ua_config_default.c 32 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895
  1. /* This work is licensed under a Creative Commons CCZero 1.0 Universal License.
  2. * See http://creativecommons.org/publicdomain/zero/1.0/ for more information.
  3. *
  4. * Copyright 2017 (c) Fraunhofer IOSB (Author: Julius Pfrommer)
  5. * Copyright 2017 (c) Julian Grothoff
  6. * Copyright 2017-2018 (c) Mark Giraud, Fraunhofer IOSB
  7. * Copyright 2017 (c) Stefan Profanter, fortiss GmbH
  8. * Copyright 2017 (c) Thomas Stalder, Blue Time Concept SA
  9. * Copyright 2018 (c) Daniel Feist, Precitec GmbH & Co. KG
  10. * Copyright 2018 (c) Fabian Arndt, Root-Core
  11. */
  12. #include <open62541/client_config_default.h>
  13. #include <open62541/network_tcp.h>
  14. #include <open62541/plugin/accesscontrol_default.h>
  15. #include <open62541/plugin/log_stdout.h>
  16. #include <open62541/plugin/pki_default.h>
  17. #include <open62541/plugin/securitypolicy_default.h>
  18. #include <open62541/server_config_default.h>
  19. /* Struct initialization works across ANSI C/C99/C++ if it is done when the
  20. * variable is first declared. Assigning values to existing structs is
  21. * heterogeneous across the three. */
  22. static UA_INLINE UA_UInt32Range
  23. UA_UINT32RANGE(UA_UInt32 min, UA_UInt32 max) {
  24. UA_UInt32Range range = {min, max};
  25. return range;
  26. }
  27. static UA_INLINE UA_DurationRange
  28. UA_DURATIONRANGE(UA_Duration min, UA_Duration max) {
  29. UA_DurationRange range = {min, max};
  30. return range;
  31. }
  32. /*******************************/
  33. /* Default Connection Settings */
  34. /*******************************/
  35. const UA_ConnectionConfig UA_ConnectionConfig_default = {
  36. 0, /* .protocolVersion */
  37. 65535, /* .sendBufferSize, 64k per chunk */
  38. 65535, /* .recvBufferSize, 64k per chunk */
  39. 0, /* .maxMessageSize, 0 -> unlimited */
  40. 0 /* .maxChunkCount, 0 -> unlimited */
  41. };
  42. /***************************/
  43. /* Default Server Settings */
  44. /***************************/
  45. #define MANUFACTURER_NAME "open62541"
  46. #define PRODUCT_NAME "open62541 OPC UA Server"
  47. #define PRODUCT_URI "http://open62541.org"
  48. #define APPLICATION_NAME "open62541-based OPC UA Application"
  49. #define APPLICATION_URI "urn:unconfigured:application"
  50. #define STRINGIFY(arg) #arg
  51. #define VERSION(MAJOR, MINOR, PATCH, LABEL) \
  52. STRINGIFY(MAJOR) "." STRINGIFY(MINOR) "." STRINGIFY(PATCH) LABEL
  53. static UA_StatusCode
  54. createEndpoint(UA_ServerConfig *conf, UA_EndpointDescription *endpoint,
  55. const UA_SecurityPolicy *securityPolicy,
  56. UA_MessageSecurityMode securityMode) {
  57. UA_EndpointDescription_init(endpoint);
  58. endpoint->securityMode = securityMode;
  59. UA_String_copy(&securityPolicy->policyUri, &endpoint->securityPolicyUri);
  60. endpoint->transportProfileUri =
  61. UA_STRING_ALLOC("http://opcfoundation.org/UA-Profile/Transport/uatcp-uasc-uabinary");
  62. /* Enable all login mechanisms from the access control plugin */
  63. UA_StatusCode retval = UA_Array_copy(conf->accessControl.userTokenPolicies,
  64. conf->accessControl.userTokenPoliciesSize,
  65. (void **)&endpoint->userIdentityTokens,
  66. &UA_TYPES[UA_TYPES_USERTOKENPOLICY]);
  67. if(retval != UA_STATUSCODE_GOOD)
  68. return retval;
  69. endpoint->userIdentityTokensSize =
  70. conf->accessControl.userTokenPoliciesSize;
  71. UA_String_copy(&securityPolicy->localCertificate, &endpoint->serverCertificate);
  72. UA_ApplicationDescription_copy(&conf->applicationDescription,
  73. &endpoint->server);
  74. return UA_STATUSCODE_GOOD;
  75. }
  76. void
  77. UA_ServerConfig_set_customHostname(UA_ServerConfig *config, const UA_String customHostname) {
