server.c 3.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103
  1. /*
  2. * This work is licensed under a Creative Commons CCZero 1.0 Universal License.
  3. * See http://creativecommons.org/publicdomain/zero/1.0/ for more information.
  4. */
  5. #include <time.h>
  6. #include "ua_types.h"
  7. #include <stdio.h>
  8. #include <stdlib.h>
  9. #include <signal.h>
  10. #include <errno.h> // errno, EINTR
  11. // provided by the open62541 lib
  12. #include "ua_server.h"
  13. // provided by the user, implementations available in the /examples folder
  14. #include "logger_stdout.h"
  15. #include "networklayer_tcp.h"
  16. UA_Boolean running = 1;
  17. static void stopHandler(int sign) {
  18. printf("Received Ctrl-C\n");
  19. running = 0;
  20. }
  21. static UA_ByteString loadCertificate(void) {
  22. UA_ByteString certificate = UA_STRING_NULL;
  23. FILE *fp = NULL;
  24. //FIXME: a potiential bug of locating the certificate, we need to get the path from the server's config
  25. fp=fopen("localhost.der", "rb");
  26. if(!fp) {
  27. errno = 0; // we read errno also from the tcp layer...
  28. return certificate;
  29. }
  30. fseek(fp, 0, SEEK_END);
  31. certificate.length = ftell(fp);
  32. certificate.data = malloc(certificate.length*sizeof(UA_Byte));
  33. if(!certificate.data)
  34. return certificate;
  35. fseek(fp, 0, SEEK_SET);
  36. if(fread(certificate.data, sizeof(UA_Byte), certificate.length, fp) < (size_t)certificate.length)
  37. UA_ByteString_deleteMembers(&certificate); // error reading the cert
  38. fclose(fp);
  39. return certificate;
  40. }
  41. static void testCallback(UA_Server *server, void *data) {
  42. printf("testcallback\n");
  43. }
  44. int main(int argc, char** argv) {
  45. signal(SIGINT, stopHandler); /* catches ctrl-c */
  46. UA_Server *server = UA_Server_new();
  47. UA_Server_setServerCertificate(server, loadCertificate());
  48. UA_Server_addNetworkLayer(server, ServerNetworkLayerTCP_new(UA_ConnectionConfig_standard, 16664));
  49. UA_WorkItem work = {.type = UA_WORKITEMTYPE_METHODCALL, .work.methodCall = {.method = testCallback, .data = UA_NULL} };
  50. UA_Server_addRepeatedWorkItem(server, &work, 20000000, UA_NULL); // call every 2 sec
  51. // add a variable node to the adresspace
  52. UA_Int32 *myInteger = UA_Int32_new();
  53. *myInteger = 42;
  54. UA_Variant *myIntegerVariant = UA_Variant_new();
  55. UA_Variant_setValue(myIntegerVariant, myInteger, UA_TYPES_INT32);
  56. UA_QualifiedName myIntegerName;
  57. UA_QUALIFIEDNAME_ASSIGN(myIntegerName, "the answer");
  58. UA_Server_addVariableNode(server, myIntegerVariant, &UA_NODEID_NULL, &myIntegerName,
  59. &UA_NODEID_STATIC(0, UA_NS0ID_OBJECTSFOLDER),
  60. &UA_NODEID_STATIC(0, UA_NS0ID_ORGANIZES));
  61. // add node with a callback to the userspace
  62. #ifdef BENCHMARK
  63. UA_UInt32 nodeCount = 500;
  64. char str[15];
  65. for(UA_UInt32 i = 0;i<nodeCount;i++) {
  66. UA_Int32 *data = UA_Int32_new();
  67. *data = 42;
  68. UA_Variant *variant = UA_Variant_new();
  69. UA_Variant_setValue(variant, data, UA_TYPES_INT32);
  70. UA_QualifiedName *nodeName = UA_QualifiedName_new();
  71. sprintf(str,"%d",i);
  72. UA_QualifiedName_copycstring(str, nodeName);
  73. UA_Server_addVariableNode(server, variant, &UA_NODEID_NULL, nodeName,
  74. &UA_NODEID_STATIC(0, UA_NS0ID_OBJECTSFOLDER),
  75. &UA_NODEID_STATIC(0, UA_NS0ID_ORGANIZES));
  76. }
  77. #endif
  78. UA_StatusCode retval = UA_Server_run(server, 1, &running);
  79. UA_Server_delete(server);
  80. return retval;
  81. }