ua_config_default.c 27 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726
  1. /* This work is licensed under a Creative Commons CCZero 1.0 Universal License.
  2. * See http://creativecommons.org/publicdomain/zero/1.0/ for more information.
  3. *
  4. * Copyright 2017 (c) Fraunhofer IOSB (Author: Julius Pfrommer)
  5. * Copyright 2017 (c) Julian Grothoff
  6. * Copyright 2017-2018 (c) Mark Giraud, Fraunhofer IOSB
  7. * Copyright 2017 (c) Stefan Profanter, fortiss GmbH
  8. * Copyright 2017 (c) Thomas Stalder, Blue Time Concept SA
  9. * Copyright 2018 (c) Daniel Feist, Precitec GmbH & Co. KG
  10. * Copyright 2018 (c) Fabian Arndt, Root-Core
  11. */
  12. #include "ua_plugin_securitypolicy.h"
  13. #include "ua_config_default.h"
  14. #include "ua_client_config.h"
  15. #include "ua_log_stdout.h"
  16. #include "ua_network_tcp.h"
  17. #include "ua_accesscontrol_default.h"
  18. #include "ua_pki_certificate.h"
  19. #include "ua_nodestore_default.h"
  20. #include "ua_securitypolicies.h"
  21. /* Struct initialization works across ANSI C/C99/C++ if it is done when the
  22. * variable is first declared. Assigning values to existing structs is
  23. * heterogeneous across the three. */
  24. static UA_INLINE UA_UInt32Range
  25. UA_UINT32RANGE(UA_UInt32 min, UA_UInt32 max) {
  26. UA_UInt32Range range = {min, max};
  27. return range;
  28. }
  29. static UA_INLINE UA_DurationRange
  30. UA_DURATIONRANGE(UA_Duration min, UA_Duration max) {
  31. UA_DurationRange range = {min, max};
  32. return range;
  33. }
  34. /*******************************/
  35. /* Default Connection Settings */
  36. /*******************************/
  37. const UA_ConnectionConfig UA_ConnectionConfig_default = {
  38. 0, /* .protocolVersion */
  39. 65535, /* .sendBufferSize, 64k per chunk */
  40. 65535, /* .recvBufferSize, 64k per chunk */
  41. 0, /* .maxMessageSize, 0 -> unlimited */
  42. 0 /* .maxChunkCount, 0 -> unlimited */
  43. };
  44. /***************************/
  45. /* Default Server Settings */
  46. /***************************/
  47. #define MANUFACTURER_NAME "open62541"
  48. #define PRODUCT_NAME "open62541 OPC UA Server"
  49. #define PRODUCT_URI "http://open62541.org"
  50. #define APPLICATION_NAME "open62541-based OPC UA Application"
  51. #define APPLICATION_URI "urn:unconfigured:application"
  52. #define STRINGIFY(arg) #arg
  53. #define VERSION(MAJOR, MINOR, PATCH, LABEL) \
  54. STRINGIFY(MAJOR) "." STRINGIFY(MINOR) "." STRINGIFY(PATCH) LABEL
  55. static UA_StatusCode
  56. createSecurityPolicyNoneEndpoint(UA_ServerConfig *conf, UA_Endpoint *endpoint,
  57. const UA_ByteString localCertificate) {
  58. UA_EndpointDescription_init(&endpoint->endpointDescription);
  59. UA_SecurityPolicy_None(&endpoint->securityPolicy, NULL, localCertificate, conf->logger);
  60. endpoint->endpointDescription.securityMode = UA_MESSAGESECURITYMODE_NONE;
  61. endpoint->endpointDescription.securityPolicyUri =
  62. UA_STRING_ALLOC("http://opcfoundation.org/UA/SecurityPolicy#None");
  63. endpoint->endpointDescription.transportProfileUri =
  64. UA_STRING_ALLOC("http://opcfoundation.org/UA-Profile/Transport/uatcp-uasc-uabinary");
  65. /* Enable all login mechanisms from the access control plugin */
  66. UA_StatusCode retval = UA_Array_copy(conf->accessControl.userTokenPolicies,
