannel_detachSession(foundSession->channel, foundSession);
  91. UA_SecureChannel_attachSession(channel, foundSession);
  92. foundSession->activated = UA_TRUE;
  93. UA_Session_updateLifetime(foundSession);
  94. break;
  95. }
  96. }
  97. /* no username/pass matched */
  98. if(i >= server->config.Login_loginsCount)
  99. response->responseHeader.serviceResult = UA_STATUSCODE_BADUSERACCESSDENIED;
  100. }
  101. } else {
  102. response->responseHeader.serviceResult = UA_STATUSCODE_BADIDENTITYTOKENINVALID;
  103. }
  104. UA_UserIdentityToken_deleteMembers(&token);
  105. UA_UserNameIdentityToken_deleteMembers(&username_token);
  106. return;
  107. }
  108. void Service_CloseSession(UA_Server *server, UA_Session *session, const UA_CloseSessionRequest *request,
  109. UA_CloseSessionResponse *response) {
  110. UA_Session *foundSession =
  111. UA_SessionManager_getSession(&server->sessionManager,
  112. (const UA_NodeId*)&request->requestHeader.authenticationToken);
  113. if(foundSession == UA_NULL)
  114. response->responseHeader.serviceResult = UA_STATUSCODE_BADSESSIONIDINVALID;
  115. else
  116. response->responseHeader.serviceResult =
  117. UA_SessionManager_removeSession(&server->sessionManager, server, &session->authenticationToken);
  118. }