opcuaServer.c 3.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107
  1. /*
  2. * This work is licensed under a Creative Commons CCZero 1.0 Universal License.
  3. * See http://creativecommons.org/publicdomain/zero/1.0/ for more information.
  4. */
  5. #include <time.h>
  6. #include "ua_types.h"
  7. #include <stdio.h>
  8. #include <stdlib.h>
  9. #include <signal.h>
  10. #include <errno.h> // errno, EINTR
  11. // provided by the open62541 lib
  12. #include "ua_server.h"
  13. // provided by the user, implementations available in the /examples folder
  14. #include "logger_stdout.h"
  15. #include "networklayer_tcp.h"
  16. #ifdef EXTENSION_UDP
  17. #include "networklayer_udp.h"
  18. #endif
  19. UA_Boolean running = 1;
  20. static void stopHandler(int sign) {
  21. printf("Received Ctrl-C\n");
  22. running = 0;
  23. }
  24. static UA_ByteString loadCertificate(void) {
  25. UA_ByteString certificate = UA_STRING_NULL;
  26. FILE *fp = NULL;
  27. //FIXME: a potiential bug of locating the certificate, we need to get the path from the server's config
  28. fp=fopen("localhost.der", "rb");
  29. if(!fp) {
  30. errno = 0; // we read errno also from the tcp layer...
  31. return certificate;
  32. }
  33. fseek(fp, 0, SEEK_END);
  34. certificate.length = ftell(fp);
  35. certificate.data = malloc(certificate.length*sizeof(UA_Byte));
  36. if(!certificate.data)
  37. return certificate;
  38. fseek(fp, 0, SEEK_SET);
  39. if(fread(certificate.data, sizeof(UA_Byte), certificate.length, fp) < (size_t)certificate.length)
  40. UA_ByteString_deleteMembers(&certificate); // error reading the cert
  41. fclose(fp);
  42. return certificate;
  43. }
  44. static void testCallback(UA_Server *server, void *data) {
  45. printf("testcallback\n");
  46. }
  47. int main(int argc, char** argv) {
  48. signal(SIGINT, stopHandler); /* catches ctrl-c */
  49. UA_Server *server = UA_Server_new();
  50. UA_Server_setServerCertificate(server, loadCertificate());
  51. #ifdef EXTENSION_UDP
  52. UA_Server_addNetworkLayer(server, ServerNetworkLayerUDP_new(UA_ConnectionConfig_standard, 16664));
  53. #else
  54. UA_Server_addNetworkLayer(server, ServerNetworkLayerTCP_new(UA_ConnectionConfig_standard, 16664));
  55. #endif
  56. UA_WorkItem work = {.type = UA_WORKITEMTYPE_METHODCALL, .work.methodCall = {.method = testCallback, .data = UA_NULL} };
  57. UA_Server_addRepeatedWorkItem(server, &work, 20000000, UA_NULL); // call every 2 sec
  58. //add a node to the adresspace
  59. UA_Int32 *myInteger = UA_Int32_new();
  60. *myInteger = 42;
  61. UA_Variant *myIntegerVariant = UA_Variant_new();
  62. UA_Variant_setValue(myIntegerVariant, myInteger, UA_TYPES_INT32);
  63. UA_QualifiedName myIntegerName;
  64. UA_QUALIFIEDNAME_ASSIGN(myIntegerName, "the answer");
  65. UA_Server_addVariableNode(server, myIntegerVariant, &myIntegerName,
  66. &UA_NODEID_STATIC(UA_NS0ID_OBJECTSFOLDER,0),
  67. &UA_NODEID_STATIC(UA_NS0ID_ORGANIZES,0));
  68. #ifdef BENCHMARK
  69. UA_UInt32 nodeCount = 500;
  70. char str[15];
  71. for(UA_UInt32 i = 0;i<nodeCount;i++) {
  72. UA_Int32 *data = UA_Int32_new();
  73. UA_QualifiedName *nodeName = UA_QualifiedName_new();
  74. *data = 42;
  75. sprintf(str,"%d",i);
  76. UA_QualifiedName_copycstring(str, nodeName);
  77. UA_Server_addVariableNode(server, nodeName,
  78. data, UA_NODEID_STATIC(UA_TYPES_IDS[UA_TYPES_INT32],0),
  79. &UA_EXPANDEDNODEID_STATIC(UA_NS0ID_OBJECTSFOLDER,0),
  80. &UA_NODEID_STATIC(UA_NS0ID_ORGANIZES,0));
  81. }
  82. #endif
  83. UA_StatusCode retval = UA_Server_run(server, 1, &running);
  84. UA_Server_delete(server);
  85. return retval;
  86. }