  67. conf->accessControl.userTokenPoliciesSize,
  68. (void **)&endpoint->endpointDescription.userIdentityTokens,
  69. &UA_TYPES[UA_TYPES_USERTOKENPOLICY]);
  70. if(retval != UA_STATUSCODE_GOOD)
  71. return retval;
  72. endpoint->endpointDescription.userIdentityTokensSize =
  73. conf->accessControl.userTokenPoliciesSize;
  74. UA_String_copy(&localCertificate, &endpoint->endpointDescription.serverCertificate);
  75. UA_ApplicationDescription_copy(&conf->applicationDescription,
  76. &endpoint->endpointDescription.server);
  77. return UA_STATUSCODE_GOOD;
  78. }
  79. void
  80. UA_ServerConfig_set_customHostname(UA_ServerConfig *config, const UA_String customHostname) {
  81. if(!config)
  82. return;
  83. UA_String_deleteMembers(&config->customHostname);
  84. UA_String_copy(&customHostname, &config->customHostname);
  85. }
  86. #ifdef UA_ENABLE_ENCRYPTION
  87. static UA_StatusCode
  88. createSecurityPolicyBasic128Rsa15Endpoint(UA_ServerConfig *const conf,
  89. UA_Endpoint *endpoint,
  90. UA_MessageSecurityMode securityMode,
  91. const UA_ByteString localCertificate,
  92. const UA_ByteString localPrivateKey) {
  93. UA_EndpointDescription_init(&endpoint->endpointDescription);
  94. UA_StatusCode retval =
  95. UA_SecurityPolicy_Basic128Rsa15(&endpoint->securityPolicy, &conf->certificateVerification,
  96. localCertificate, localPrivateKey, conf->logger);
  97. if(retval != UA_STATUSCODE_GOOD) {
  98. endpoint->securityPolicy.deleteMembers(&endpoint->securityPolicy);
  99. return retval;
  100. }
  101. endpoint->endpointDescription.securityMode = securityMode;
  102. endpoint->endpointDescription.securityPolicyUri =
  103. UA_STRING_ALLOC("http://opcfoundation.org/UA/SecurityPolicy#Basic128Rsa15");
  104. endpoint->endpointDescription.transportProfileUri =
  105. UA_STRING_ALLOC("http://opcfoundation.org/UA-Profile/Transport/uatcp-uasc-uabinary");
  106. /* Enable all login mechanisms from the access control plugin */
  107. retval = UA_Array_copy(conf->accessControl.userTokenPolicies,
  108. conf->accessControl.userTokenPoliciesSize,
  109. (void **)&endpoint->endpointDescription.userIdentityTokens,
  110. &UA_TYPES[UA_TYPES_USERTOKENPOLICY]);
  111. if(retval != UA_STATUSCODE_GOOD)
  112. return retval;
  113. endpoint->endpointDescription.userIdentityTokensSize =
  114. conf->accessControl.userTokenPoliciesSize;
  115. UA_String_copy(&localCertificate, &endpoint->endpointDescription.serverCertificate);
  116. UA_ApplicationDescription_copy(&conf->applicationDescription,
  117. &endpoint->endpointDescription.server);
  118. return UA_STATUSCODE_GOOD;
  119. }
  120. static UA_StatusCode
  121. createSecurityPolicyBasic256Sha256Endpoint(UA_ServerConfig *const conf,
  122. UA_Endpoint *endpoint,
  123. UA_MessageSecurityMode securityMode,
  124. const UA_ByteString localCertificate,
  125. const UA_ByteString localPrivateKey) {
  126. UA_EndpointDescription_init(&endpoint->endpointDescription);
  127. UA_StatusCode retval =
  128. UA_SecurityPolicy_Basic256Sha256(&endpoint->securityPolicy, &conf->certificateVerification, localCertificate,
  129. localPrivateKey, conf->logger);
  130. if(retval != UA_STATUSCODE_GOOD) {
  131. endpoint->securityPolicy.deleteMembers(&endpoint->securityPolicy);
  132. return retval;
  133. }
