ua_config_default.c 31 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879
  1. /* This work is licensed under a Creative Commons CCZero 1.0 Universal License.
  2. * See http://creativecommons.org/publicdomain/zero/1.0/ for more information.
  3. *
  4. * Copyright 2017 (c) Fraunhofer IOSB (Author: Julius Pfrommer)
  5. * Copyright 2017 (c) Julian Grothoff
  6. * Copyright 2017-2018 (c) Mark Giraud, Fraunhofer IOSB
  7. * Copyright 2017 (c) Stefan Profanter, fortiss GmbH
  8. * Copyright 2017 (c) Thomas Stalder, Blue Time Concept SA
  9. * Copyright 2018 (c) Daniel Feist, Precitec GmbH & Co. KG
  10. * Copyright 2018 (c) Fabian Arndt, Root-Core
  11. */
  12. #include "ua_config_default.h"
  13. #include "ua_client_config.h"
  14. #include "ua_log_stdout.h"
  15. #include "ua_network_tcp.h"
  16. #include "ua_accesscontrol_default.h"
  17. #include "ua_pki_certificate.h"
  18. #include "ua_nodestore_default.h"
  19. #include "ua_securitypolicies.h"
  20. #include "ua_plugin_securitypolicy.h"
  21. /* Struct initialization works across ANSI C/C99/C++ if it is done when the
  22. * variable is first declared. Assigning values to existing structs is
  23. * heterogeneous across the three. */
  24. static UA_INLINE UA_UInt32Range
  25. UA_UINT32RANGE(UA_UInt32 min, UA_UInt32 max) {
  26. UA_UInt32Range range = {min, max};
  27. return range;
  28. }
  29. static UA_INLINE UA_DurationRange
  30. UA_DURATIONRANGE(UA_Duration min, UA_Duration max) {
  31. UA_DurationRange range = {min, max};
  32. return range;
  33. }
  34. /*******************************/
  35. /* Default Connection Settings */
  36. /*******************************/
  37. const UA_ConnectionConfig UA_ConnectionConfig_default = {
  38. 0, /* .protocolVersion */
  39. 65535, /* .sendBufferSize, 64k per chunk */
  40. 65535, /* .recvBufferSize, 64k per chunk */
  41. 0, /* .maxMessageSize, 0 -> unlimited */
  42. 0 /* .maxChunkCount, 0 -> unlimited */
  43. };
  44. /***************************/
  45. /* Default Server Settings */
  46. /***************************/
  47. #define MANUFACTURER_NAME "open62541"
  48. #define PRODUCT_NAME "open62541 OPC UA Server"
  49. #define PRODUCT_URI "http://open62541.org"
  50. #define APPLICATION_NAME "open62541-based OPC UA Application"
  51. #define APPLICATION_URI "urn:unconfigured:application"
  52. #define STRINGIFY(arg) #arg
  53. #define VERSION(MAJOR, MINOR, PATCH, LABEL) \
  54. STRINGIFY(MAJOR) "." STRINGIFY(MINOR) "." STRINGIFY(PATCH) LABEL
  55. static UA_StatusCode
  56. createEndpoint(UA_ServerConfig *conf, UA_EndpointDescription *endpoint,
  57. const UA_SecurityPolicy *securityPolicy,
  58. UA_MessageSecurityMode securityMode) {
  59. UA_EndpointDescription_init(endpoint);
  60. endpoint->securityMode = securityMode;
  61. UA_String_copy(&securityPolicy->policyUri, &endpoint->securityPolicyUri);
  62. endpoint->transportProfileUri =
  63. UA_STRING_ALLOC("http://opcfoundation.org/UA-Profile/Transport/uatcp-uasc-uabinary");
  64. /* Enable all login mechanisms from the access control plugin */
  65. UA_StatusCode retval = UA_Array_copy(conf->accessControl.userTokenPolicies,
  66. conf->accessControl.userTokenPoliciesSize,