  78. if(!config)
  79. return;
  80. UA_String_deleteMembers(&config->customHostname);
  81. UA_String_copy(&customHostname, &config->customHostname);
  82. }
  83. static const size_t usernamePasswordsSize = 2;
  84. static UA_UsernamePasswordLogin usernamePasswords[2] = {
  85. {UA_STRING_STATIC("user1"), UA_STRING_STATIC("password")},
  86. {UA_STRING_STATIC("user2"), UA_STRING_STATIC("password1")}};
  87. static UA_ServerConfig *
  88. createDefaultConfig(void) {
  89. UA_ServerConfig *conf = (UA_ServerConfig *)UA_malloc(sizeof(UA_ServerConfig));
  90. if(!conf)
  91. return NULL;
  92. /* Zero out.. All members have a valid initial value */
  93. memset(conf, 0, sizeof(UA_ServerConfig));
  94. /* --> Start setting the default static config <-- */
  95. conf->nThreads = 1;
  96. conf->logger = UA_Log_Stdout_;
  97. /* Server Description */
  98. conf->buildInfo.productUri = UA_STRING_ALLOC(PRODUCT_URI);
  99. conf->buildInfo.manufacturerName = UA_STRING_ALLOC(MANUFACTURER_NAME);
  100. conf->buildInfo.productName = UA_STRING_ALLOC(PRODUCT_NAME);
  101. conf->buildInfo.softwareVersion =
  102. UA_STRING_ALLOC(VERSION(UA_OPEN62541_VER_MAJOR, UA_OPEN62541_VER_MINOR,
  103. UA_OPEN62541_VER_PATCH, UA_OPEN62541_VER_LABEL));
  104. #ifdef UA_PACK_DEBIAN
  105. conf->buildInfo.buildNumber = UA_STRING_ALLOC("deb");
  106. #else
  107. conf->buildInfo.buildNumber = UA_STRING_ALLOC(__DATE__ " " __TIME__);
  108. #endif
  109. conf->buildInfo.buildDate = 0;
  110. conf->applicationDescription.applicationUri = UA_STRING_ALLOC(APPLICATION_URI);
  111. conf->applicationDescription.productUri = UA_STRING_ALLOC(PRODUCT_URI);
  112. conf->applicationDescription.applicationName =
  113. UA_LOCALIZEDTEXT_ALLOC("en", APPLICATION_NAME);
  114. conf->applicationDescription.applicationType = UA_APPLICATIONTYPE_SERVER;
  115. /* conf->applicationDescription.gatewayServerUri = UA_STRING_NULL; */
  116. /* conf->applicationDescription.discoveryProfileUri = UA_STRING_NULL; */
  117. /* conf->applicationDescription.discoveryUrlsSize = 0; */
  118. /* conf->applicationDescription.discoveryUrls = NULL; */
  119. #ifdef UA_ENABLE_DISCOVERY
  120. /* conf->mdnsServerName = UA_STRING_NULL; */
  121. /* conf->serverCapabilitiesSize = 0; */
  122. /* conf->serverCapabilities = NULL; */
  123. #endif
  124. /* Custom DataTypes */
  125. /* conf->customDataTypesSize = 0; */
  126. /* conf->customDataTypes = NULL; */
  127. /* Networking */
  128. /* conf->networkLayersSize = 0; */
  129. /* conf->networkLayers = NULL; */
  130. /* conf->customHostname = UA_STRING_NULL; */
  131. /* Endpoints */
  132. /* conf->endpoints = {0, NULL}; */
  133. /* Certificate Verification that accepts every certificate. Can be
  134. * overwritten when the policy is specialized. */
  135. UA_CertificateVerification_AcceptAll(&conf->certificateVerification);
  136. /* Global Node Lifecycle */
  137. conf->nodeLifecycle.constructor = NULL;
  138. conf->nodeLifecycle.destructor = NULL;
  139. if (UA_AccessControl_default(&conf->accessControl, true, usernamePasswordsSize,
  140. usernamePasswords) != UA_STATUSCODE_GOOD) {
  141. UA_ServerConfig_delete(conf);
  142. return NULL;
  143. }
  144. /* Relax constraints for the InformationModel */
  145. conf->relaxEmptyValueConstraint = true; /* Allow empty values */
  146. /* Limits for SecureChannels */
  147. conf->maxSecureChannels = 40;
  148. conf->maxSecurityTokenLifetime = 10 * 60 * 1000; /* 10 minutes */
  149. /* Limits for Sessions */
  150. conf->maxSessions = 100;
  151. conf->maxSessionTimeout = 60.0 * 60.0 * 1000.0; /* 1h */
  152. /* Limits for Subscriptions */
  153. conf->publishingIntervalLimits = UA_DURATIONRANGE(100.0, 3600.0 * 1000.0);