  134. endpoint->endpointDescription.securityMode = securityMode;
  135. endpoint->endpointDescription.securityPolicyUri =
  136. UA_STRING_ALLOC("http://opcfoundation.org/UA/SecurityPolicy#Basic256Sha256");
  137. endpoint->endpointDescription.transportProfileUri =
  138. UA_STRING_ALLOC("http://opcfoundation.org/UA-Profile/Transport/uatcp-uasc-uabinary");
  139. /* Enable all login mechanisms from the access control plugin */
  140. retval = UA_Array_copy(conf->accessControl.userTokenPolicies,
  141. conf->accessControl.userTokenPoliciesSize,
  142. (void **)&endpoint->endpointDescription.userIdentityTokens,
  143. &UA_TYPES[UA_TYPES_USERTOKENPOLICY]);
  144. if(retval != UA_STATUSCODE_GOOD)
  145. return retval;
  146. endpoint->endpointDescription.userIdentityTokensSize =
  147. conf->accessControl.userTokenPoliciesSize;
  148. UA_String_copy(&localCertificate, &endpoint->endpointDescription.serverCertificate);
  149. UA_ApplicationDescription_copy(&conf->applicationDescription,
  150. &endpoint->endpointDescription.server);
  151. return UA_STATUSCODE_GOOD;
  152. }
  153. #endif
  154. const size_t usernamePasswordsSize = 2;
  155. UA_UsernamePasswordLogin usernamePasswords[2] = {
  156. {UA_STRING_STATIC("user1"), UA_STRING_STATIC("password")},
  157. {UA_STRING_STATIC("user2"), UA_STRING_STATIC("password1")}};
  158. static UA_ServerConfig *
  159. createDefaultConfig(void) {
  160. UA_ServerConfig *conf = (UA_ServerConfig *)UA_malloc(sizeof(UA_ServerConfig));
  161. if(!conf)
  162. return NULL;
  163. /* Zero out.. All members have a valid initial value */
  164. memset(conf, 0, sizeof(UA_ServerConfig));
  165. /* --> Start setting the default static config <-- */
  166. conf->nThreads = 1;
  167. conf->logger = UA_Log_Stdout;
  168. /* Server Description */
  169. conf->buildInfo.productUri = UA_STRING_ALLOC(PRODUCT_URI);
  170. conf->buildInfo.manufacturerName = UA_STRING_ALLOC(MANUFACTURER_NAME);
  171. conf->buildInfo.productName = UA_STRING_ALLOC(PRODUCT_NAME);
  172. conf->buildInfo.softwareVersion =
  173. UA_STRING_ALLOC(VERSION(UA_OPEN62541_VER_MAJOR, UA_OPEN62541_VER_MINOR,
  174. UA_OPEN62541_VER_PATCH, UA_OPEN62541_VER_LABEL));
  175. conf->buildInfo.buildNumber = UA_STRING_ALLOC(__DATE__
  176. " "
  177. __TIME__);
  178. conf->buildInfo.buildDate = 0;
  179. conf->applicationDescription.applicationUri = UA_STRING_ALLOC(APPLICATION_URI);
  180. conf->applicationDescription.productUri = UA_STRING_ALLOC(PRODUCT_URI);
  181. conf->applicationDescription.applicationName =
  182. UA_LOCALIZEDTEXT_ALLOC("en", APPLICATION_NAME);
  183. conf->applicationDescription.applicationType = UA_APPLICATIONTYPE_SERVER;
  184. /* conf->applicationDescription.gatewayServerUri = UA_STRING_NULL; */
  185. /* conf->applicationDescription.discoveryProfileUri = UA_STRING_NULL; */
  186. /* conf->applicationDescription.discoveryUrlsSize = 0; */
  187. /* conf->applicationDescription.discoveryUrls = NULL; */
  188. #ifdef UA_ENABLE_DISCOVERY
  189. /* conf->mdnsServerName = UA_STRING_NULL; */
  190. /* conf->serverCapabilitiesSize = 0; */
  191. /* conf->serverCapabilities = NULL; */
  192. #endif
  193. /* Custom DataTypes */
  194. /* conf->customDataTypesSize = 0; */
  195. /* conf->customDataTypes = NULL; */
  196. /* Networking */
  197. /* conf->networkLayersSize = 0; */