  67. (void **)&endpoint->userIdentityTokens,
  68. &UA_TYPES[UA_TYPES_USERTOKENPOLICY]);
  69. if(retval != UA_STATUSCODE_GOOD)
  70. return retval;
  71. endpoint->userIdentityTokensSize =
  72. conf->accessControl.userTokenPoliciesSize;
  73. UA_String_copy(&securityPolicy->localCertificate, &endpoint->serverCertificate);
  74. UA_ApplicationDescription_copy(&conf->applicationDescription,
  75. &endpoint->server);
  76. return UA_STATUSCODE_GOOD;
  77. }
  78. void
  79. UA_ServerConfig_set_customHostname(UA_ServerConfig *config, const UA_String customHostname) {
  80. if(!config)
  81. return;
  82. UA_String_deleteMembers(&config->customHostname);
  83. UA_String_copy(&customHostname, &config->customHostname);
  84. }
  85. static const size_t usernamePasswordsSize = 2;
  86. static UA_UsernamePasswordLogin usernamePasswords[2] = {
  87. {UA_STRING_STATIC("user1"), UA_STRING_STATIC("password")},
  88. {UA_STRING_STATIC("user2"), UA_STRING_STATIC("password1")}};
  89. static UA_ServerConfig *
  90. createDefaultConfig(void) {
  91. UA_ServerConfig *conf = (UA_ServerConfig *)UA_malloc(sizeof(UA_ServerConfig));
  92. if(!conf)
  93. return NULL;
  94. /* Zero out.. All members have a valid initial value */
  95. memset(conf, 0, sizeof(UA_ServerConfig));
  96. /* --> Start setting the default static config <-- */
  97. conf->nThreads = 1;
  98. conf->logger = UA_Log_Stdout_;
  99. /* Server Description */
  100. conf->buildInfo.productUri = UA_STRING_ALLOC(PRODUCT_URI);
  101. conf->buildInfo.manufacturerName = UA_STRING_ALLOC(MANUFACTURER_NAME);
  102. conf->buildInfo.productName = UA_STRING_ALLOC(PRODUCT_NAME);
  103. conf->buildInfo.softwareVersion =
  104. UA_STRING_ALLOC(VERSION(UA_OPEN62541_VER_MAJOR, UA_OPEN62541_VER_MINOR,
  105. UA_OPEN62541_VER_PATCH, UA_OPEN62541_VER_LABEL));
  106. #ifdef UA_PACK_DEBIAN
  107. conf->buildInfo.buildNumber = UA_STRING_ALLOC("deb");
  108. #else
  109. conf->buildInfo.buildNumber = UA_STRING_ALLOC(__DATE__ " " __TIME__);
  110. #endif
  111. conf->buildInfo.buildDate = 0;
  112. conf->applicationDescription.applicationUri = UA_STRING_ALLOC(APPLICATION_URI);
  113. conf->applicationDescription.productUri = UA_STRING_ALLOC(PRODUCT_URI);
  114. conf->applicationDescription.applicationName =
  115. UA_LOCALIZEDTEXT_ALLOC("en", APPLICATION_NAME);
  116. conf->applicationDescription.applicationType = UA_APPLICATIONTYPE_SERVER;
  117. /* conf->applicationDescription.gatewayServerUri = UA_STRING_NULL; */
  118. /* conf->applicationDescription.discoveryProfileUri = UA_STRING_NULL; */
  119. /* conf->applicationDescription.discoveryUrlsSize = 0; */
  120. /* conf->applicationDescription.discoveryUrls = NULL; */
  121. #ifdef UA_ENABLE_DISCOVERY
  122. /* conf->mdnsServerName = UA_STRING_NULL; */
  123. /* conf->serverCapabilitiesSize = 0; */
  124. /* conf->serverCapabilities = NULL; */
  125. #endif
  126. /* Custom DataTypes */
  127. /* conf->customDataTypesSize = 0; */
  128. /* conf->customDataTypes = NULL; */
  129. /* Networking */
  130. /* conf->networkLayersSize = 0; */
  131. /* conf->networkLayers = NULL; */
  132. /* conf->customHostname = UA_STRING_NULL; */