  154. conf->lifeTimeCountLimits = UA_UINT32RANGE(3, 15000);
  155. conf->keepAliveCountLimits = UA_UINT32RANGE(1, 100);
  156. conf->maxNotificationsPerPublish = 1000;
  157. conf->enableRetransmissionQueue = true;
  158. conf->maxRetransmissionQueueSize = 0; /* unlimited */
  159. #ifdef UA_ENABLE_SUBSCRIPTIONS_EVENTS
  160. conf->maxEventsPerNode = 0; /* unlimited */
  161. #endif
  162. /* Limits for MonitoredItems */
  163. conf->samplingIntervalLimits = UA_DURATIONRANGE(50.0, 24.0 * 3600.0 * 1000.0);
  164. conf->queueSizeLimits = UA_UINT32RANGE(1, 100);
  165. #ifdef UA_ENABLE_DISCOVERY
  166. conf->discoveryCleanupTimeout = 60 * 60;
  167. #endif
  168. #ifdef UA_ENABLE_HISTORIZING
  169. /* conf->accessHistoryDataCapability = UA_FALSE; */
  170. /* conf->maxReturnDataValues = 0; */
  171. /* conf->accessHistoryEventsCapability = UA_FALSE; */
  172. /* conf->maxReturnEventValues = 0; */
  173. /* conf->insertDataCapability = UA_FALSE; */
  174. /* conf->insertEventCapability = UA_FALSE; */
  175. /* conf->insertAnnotationsCapability = UA_FALSE; */
  176. /* conf->replaceDataCapability = UA_FALSE; */
  177. /* conf->replaceEventCapability = UA_FALSE; */
  178. /* conf->updateDataCapability = UA_FALSE; */
  179. /* conf->updateEventCapability = UA_FALSE; */
  180. /* conf->deleteRawCapability = UA_FALSE; */
  181. /* conf->deleteEventCapability = UA_FALSE; */
  182. /* conf->deleteAtTimeDataCapability = UA_FALSE; */
  183. #endif
  184. /* --> Finish setting the default static config <-- */
  185. return conf;
  186. }
  187. static UA_StatusCode
  188. addDefaultNetworkLayers(UA_ServerConfig *conf, UA_UInt16 portNumber,
  189. UA_UInt32 sendBufferSize, UA_UInt32 recvBufferSize) {
  190. /* Add a network layer */
  191. conf->networkLayers = (UA_ServerNetworkLayer *)
  192. UA_malloc(sizeof(UA_ServerNetworkLayer));
  193. if(!conf->networkLayers)
  194. return UA_STATUSCODE_BADOUTOFMEMORY;
  195. UA_ConnectionConfig config = UA_ConnectionConfig_default;
  196. if (sendBufferSize > 0)
  197. config.sendBufferSize = sendBufferSize;
  198. if (recvBufferSize > 0)
  199. config.recvBufferSize = recvBufferSize;
  200. conf->networkLayers[0] =
  201. UA_ServerNetworkLayerTCP(config, portNumber, &conf->logger);
  202. if (!conf->networkLayers[0].handle)
  203. return UA_STATUSCODE_BADOUTOFMEMORY;
  204. conf->networkLayersSize = 1;
  205. return UA_STATUSCODE_GOOD;
  206. }
  207. UA_ServerConfig *
  208. UA_ServerConfig_new_customBuffer(UA_UInt16 portNumber,
  209. const UA_ByteString *certificate,
  210. UA_UInt32 sendBufferSize,
  211. UA_UInt32 recvBufferSize) {
  212. UA_ServerConfig *conf = createDefaultConfig();
  213. if (!conf) {
  214. return NULL;
  215. }
  216. UA_StatusCode retval = UA_Nodestore_default_new(&conf->nodestore);
  217. if(retval != UA_STATUSCODE_GOOD) {
  218. UA_ServerConfig_delete(conf);
  219. return NULL;
  220. }
  221. retval = addDefaultNetworkLayers(conf, portNumber, sendBufferSize, recvBufferSize);
  222. if(retval != UA_STATUSCODE_GOOD) {
  223. UA_ServerConfig_delete(conf);
  224. return NULL;
  225. }
  226. /* Allocate the SecurityPolicies */
  227. conf->securityPolicies = (UA_SecurityPolicy *)UA_malloc(sizeof(UA_SecurityPolicy));
  228. if(!conf->securityPolicies) {
  229. UA_ServerConfig_delete(conf);
  230. return NULL;
  231. }
  232. conf->securityPoliciesSize = 1;
  233. /* Populate the SecurityPolicies */
  234. UA_ByteString localCertificate = UA_BYTESTRING_NULL;
  235. if(certificate)
  236. localCertificate = *certificate;
  237. retval = UA_SecurityPolicy_None(&conf->securityPolicies[0], NULL,
  238. localCertificate, &conf->logger);
  239. if(retval != UA_STATUSCODE_GOOD) {
  240. UA_ServerConfig_delete(conf);
  241. return NULL;
  242. }
  243. /* Allocate the endpoint */