  198. /* conf->networkLayers = NULL; */
  199. /* conf->customHostname = UA_STRING_NULL; */
  200. /* Endpoints */
  201. /* conf->endpoints = {0, NULL}; */
  202. /* Certificate Verification that accepts every certificate. Can be
  203. * overwritten when the policy is specialized. */
  204. UA_CertificateVerification_AcceptAll(&conf->certificateVerification);
  205. /* Global Node Lifecycle */
  206. conf->nodeLifecycle.constructor = NULL;
  207. conf->nodeLifecycle.destructor = NULL;
  208. /* Access Control. Anonymous Login only. */
  209. conf->accessControl = UA_AccessControl_default(true, usernamePasswordsSize, usernamePasswords);
  210. /* Relax constraints for the InformationModel */
  211. conf->relaxEmptyValueConstraint = true; /* Allow empty values */
  212. /* Limits for SecureChannels */
  213. conf->maxSecureChannels = 40;
  214. conf->maxSecurityTokenLifetime = 10 * 60 * 1000; /* 10 minutes */
  215. /* Limits for Sessions */
  216. conf->maxSessions = 100;
  217. conf->maxSessionTimeout = 60.0 * 60.0 * 1000.0; /* 1h */
  218. /* Limits for Subscriptions */
  219. conf->publishingIntervalLimits = UA_DURATIONRANGE(100.0, 3600.0 * 1000.0);
  220. conf->lifeTimeCountLimits = UA_UINT32RANGE(3, 15000);
  221. conf->keepAliveCountLimits = UA_UINT32RANGE(1, 100);
  222. conf->maxNotificationsPerPublish = 1000;
  223. conf->maxRetransmissionQueueSize = 0; /* unlimited */
  224. #ifdef UA_ENABLE_SUBSCRIPTIONS_EVENTS
  225. conf->maxEventsPerNode = 0; /* unlimited */
  226. #endif
  227. /* Limits for MonitoredItems */
  228. conf->samplingIntervalLimits = UA_DURATIONRANGE(50.0, 24.0 * 3600.0 * 1000.0);
  229. conf->queueSizeLimits = UA_UINT32RANGE(1, 100);
  230. #ifdef UA_ENABLE_DISCOVERY
  231. conf->discoveryCleanupTimeout = 60 * 60;
  232. #endif
  233. #ifdef UA_ENABLE_HISTORIZING
  234. /* conf->accessHistoryDataCapability = UA_FALSE; */
  235. /* conf->maxReturnDataValues = 0; */
  236. /* conf->accessHistoryEventsCapability = UA_FALSE; */
  237. /* conf->maxReturnEventValues = 0; */
  238. /* conf->insertDataCapability = UA_FALSE; */
  239. /* conf->insertEventCapability = UA_FALSE; */
  240. /* conf->insertAnnotationsCapability = UA_FALSE; */
  241. /* conf->replaceDataCapability = UA_FALSE; */
  242. /* conf->replaceEventCapability = UA_FALSE; */
  243. /* conf->updateDataCapability = UA_FALSE; */
  244. /* conf->updateEventCapability = UA_FALSE; */
  245. /* conf->deleteRawCapability = UA_FALSE; */
  246. /* conf->deleteEventCapability = UA_FALSE; */
  247. /* conf->deleteAtTimeDataCapability = UA_FALSE; */
  248. #endif
  249. /* --> Finish setting the default static config <-- */
  250. return conf;
  251. }
  252. static UA_StatusCode
  253. addDefaultNetworkLayers(UA_ServerConfig *conf, UA_UInt16 portNumber, UA_UInt32 sendBufferSize, UA_UInt32 recvBufferSize) {
  254. /* Add a network layer */
  255. conf->networkLayers = (UA_ServerNetworkLayer *)
  256. UA_malloc(sizeof(UA_ServerNetworkLayer));
  257. if(!conf->networkLayers)
  258. return UA_STATUSCODE_BADOUTOFMEMORY;
  259. UA_ConnectionConfig config = UA_ConnectionConfig_default;
  260. if (sendBufferSize > 0)
  261. config.sendBufferSize = sendBufferSize;
  262. if (recvBufferSize > 0)
  263. config.recvBufferSize = recvBufferSize;
  264. conf->networkLayers[0] =
  265. UA_ServerNetworkLayerTCP(config, portNumber, conf->logger);