  133. /* Endpoints */
  134. /* conf->endpoints = {0, NULL}; */
  135. /* Certificate Verification that accepts every certificate. Can be
  136. * overwritten when the policy is specialized. */
  137. UA_CertificateVerification_AcceptAll(&conf->certificateVerification);
  138. /* Global Node Lifecycle */
  139. conf->nodeLifecycle.constructor = NULL;
  140. conf->nodeLifecycle.destructor = NULL;
  141. if (UA_AccessControl_default(&conf->accessControl, true, usernamePasswordsSize,
  142. usernamePasswords) != UA_STATUSCODE_GOOD) {
  143. UA_ServerConfig_delete(conf);
  144. return NULL;
  145. }
  146. /* Relax constraints for the InformationModel */
  147. conf->relaxEmptyValueConstraint = true; /* Allow empty values */
  148. /* Limits for SecureChannels */
  149. conf->maxSecureChannels = 40;
  150. conf->maxSecurityTokenLifetime = 10 * 60 * 1000; /* 10 minutes */
  151. /* Limits for Sessions */
  152. conf->maxSessions = 100;
  153. conf->maxSessionTimeout = 60.0 * 60.0 * 1000.0; /* 1h */
  154. /* Limits for Subscriptions */
  155. conf->publishingIntervalLimits = UA_DURATIONRANGE(100.0, 3600.0 * 1000.0);
  156. conf->lifeTimeCountLimits = UA_UINT32RANGE(3, 15000);
  157. conf->keepAliveCountLimits = UA_UINT32RANGE(1, 100);
  158. conf->maxNotificationsPerPublish = 1000;
  159. conf->enableRetransmissionQueue = true;
  160. conf->maxRetransmissionQueueSize = 0; /* unlimited */
  161. #ifdef UA_ENABLE_SUBSCRIPTIONS_EVENTS
  162. conf->maxEventsPerNode = 0; /* unlimited */
  163. #endif
  164. /* Limits for MonitoredItems */
  165. conf->samplingIntervalLimits = UA_DURATIONRANGE(50.0, 24.0 * 3600.0 * 1000.0);
  166. conf->queueSizeLimits = UA_UINT32RANGE(1, 100);
  167. #ifdef UA_ENABLE_DISCOVERY
  168. conf->discoveryCleanupTimeout = 60 * 60;
  169. #endif
  170. #ifdef UA_ENABLE_HISTORIZING
  171. /* conf->accessHistoryDataCapability = UA_FALSE; */
  172. /* conf->maxReturnDataValues = 0; */
  173. /* conf->accessHistoryEventsCapability = UA_FALSE; */
  174. /* conf->maxReturnEventValues = 0; */
  175. /* conf->insertDataCapability = UA_FALSE; */
  176. /* conf->insertEventCapability = UA_FALSE; */
  177. /* conf->insertAnnotationsCapability = UA_FALSE; */
  178. /* conf->replaceDataCapability = UA_FALSE; */
  179. /* conf->replaceEventCapability = UA_FALSE; */
  180. /* conf->updateDataCapability = UA_FALSE; */
  181. /* conf->updateEventCapability = UA_FALSE; */
  182. /* conf->deleteRawCapability = UA_FALSE; */
  183. /* conf->deleteEventCapability = UA_FALSE; */
  184. /* conf->deleteAtTimeDataCapability = UA_FALSE; */
  185. #endif
  186. /* --> Finish setting the default static config <-- */
  187. return conf;
  188. }
  189. static UA_StatusCode
  190. addDefaultNetworkLayers(UA_ServerConfig *conf, UA_UInt16 portNumber, UA_UInt32 sendBufferSize, UA_UInt32 recvBufferSize) {
  191. /* Add a network layer */
  192. conf->networkLayers = (UA_ServerNetworkLayer *)
  193. UA_malloc(sizeof(UA_ServerNetworkLayer));
  194. if(!conf->networkLayers)
  195. return UA_STATUSCODE_BADOUTOFMEMORY;
  196. UA_ConnectionConfig config = UA_ConnectionConfig_default;
  197. if (sendBufferSize > 0)