  244. conf->endpoints = (UA_EndpointDescription *)UA_malloc(sizeof(UA_EndpointDescription));
  245. if(!conf->endpoints) {
  246. UA_ServerConfig_delete(conf);
  247. return NULL;
  248. }
  249. conf->endpointsSize = 1;
  250. /* Populate the endpoint */
  251. retval = createEndpoint(conf, &conf->endpoints[0], &conf->securityPolicies[0],
  252. UA_MESSAGESECURITYMODE_NONE);
  253. if(retval != UA_STATUSCODE_GOOD) {
  254. UA_ServerConfig_delete(conf);
  255. return NULL;
  256. }
  257. return conf;
  258. }
  259. #ifdef UA_ENABLE_ENCRYPTION
  260. UA_ServerConfig *
  261. UA_ServerConfig_new_basic128rsa15(UA_UInt16 portNumber,
  262. const UA_ByteString *certificate,
  263. const UA_ByteString *privateKey,
  264. const UA_ByteString *trustList,
  265. size_t trustListSize,
  266. const UA_ByteString *revocationList,
  267. size_t revocationListSize) {
  268. UA_ServerConfig *conf = createDefaultConfig();
  269. if(!conf)
  270. return NULL;
  271. UA_StatusCode retval =
  272. UA_CertificateVerification_Trustlist(&conf->certificateVerification,
  273. trustList, trustListSize,
  274. revocationList, revocationListSize);
  275. if(retval != UA_STATUSCODE_GOOD) {
  276. UA_ServerConfig_delete(conf);
  277. return NULL;
  278. }
  279. retval = UA_Nodestore_default_new(&conf->nodestore);
  280. if(retval != UA_STATUSCODE_GOOD) {
  281. UA_ServerConfig_delete(conf);
  282. return NULL;
  283. }
  284. retval = addDefaultNetworkLayers(conf, portNumber, 0, 0);
  285. if(retval != UA_STATUSCODE_GOOD) {
  286. UA_ServerConfig_delete(conf);
  287. return NULL;
  288. }
  289. if(trustListSize == 0)
  290. UA_LOG_WARNING(UA_Log_Stdout, UA_LOGCATEGORY_USERLAND,
  291. "No CA trust-list provided. Any remote certificate will be accepted.");
  292. /* Allocate the SecurityPolicies */
  293. conf->securityPoliciesSize = 0;
  294. conf->securityPolicies = (UA_SecurityPolicy *)UA_malloc(sizeof(UA_SecurityPolicy) * 2);
  295. if(!conf->securityPolicies) {
  296. UA_ServerConfig_delete(conf);
  297. return NULL;
  298. }
  299. /* Populate the SecurityPolicies */
  300. UA_ByteString localCertificate = UA_BYTESTRING_NULL;
  301. UA_ByteString localPrivateKey = UA_BYTESTRING_NULL;
  302. if(certificate)
  303. localCertificate = *certificate;
  304. if(privateKey)
  305. localPrivateKey = *privateKey;
  306. ++conf->securityPoliciesSize;
  307. retval = UA_SecurityPolicy_None(&conf->securityPolicies[0], NULL,
  308. localCertificate, &conf->logger);
  309. if(retval != UA_STATUSCODE_GOOD) {
  310. UA_ServerConfig_delete(conf);
  311. return NULL;
  312. }
  313. ++conf->securityPoliciesSize;
  314. retval = UA_SecurityPolicy_Basic128Rsa15(&conf->securityPolicies[1],
  315. &conf->certificateVerification,
  316. localCertificate, localPrivateKey,
  317. &conf->logger);
  318. if(retval != UA_STATUSCODE_GOOD) {
  319. UA_ServerConfig_delete(conf);
  320. return NULL;
  321. }
  322. /* Allocate the endpoints */
  323. conf->endpointsSize = 0;
  324. conf->endpoints = (UA_EndpointDescription *)
  325. UA_malloc(sizeof(UA_EndpointDescription) * 3);
  326. if(!conf->endpoints) {
  327. UA_ServerConfig_delete(conf);
  328. return NULL;
  329. }
  330. /* Populate the endpoints */
  331. ++conf->endpointsSize;
  332. retval = createEndpoint(conf, &conf->endpoints[0], &conf->securityPolicies[0],
  333. UA_MESSAGESECURITYMODE_NONE);
  334. if(retval != UA_STATUSCODE_GOOD) {
  335. UA_ServerConfig_delete(conf);
  336. return NULL;
  337. }
  338. ++conf->endpointsSize;
  339. retval = createEndpoint(conf, &conf->endpoints[1], &conf->securityPolicies[1],
  340. UA_MESSAGESECURITYMODE_SIGN);
  341. if(retval != UA_STATUSCODE_GOOD) {
  342. UA_ServerConfig_delete(conf);
  343. return NULL;
  344. }
  345. ++conf->endpointsSize;