  266. conf->networkLayersSize = 1;
  267. return UA_STATUSCODE_GOOD;
  268. }
  269. UA_ServerConfig *
  270. UA_ServerConfig_new_customBuffer(UA_UInt16 portNumber,
  271. const UA_ByteString *certificate,
  272. UA_UInt32 sendBufferSize,
  273. UA_UInt32 recvBufferSize) {
  274. UA_ServerConfig *conf = createDefaultConfig();
  275. UA_StatusCode retval = UA_Nodestore_default_new(&conf->nodestore);
  276. if(retval != UA_STATUSCODE_GOOD) {
  277. UA_ServerConfig_delete(conf);
  278. return NULL;
  279. }
  280. if(addDefaultNetworkLayers(conf, portNumber, sendBufferSize, recvBufferSize) != UA_STATUSCODE_GOOD) {
  281. UA_ServerConfig_delete(conf);
  282. return NULL;
  283. }
  284. /* Allocate the endpoint */
  285. conf->endpointsSize = 1;
  286. conf->endpoints = (UA_Endpoint *)UA_malloc(sizeof(UA_Endpoint));
  287. if(!conf->endpoints) {
  288. UA_ServerConfig_delete(conf);
  289. return NULL;
  290. }
  291. /* Populate the endpoint */
  292. UA_ByteString localCertificate = UA_BYTESTRING_NULL;
  293. if(certificate)
  294. localCertificate = *certificate;
  295. retval =
  296. createSecurityPolicyNoneEndpoint(conf, &conf->endpoints[0], localCertificate);
  297. if(retval != UA_STATUSCODE_GOOD) {
  298. UA_ServerConfig_delete(conf);
  299. return NULL;
  300. }
  301. return conf;
  302. }
  303. #ifdef UA_ENABLE_ENCRYPTION
  304. UA_ServerConfig *
  305. UA_ServerConfig_new_basic128rsa15(UA_UInt16 portNumber,
  306. const UA_ByteString *certificate,
  307. const UA_ByteString *privateKey,
  308. const UA_ByteString *trustList,
  309. size_t trustListSize,
  310. const UA_ByteString *revocationList,
  311. size_t revocationListSize) {
  312. UA_ServerConfig *conf = createDefaultConfig();
  313. UA_StatusCode retval = UA_CertificateVerification_Trustlist(&conf->certificateVerification,
  314. trustList, trustListSize,
  315. revocationList, revocationListSize);
  316. if(retval != UA_STATUSCODE_GOOD) {
  317. UA_ServerConfig_delete(conf);
  318. return NULL;
  319. }
  320. retval = UA_Nodestore_default_new(&conf->nodestore);
  321. if(retval != UA_STATUSCODE_GOOD) {
  322. UA_ServerConfig_delete(conf);
  323. return NULL;
  324. }
  325. if(addDefaultNetworkLayers(conf, portNumber, 0, 0) != UA_STATUSCODE_GOOD) {
  326. UA_ServerConfig_delete(conf);
  327. return NULL;
  328. }
  329. if(trustListSize == 0)
  330. UA_LOG_WARNING(UA_Log_Stdout, UA_LOGCATEGORY_USERLAND,
  331. "No CA trust-list provided. Any remote certificate will be accepted.");
  332. /* Allocate the endpoints */
  333. conf->endpointsSize = 0;
  334. conf->endpoints = (UA_Endpoint *)UA_malloc(sizeof(UA_Endpoint) * 3);
  335. if(!conf->endpoints) {
  336. UA_ServerConfig_delete(conf);
  337. return NULL;
  338. }
  339. /* Populate the endpoints */
  340. ++conf->endpointsSize;
  341. retval = createSecurityPolicyNoneEndpoint(conf, &conf->endpoints[0], *certificate);
  342. if(retval != UA_STATUSCODE_GOOD) {
  343. UA_ServerConfig_delete(conf);
  344. return NULL;
  345. }
  346. ++conf->endpointsSize;
  347. retval = createSecurityPolicyBasic128Rsa15Endpoint(conf, &conf->endpoints[1],
  348. UA_MESSAGESECURITYMODE_SIGN, *certificate,
  349. *privateKey);
  350. if(retval != UA_STATUSCODE_GOOD) {
  351. UA_ServerConfig_delete(conf);
  352. return NULL;
  353. }
  354. ++conf->endpointsSize;
  355. retval = createSecurityPolicyBasic128Rsa15Endpoint(conf, &conf->endpoints[2],
  356. UA_MESSAGESECURITYMODE_SIGNANDENCRYPT, *certificate,
  357. *privateKey);
  358. if(retval != UA_STATUSCODE_GOOD) {
  359. UA_ServerConfig_delete(conf);
  360. return NULL;
  361. }
  362. return conf;
  363. }
  364. UA_ServerConfig *
  365. UA_ServerConfig_new_basic256sha256(UA_UInt16 portNumber,
  366. const UA_ByteString *certificate,
  367. const UA_ByteString *privateKey,
  368. const UA_ByteString *trustList,
  369. size_t trustListSize,
  370. const UA_ByteString *revocationList,
  371. size_t revocationListSize) {
  372. UA_ServerConfig *conf = createDefaultConfig();
  373. UA_StatusCode retval = UA_CertificateVerification_Trustlist(&conf->certificateVerification,
  374. trustList, trustListSize,
  375. revocationList, revocationListSize);
  376. if(retval != UA_STATUSCODE_GOOD) {
  377. UA_ServerConfig_delete(conf);
  378. return NULL;
  379. }
  380. retval = UA_Nodestore_default_new(&conf->nodestore);
  381. if(retval != UA_STATUSCODE_GOOD) {
  382. UA_ServerConfig_delete(conf);
  383. return NULL;
  384. }
  385. if(addDefaultNetworkLayers(conf, portNumber, 0, 0) != UA_STATUSCODE_GOOD) {
  386. UA_ServerConfig_delete(conf);
  387. return NULL;
  388. }
  389. if(trustListSize == 0)
  390. UA_LOG_WARNING(UA_Log_Stdout, UA_LOGCATEGORY_USERLAND,
  391. "No CA trust-list provided. Any remote certificate will be accepted.");
  392. /* Allocate the endpoints */
  393. conf->endpointsSize = 0;
  394. conf->endpoints = (UA_Endpoint *)UA_malloc(sizeof(UA_Endpoint) * 3);
  395. if(!conf->endpoints) {
  396. UA_ServerConfig_delete(conf);
  397. return NULL;
  398. }
  399. /* Populate the endpoints */
  400. ++conf->endpointsSize;
  401. retval = createSecurityPolicyNoneEndpoint(conf, &conf->endpoints[0], *certificate);
  402. if(retval != UA_STATUSCODE_GOOD) {
  403. UA_ServerConfig_delete(conf);
  404. return NULL;
  405. }
  406. ++conf->endpointsSize;
  407. retval = createSecurityPolicyBasic256Sha256Endpoint(conf, &conf->endpoints[1],
  408. UA_MESSAGESECURITYMODE_SIGN, *certificate,
  409. *privateKey);
  410. if(retval != UA_STATUSCODE_GOOD) {
  411. UA_ServerConfig_delete(conf);
  412. return NULL;
  413. }
  414. ++conf->endpointsSize;
  415. retval = createSecurityPolicyBasic256Sha256Endpoint(conf, &conf->endpoints[2],
  416. UA_MESSAGESECURITYMODE_SIGNANDENCRYPT, *certificate,
  417. *privateKey);
  418. if(retval != UA_STATUSCODE_GOOD) {
  419. UA_ServerConfig_delete(conf);
  420. return NULL;
  421. }
  422. return conf;
  423. }
  424. UA_ServerConfig *
  425. UA_ServerConfig_new_allSecurityPolicies(UA_UInt16 portNumber,
  426. const UA_ByteString *certificate,
  427. const UA_ByteString *privateKey,
  428. const UA_ByteString *trustList,
  429. size_t trustListSize,
  430. const UA_ByteString *revocationList,
  431. size_t revocationListSize) {
  432. UA_ServerConfig *conf = createDefaultConfig();
  433. UA_StatusCode retval = UA_CertificateVerification_Trustlist(&conf->certificateVerification,
  434. trustList, trustListSize,
  435. revocationList, revocationListSize);
  436. if(retval != UA_STATUSCODE_GOOD) {
  437. UA_ServerConfig_delete(conf);
  438. return NULL;
  439. }
  440. retval = UA_Nodestore_default_new(&conf->nodestore);