  346. retval = createEndpoint(conf, &conf->endpoints[2], &conf->securityPolicies[1],
  347. UA_MESSAGESECURITYMODE_SIGNANDENCRYPT);
  348. if(retval != UA_STATUSCODE_GOOD) {
  349. UA_ServerConfig_delete(conf);
  350. return NULL;
  351. }
  352. return conf;
  353. }
  354. UA_ServerConfig *
  355. UA_ServerConfig_new_basic256sha256(UA_UInt16 portNumber,
  356. const UA_ByteString *certificate,
  357. const UA_ByteString *privateKey,
  358. const UA_ByteString *trustList,
  359. size_t trustListSize,
  360. const UA_ByteString *revocationList,
  361. size_t revocationListSize) {
  362. UA_ServerConfig *conf = createDefaultConfig();
  363. if(!conf)
  364. return NULL;
  365. UA_StatusCode retval =
  366. UA_CertificateVerification_Trustlist(&conf->certificateVerification,
  367. trustList, trustListSize,
  368. revocationList, revocationListSize);
  369. if(retval != UA_STATUSCODE_GOOD) {
  370. UA_ServerConfig_delete(conf);
  371. return NULL;
  372. }
  373. retval = addDefaultNetworkLayers(conf, portNumber, 0, 0);
  374. if(retval != UA_STATUSCODE_GOOD) {
  375. UA_ServerConfig_delete(conf);
  376. return NULL;
  377. }
  378. if(trustListSize == 0)
  379. UA_LOG_WARNING(UA_Log_Stdout, UA_LOGCATEGORY_USERLAND,
  380. "No CA trust-list provided. Any remote certificate will be accepted.");
  381. /* Allocate the SecurityPolicies */
  382. conf->securityPoliciesSize = 0;
  383. conf->securityPolicies = (UA_SecurityPolicy *)UA_malloc(sizeof(UA_SecurityPolicy) * 2);
  384. if(!conf->securityPolicies) {
  385. UA_ServerConfig_delete(conf);
  386. return NULL;
  387. }
  388. /* Populate the SecurityPolicies */
  389. UA_ByteString localCertificate = UA_BYTESTRING_NULL;
  390. UA_ByteString localPrivateKey = UA_BYTESTRING_NULL;
  391. if(certificate)
  392. localCertificate = *certificate;
  393. if(privateKey)
  394. localPrivateKey = *privateKey;
  395. ++conf->securityPoliciesSize;
  396. retval = UA_SecurityPolicy_None(&conf->securityPolicies[0], NULL,
  397. localCertificate, &conf->logger);
  398. if(retval != UA_STATUSCODE_GOOD) {
  399. UA_ServerConfig_delete(conf);
  400. return NULL;
  401. }
  402. ++conf->securityPoliciesSize;
  403. retval = UA_SecurityPolicy_Basic256Sha256(&conf->securityPolicies[1],
  404. &conf->certificateVerification,
  405. localCertificate, localPrivateKey,
  406. &conf->logger);
  407. if(retval != UA_STATUSCODE_GOOD) {
  408. UA_ServerConfig_delete(conf);
  409. return NULL;
  410. }
  411. /* Allocate the endpoints */
  412. conf->endpointsSize = 0;
  413. conf->endpoints = (UA_EndpointDescription *)
  414. UA_malloc(sizeof(UA_EndpointDescription) * 3);
  415. if(!conf->endpoints) {
  416. UA_ServerConfig_delete(conf);
  417. return NULL;
  418. }
  419. /* Populate the endpoints */
  420. ++conf->endpointsSize;
  421. retval = createEndpoint(conf, &conf->endpoints[0], &conf->securityPolicies[0],
  422. UA_MESSAGESECURITYMODE_NONE);
  423. if(retval != UA_STATUSCODE_GOOD) {
  424. UA_ServerConfig_delete(conf);
  425. return NULL;
  426. }
  427. ++conf->endpointsSize;
  428. retval = createEndpoint(conf, &conf->endpoints[1], &conf->securityPolicies[1],
  429. UA_MESSAGESECURITYMODE_SIGN);
  430. if(retval != UA_STATUSCODE_GOOD) {
  431. UA_ServerConfig_delete(conf);
  432. return NULL;
  433. }
  434. ++conf->endpointsSize;
  435. retval = createEndpoint(conf, &conf->endpoints[2], &conf->securityPolicies[1],
  436. UA_MESSAGESECURITYMODE_SIGNANDENCRYPT);
  437. if(retval != UA_STATUSCODE_GOOD) {
  438. UA_ServerConfig_delete(conf);
  439. return NULL;
  440. }
  441. return conf;
  442. }
  443. UA_ServerConfig *
  444. UA_ServerConfig_new_allSecurityPolicies(UA_UInt16 portNumber,
  445. const UA_ByteString *certificate,
  446. const UA_ByteString *privateKey,