  441. if(retval != UA_STATUSCODE_GOOD) {
  442. UA_ServerConfig_delete(conf);
  443. return NULL;
  444. }
  445. if(addDefaultNetworkLayers(conf, portNumber, 0, 0) != UA_STATUSCODE_GOOD) {
  446. UA_ServerConfig_delete(conf);
  447. return NULL;
  448. }
  449. if(trustListSize == 0)
  450. UA_LOG_WARNING(UA_Log_Stdout, UA_LOGCATEGORY_USERLAND,
  451. "No CA trust-list provided. Any remote certificate will be accepted.");
  452. /* Allocate the endpoints */
  453. conf->endpointsSize = 0;
  454. conf->endpoints = (UA_Endpoint *)UA_malloc(sizeof(UA_Endpoint) * 5);
  455. if(!conf->endpoints) {
  456. UA_ServerConfig_delete(conf);
  457. return NULL;
  458. }
  459. /* Populate the endpoints */
  460. retval = createSecurityPolicyNoneEndpoint(conf, &conf->endpoints[conf->endpointsSize], *certificate);
  461. ++conf->endpointsSize;
  462. if(retval != UA_STATUSCODE_GOOD) {
  463. UA_ServerConfig_delete(conf);
  464. return NULL;
  465. }
  466. retval = createSecurityPolicyBasic128Rsa15Endpoint(conf, &conf->endpoints[conf->endpointsSize],
  467. UA_MESSAGESECURITYMODE_SIGN, *certificate,
  468. *privateKey);
  469. ++conf->endpointsSize;
  470. if(retval != UA_STATUSCODE_GOOD) {
  471. UA_ServerConfig_delete(conf);
  472. return NULL;
  473. }
  474. retval = createSecurityPolicyBasic128Rsa15Endpoint(conf, &conf->endpoints[conf->endpointsSize],
  475. UA_MESSAGESECURITYMODE_SIGNANDENCRYPT, *certificate,
  476. *privateKey);
  477. ++conf->endpointsSize;
  478. if(retval != UA_STATUSCODE_GOOD) {
  479. UA_ServerConfig_delete(conf);
  480. return NULL;
  481. }
  482. retval = createSecurityPolicyBasic256Sha256Endpoint(conf, &conf->endpoints[conf->endpointsSize],
  483. UA_MESSAGESECURITYMODE_SIGN, *certificate,
  484. *privateKey);
  485. ++conf->endpointsSize;
  486. if(retval != UA_STATUSCODE_GOOD) {
  487. UA_ServerConfig_delete(conf);
  488. return NULL;
  489. }
  490. retval = createSecurityPolicyBasic256Sha256Endpoint(conf, &conf->endpoints[conf->endpointsSize],
  491. UA_MESSAGESECURITYMODE_SIGNANDENCRYPT, *certificate,
  492. *privateKey);
  493. ++conf->endpointsSize;
  494. if(retval != UA_STATUSCODE_GOOD) {
  495. UA_ServerConfig_delete(conf);
  496. return NULL;
  497. }
  498. return conf;
  499. }
  500. #endif
  501. void
  502. UA_ServerConfig_delete(UA_ServerConfig *config) {
  503. if(!config)
  504. return;
  505. /* Server Description */
  506. UA_BuildInfo_deleteMembers(&config->buildInfo);
  507. UA_ApplicationDescription_deleteMembers(&config->applicationDescription);
  508. #ifdef UA_ENABLE_DISCOVERY
  509. UA_String_deleteMembers(&config->mdnsServerName);
  510. UA_Array_delete(config->serverCapabilities, config->serverCapabilitiesSize,
  511. &UA_TYPES[UA_TYPES_STRING]);
  512. config->serverCapabilities = NULL;
  513. config->serverCapabilitiesSize = 0;
  514. #endif
  515. /* Nodestore */
  516. if(config->nodestore.deleteNodestore)
  517. config->nodestore.deleteNodestore(config->nodestore.context);
  518. /* Custom DataTypes */
  519. /* nothing to do */
  520. /* Networking */
  521. for(size_t i = 0; i < config->networkLayersSize; ++i)
  522. config->networkLayers[i].deleteMembers(&config->networkLayers[i]);
  523. UA_free(config->networkLayers);
  524. config->networkLayers = NULL;
  525. config->networkLayersSize = 0;