  447. const UA_ByteString *trustList,
  448. size_t trustListSize,
  449. const UA_ByteString *revocationList,
  450. size_t revocationListSize) {
  451. UA_ServerConfig *conf = createDefaultConfig();
  452. if(!conf)
  453. return NULL;
  454. UA_StatusCode retval =
  455. UA_CertificateVerification_Trustlist(&conf->certificateVerification,
  456. trustList, trustListSize,
  457. revocationList, revocationListSize);
  458. if(retval != UA_STATUSCODE_GOOD) {
  459. UA_ServerConfig_delete(conf);
  460. return NULL;
  461. }
  462. retval = UA_Nodestore_default_new(&conf->nodestore);
  463. if(retval != UA_STATUSCODE_GOOD) {
  464. UA_ServerConfig_delete(conf);
  465. return NULL;
  466. }
  467. retval = addDefaultNetworkLayers(conf, portNumber, 0, 0);
  468. if(retval != UA_STATUSCODE_GOOD) {
  469. UA_ServerConfig_delete(conf);
  470. return NULL;
  471. }
  472. if(trustListSize == 0)
  473. UA_LOG_WARNING(UA_Log_Stdout, UA_LOGCATEGORY_USERLAND,
  474. "No CA trust-list provided. Any remote certificate will be accepted.");
  475. /* Allocate the SecurityPolicies */
  476. conf->securityPoliciesSize = 0;
  477. conf->securityPolicies = (UA_SecurityPolicy *)UA_malloc(sizeof(UA_SecurityPolicy) * 4);
  478. if(!conf->securityPolicies) {
  479. UA_ServerConfig_delete(conf);
  480. return NULL;
  481. }
  482. /* Populate the SecurityPolicies */
  483. UA_ByteString localCertificate = UA_BYTESTRING_NULL;
  484. UA_ByteString localPrivateKey = UA_BYTESTRING_NULL;
  485. if(certificate)
  486. localCertificate = *certificate;
  487. if(privateKey)
  488. localPrivateKey = *privateKey;
  489. retval = UA_SecurityPolicy_None(&conf->securityPolicies[0], NULL,
  490. localCertificate, &conf->logger);
  491. if(retval != UA_STATUSCODE_GOOD) {
  492. UA_ServerConfig_delete(conf);
  493. return NULL;
  494. }
  495. ++conf->securityPoliciesSize;
  496. retval = UA_SecurityPolicy_Basic128Rsa15(&conf->securityPolicies[1],
  497. &conf->certificateVerification,
  498. localCertificate, localPrivateKey,
  499. &conf->logger);
  500. if(retval != UA_STATUSCODE_GOOD) {
  501. UA_ServerConfig_delete(conf);
  502. return NULL;
  503. }
  504. ++conf->securityPoliciesSize;
  505. retval = UA_SecurityPolicy_Basic256(&conf->securityPolicies[2],
  506. &conf->certificateVerification,
  507. localCertificate, localPrivateKey, &conf->logger);
  508. if(retval != UA_STATUSCODE_GOOD) {
  509. UA_ServerConfig_delete(conf);
  510. return NULL;
  511. }
  512. ++conf->securityPoliciesSize;
  513. retval = UA_SecurityPolicy_Basic256Sha256(&conf->securityPolicies[3],
  514. &conf->certificateVerification,
  515. localCertificate, localPrivateKey, &conf->logger);
  516. if(retval != UA_STATUSCODE_GOOD) {
  517. UA_ServerConfig_delete(conf);
  518. return NULL;
  519. }
  520. ++conf->securityPoliciesSize;
  521. /* Allocate the endpoints */
  522. conf->endpointsSize = 0;
  523. conf->endpoints = (UA_EndpointDescription *)
  524. UA_malloc(sizeof(UA_EndpointDescription) * 7);
  525. if(!conf->endpoints) {
  526. UA_ServerConfig_delete(conf);
  527. return NULL;
  528. }
  529. /* Populate the endpoints */
  530. retval = createEndpoint(conf, &conf->endpoints[conf->endpointsSize],
  531. &conf->securityPolicies[0], UA_MESSAGESECURITYMODE_NONE);
  532. if(retval != UA_STATUSCODE_GOOD) {
  533. UA_ServerConfig_delete(conf);
  534. return NULL;
  535. }
  536. ++conf->endpointsSize;
  537. retval = createEndpoint(conf, &conf->endpoints[conf->endpointsSize],
  538. &conf->securityPolicies[1], UA_MESSAGESECURITYMODE_SIGN);
  539. if(retval != UA_STATUSCODE_GOOD) {
  540. UA_ServerConfig_delete(conf);
  541. return NULL;
  542. }
  543. ++conf->endpointsSize;
  544. retval = createEndpoint(conf, &conf->endpoints[conf->endpointsSize],
  545. &conf->securityPolicies[1], UA_MESSAGESECURITYMODE_SIGNANDENCRYPT);
  546. if(retval != UA_STATUSCODE_GOOD) {
  547. UA_ServerConfig_delete(conf);
  548. return NULL;
  549. }
  550. ++conf->endpointsSize;
  551. retval = createEndpoint(conf, &conf->endpoints[conf->endpointsSize],
  552. &conf->securityPolicies[2], UA_MESSAGESECURITYMODE_SIGN);
  553. if(retval != UA_STATUSCODE_GOOD) {
  554. UA_ServerConfig_delete(conf);
  555. return NULL;
  556. }
  557. ++conf->endpointsSize;
  558. retval = createEndpoint(conf, &conf->endpoints[conf->endpointsSize],
  559. &conf->securityPolicies[2], UA_MESSAGESECURITYMODE_SIGNANDENCRYPT);
  560. if(retval != UA_STATUSCODE_GOOD) {
  561. UA_ServerConfig_delete(conf);
  562. return NULL;
  563. }
  564. ++conf->endpointsSize;
  565. retval = createEndpoint(conf, &conf->endpoints[conf->endpointsSize],
  566. &conf->securityPolicies[3], UA_MESSAGESECURITYMODE_SIGN);
  567. if(retval != UA_STATUSCODE_GOOD) {
  568. UA_ServerConfig_delete(conf);
  569. return NULL;
  570. }
  571. ++conf->endpointsSize;
  572. retval = createEndpoint(conf, &conf->endpoints[conf->endpointsSize],
  573. &conf->securityPolicies[3], UA_MESSAGESECURITYMODE_SIGNANDENCRYPT);
  574. if(retval != UA_STATUSCODE_GOOD) {
  575. UA_ServerConfig_delete(conf);
  576. return NULL;
  577. }
  578. ++conf->endpointsSize;
  579. return conf;
  580. }
  581. #endif
  582. void
  583. UA_ServerConfig_delete(UA_ServerConfig *config) {
  584. if(!config)
  585. return;
  586. /* Server Description */
  587. UA_BuildInfo_deleteMembers(&config->buildInfo);
  588. UA_ApplicationDescription_deleteMembers(&config->applicationDescription);
  589. #ifdef UA_ENABLE_DISCOVERY
  590. UA_String_deleteMembers(&config->mdnsServerName);
  591. UA_Array_delete(config->serverCapabilities, config->serverCapabilitiesSize,
  592. &UA_TYPES[UA_TYPES_STRING]);
  593. config->serverCapabilities = NULL;
  594. config->serverCapabilitiesSize = 0;
  595. #endif
  596. /* Nodestore */
  597. if(config->nodestore.deleteNodestore)
  598. config->nodestore.deleteNodestore(config->nodestore.context);
  599. /* Custom DataTypes */
  600. /* nothing to do */
  601. /* Networking */
  602. for(size_t i = 0; i < config->networkLayersSize; ++i)
  603. config->networkLayers[i].deleteMembers(&config->networkLayers[i]);
  604. UA_free(config->networkLayers);
  605. config->networkLayers = NULL;
  606. config->networkLayersSize = 0;
  607. UA_String_deleteMembers(&config->customHostname);
  608. config->customHostname = UA_STRING_NULL;
  609. for(size_t i = 0; i < config->securityPoliciesSize; ++i) {
  610. UA_SecurityPolicy *policy = &config->securityPolicies[i];
  611. policy->deleteMembers(policy);
  612. }
  613. UA_free(config->securityPolicies);
  614. config->securityPolicies = NULL;
  615. config->securityPoliciesSize = 0;
  616. for(size_t i = 0; i < config->endpointsSize; ++i)
  617. UA_EndpointDescription_deleteMembers(&config->endpoints[i]);
  618. UA_free(config->endpoints);
  619. config->endpoints = NULL;
  620. config->endpointsSize = 0;
  621. /* Certificate Validation */
  622. config->certificateVerification.deleteMembers(&config->certificateVerification);
  623. /* Access Control */
  624. config->accessControl.deleteMembers(&config->accessControl);
  625. /* Historical data */
  626. #ifdef UA_ENABLE_HISTORIZING
  627. if(config->historyDatabase.deleteMembers)
  628. config->historyDatabase.deleteMembers(&config->historyDatabase);
  629. #endif
  630. /* Logger */
  631. if(config->logger.clear)
  632. config->logger.clear(config->logger.context);
  633. UA_free(config);
  634. }
  635. #ifdef UA_ENABLE_PUBSUB /* conditional compilation */
  636. /**
  637. * Add a pubsubTransportLayer to the configuration.