  526. UA_String_deleteMembers(&config->customHostname);
  527. config->customHostname = UA_STRING_NULL;
  528. for(size_t i = 0; i < config->endpointsSize; ++i) {
  529. UA_SecurityPolicy *policy = &config->endpoints[i].securityPolicy;
  530. policy->deleteMembers(policy);
  531. UA_EndpointDescription_deleteMembers(&config->endpoints[i].endpointDescription);
  532. }
  533. UA_free(config->endpoints);
  534. config->endpoints = NULL;
  535. config->endpointsSize = 0;
  536. /* Certificate Validation */
  537. config->certificateVerification.deleteMembers(&config->certificateVerification);
  538. /* Access Control */
  539. config->accessControl.deleteMembers(&config->accessControl);
  540. /* Historical data */
  541. #ifdef UA_ENABLE_HISTORIZING
  542. if (config->historyDatabase.deleteMembers)
  543. config->historyDatabase.deleteMembers(&config->historyDatabase);
  544. #endif
  545. UA_free(config);
  546. }
  547. #ifdef UA_ENABLE_PUBSUB /* conditional compilation */
  548. /**
  549. * Add a pubsubTransportLayer to the configuration.
  550. * Memory is reallocated on demand */
  551. UA_StatusCode
  552. UA_ServerConfig_addPubSubTransportLayer(UA_ServerConfig *config,
  553. UA_PubSubTransportLayer *pubsubTransportLayer) {
  554. if(config->pubsubTransportLayersSize == 0) {
  555. config->pubsubTransportLayers = (UA_PubSubTransportLayer *)
  556. UA_malloc(sizeof(UA_PubSubTransportLayer));
  557. } else {
  558. config->pubsubTransportLayers = (UA_PubSubTransportLayer*)
  559. UA_realloc(config->pubsubTransportLayers,
  560. sizeof(UA_PubSubTransportLayer) * (config->pubsubTransportLayersSize + 1));
  561. }
  562. if (config->pubsubTransportLayers == NULL) {
  563. return UA_STATUSCODE_BADOUTOFMEMORY;
  564. }
  565. memcpy(&config->pubsubTransportLayers[config->pubsubTransportLayersSize],
  566. pubsubTransportLayer, sizeof(UA_PubSubTransportLayer));
  567. config->pubsubTransportLayersSize++;
  568. return UA_STATUSCODE_GOOD;
  569. }
  570. #endif /* UA_ENABLE_PUBSUB */
  571. /***************************/
  572. /* Default Client Settings */
  573. /***************************/
  574. static UA_INLINE void UA_ClientConnectionTCP_poll_callback(UA_Client *client, void *data) {
  575. UA_ClientConnectionTCP_poll(client, data);
  576. }
  577. const UA_ClientConfig UA_ClientConfig_default = {
  578. 5000, /* .timeout, 5 seconds */
  579. 10 * 60 * 1000, /* .secureChannelLifeTime, 10 minutes */
  580. UA_Log_Stdout, /* .logger */
  581. { /* .localConnectionConfig */
  582. 0, /* .protocolVersion */
  583. 65535, /* .sendBufferSize, 64k per chunk */
  584. 65535, /* .recvBufferSize, 64k per chunk */
  585. 0, /* .maxMessageSize, 0 -> unlimited */
  586. 0 /* .maxChunkCount, 0 -> unlimited */
  587. },
  588. UA_ClientConnectionTCP, /* .connectionFunc (for sync connection) */
  589. UA_ClientConnectionTCP_init, /* .initConnectionFunc (for async client) */
  590. UA_ClientConnectionTCP_poll_callback, /* .pollConnectionFunc (for async connection) */
  591. NULL, /* .customDataTypes */
  592. NULL, /* .stateCallback */
  593. 0, /* .connectivityCheckInterval */
  594. NULL, /* .inactivityCallback */
  595. NULL, /* .clientContext */
  596. #ifdef UA_ENABLE_SUBSCRIPTIONS
  597. 10, /* .outStandingPublishRequests */
  598. NULL /* .subscriptionInactivityCallback */
  599. #endif
  600. };