  638. * Memory is reallocated on demand */
  639. UA_StatusCode
  640. UA_ServerConfig_addPubSubTransportLayer(UA_ServerConfig *config,
  641. UA_PubSubTransportLayer *pubsubTransportLayer) {
  642. if(config->pubsubTransportLayersSize == 0) {
  643. config->pubsubTransportLayers = (UA_PubSubTransportLayer *)
  644. UA_malloc(sizeof(UA_PubSubTransportLayer));
  645. } else {
  646. config->pubsubTransportLayers = (UA_PubSubTransportLayer*)
  647. UA_realloc(config->pubsubTransportLayers,
  648. sizeof(UA_PubSubTransportLayer) * (config->pubsubTransportLayersSize + 1));
  649. }
  650. if(config->pubsubTransportLayers == NULL)
  651. return UA_STATUSCODE_BADOUTOFMEMORY;
  652. memcpy(&config->pubsubTransportLayers[config->pubsubTransportLayersSize],
  653. pubsubTransportLayer, sizeof(UA_PubSubTransportLayer));
  654. config->pubsubTransportLayersSize++;
  655. return UA_STATUSCODE_GOOD;
  656. }
  657. #endif /* UA_ENABLE_PUBSUB */
  658. /***************************/
  659. /* Default Client Settings */
  660. /***************************/
  661. static UA_INLINE void
  662. UA_ClientConnectionTCP_poll_callback(UA_Client *client, void *data) {
  663. UA_ClientConnectionTCP_poll(client, data);
  664. }
  665. UA_StatusCode
  666. UA_ClientConfig_setDefault(UA_ClientConfig *config) {
  667. config->timeout = 5000;
  668. config->secureChannelLifeTime = 10 * 60 * 1000; /* 10 minutes */
  669. config->logger.log = UA_Log_Stdout_log;
  670. config->logger.context = NULL;
  671. config->logger.clear = UA_Log_Stdout_clear;
  672. config->localConnectionConfig = UA_ConnectionConfig_default;
  673. /* Certificate Verification that accepts every certificate. Can be
  674. * overwritten when the policy is specialized. */
  675. UA_CertificateVerification_AcceptAll(&config->certificateVerification);
  676. /* With encryption enabled, the applicationUri needs to match the URI from
  677. * the certificate */
  678. config->clientDescription.applicationUri = UA_STRING_ALLOC(APPLICATION_URI);
  679. config->clientDescription.applicationType = UA_APPLICATIONTYPE_CLIENT;
  680. if(config->securityPoliciesSize > 0) {
  681. UA_LOG_ERROR(&config->logger, UA_LOGCATEGORY_NETWORK,
  682. "Could not initialize a config that already has SecurityPolicies");
  683. return UA_STATUSCODE_BADINTERNALERROR;
  684. }
  685. config->securityPolicies = (UA_SecurityPolicy*)UA_malloc(sizeof(UA_SecurityPolicy));
  686. if(!config->securityPolicies)
  687. return UA_STATUSCODE_BADOUTOFMEMORY;
  688. UA_StatusCode retval = UA_SecurityPolicy_None(config->securityPolicies, NULL,
  689. UA_BYTESTRING_NULL, &config->logger);
  690. if(retval != UA_STATUSCODE_GOOD) {
  691. UA_free(config->securityPolicies);
  692. config->securityPolicies = NULL;
  693. return retval;
  694. }
  695. config->securityPoliciesSize = 1;
  696. config->connectionFunc = UA_ClientConnectionTCP;
  697. config->initConnectionFunc = UA_ClientConnectionTCP_init; /* for async client */
  698. config->pollConnectionFunc = UA_ClientConnectionTCP_poll_callback; /* for async connection */
  699. config->customDataTypes = NULL;
  700. config->stateCallback = NULL;
  701. config->connectivityCheckInterval = 0;
  702. config->requestedSessionTimeout = 1200000; /* requestedSessionTimeout */
  703. config->inactivityCallback = NULL;
  704. config->clientContext = NULL;
  705. #ifdef UA_ENABLE_SUBSCRIPTIONS
  706. config->outStandingPublishRequests = 10;
  707. config->subscriptionInactivityCallback = NULL;
  708. #endif
  709. return UA_STATUSCODE_GOOD;
  710. }
  711. #ifdef UA_ENABLE_ENCRYPTION
  712. UA_StatusCode
  713. UA_ClientConfig_setDefaultEncryption(UA_ClientConfig *config,
  714. UA_ByteString localCertificate, UA_ByteString privateKey,
  715. const UA_ByteString *trustList, size_t trustListSize,
  716. const UA_ByteString *revocationList, size_t revocationListSize) {
  717. UA_StatusCode retval = UA_ClientConfig_setDefault(config);
  718. if(retval != UA_STATUSCODE_GOOD)
  719. return retval;
  720. retval = UA_CertificateVerification_Trustlist(&config->certificateVerification,
  721. trustList, trustListSize,
  722. revocationList, revocationListSize);
  723. if(retval != UA_STATUSCODE_GOOD)
  724. return retval;
  725. /* Populate SecurityPolicies */
  726. UA_SecurityPolicy *sp = (UA_SecurityPolicy*)
  727. UA_realloc(config->securityPolicies, sizeof(UA_SecurityPolicy) * 4);
  728. if(!sp)
  729. return UA_STATUSCODE_BADOUTOFMEMORY;
  730. config->securityPolicies = sp;
  731. retval = UA_SecurityPolicy_Basic128Rsa15(&config->securityPolicies[1],
  732. &config->certificateVerification,
  733. localCertificate, privateKey, &config->logger);
  734. if(retval != UA_STATUSCODE_GOOD)
  735. return retval;
  736. ++config->securityPoliciesSize;
  737. retval = UA_SecurityPolicy_Basic256(&config->securityPolicies[2],
  738. &config->certificateVerification,
  739. localCertificate, privateKey, &config->logger);
  740. if(retval != UA_STATUSCODE_GOOD)
  741. return retval;
  742. ++config->securityPoliciesSize;
  743. retval = UA_SecurityPolicy_Basic256Sha256(&config->securityPolicies[3],
  744. &config->certificateVerification,
  745. localCertificate, privateKey, &config->logger);
  746. if(retval != UA_STATUSCODE_GOOD)
  747. return retval;
  748. ++config->securityPoliciesSize;
  749. return UA_STATUSCODE_GOOD;
  750. }
  751. #endif