  198. config.sendBufferSize = sendBufferSize;
  199. if (recvBufferSize > 0)
  200. config.recvBufferSize = recvBufferSize;
  201. conf->networkLayers[0] =
  202. UA_ServerNetworkLayerTCP(config, portNumber, &conf->logger);
  203. if (!conf->networkLayers[0].handle)
  204. return UA_STATUSCODE_BADOUTOFMEMORY;
  205. conf->networkLayersSize = 1;
  206. return UA_STATUSCODE_GOOD;
  207. }
  208. UA_ServerConfig *
  209. UA_ServerConfig_new_customBuffer(UA_UInt16 portNumber,
  210. const UA_ByteString *certificate,
  211. UA_UInt32 sendBufferSize,
  212. UA_UInt32 recvBufferSize) {
  213. UA_ServerConfig *conf = createDefaultConfig();
  214. if (!conf) {
  215. return NULL;
  216. }
  217. UA_StatusCode retval = UA_Nodestore_default_new(&conf->nodestore);
  218. if(retval != UA_STATUSCODE_GOOD) {
  219. UA_ServerConfig_delete(conf);
  220. return NULL;
  221. }
  222. if(addDefaultNetworkLayers(conf, portNumber, sendBufferSize, recvBufferSize) != UA_STATUSCODE_GOOD) {
  223. UA_ServerConfig_delete(conf);
  224. return NULL;
  225. }
  226. /* Allocate the SecurityPolicies */
  227. conf->securityPolicies = (UA_SecurityPolicy *)UA_malloc(sizeof(UA_SecurityPolicy));
  228. if(!conf->securityPolicies) {
  229. UA_ServerConfig_delete(conf);
  230. return NULL;
  231. }
  232. conf->securityPoliciesSize = 1;
  233. /* Populate the SecurityPolicies */
  234. UA_ByteString localCertificate = UA_BYTESTRING_NULL;
  235. if(certificate)
  236. localCertificate = *certificate;
  237. retval =
  238. UA_SecurityPolicy_None(&conf->securityPolicies[0], NULL, localCertificate, &conf->logger);
  239. if(retval != UA_STATUSCODE_GOOD) {
  240. UA_ServerConfig_delete(conf);
  241. return NULL;
  242. }
  243. /* Allocate the endpoint */
  244. conf->endpoints = (UA_EndpointDescription *)UA_malloc(sizeof(UA_EndpointDescription));
  245. if(!conf->endpoints) {
  246. UA_ServerConfig_delete(conf);
  247. return NULL;
  248. }
  249. conf->endpointsSize = 1;
  250. /* Populate the endpoint */
  251. retval =
  252. createEndpoint(conf, &conf->endpoints[0], &conf->securityPolicies[0],
  253. UA_MESSAGESECURITYMODE_NONE);
  254. if(retval != UA_STATUSCODE_GOOD) {
  255. UA_ServerConfig_delete(conf);
  256. return NULL;
  257. }
  258. return conf;
  259. }
  260. #ifdef UA_ENABLE_ENCRYPTION
  261. UA_ServerConfig *
  262. UA_ServerConfig_new_basic128rsa15(UA_UInt16 portNumber,
  263. const UA_ByteString *certificate,
  264. const UA_ByteString *privateKey,
  265. const UA_ByteString *trustList,
  266. size_t trustListSize,
  267. const UA_ByteString *revocationList,
  268. size_t revocationListSize) {
  269. UA_ServerConfig *conf = createDefaultConfig();
  270. UA_StatusCode retval = UA_CertificateVerification_Trustlist(&conf->certificateVerification,
  271. trustList, trustListSize,
  272. revocationList, revocationListSize);
  273. if(retval != UA_STATUSCODE_GOOD) {
  274. UA_ServerConfig_delete(conf);
  275. return NULL;
  276. }
  277. retval = UA_Nodestore_default_new(&conf->nodestore);
  278. if(retval != UA_STATUSCODE_GOOD) {
  279. UA_ServerConfig_delete(conf);
  280. return NULL;
  281. }
  282. if(addDefaultNetworkLayers(conf, portNumber, 0, 0) != UA_STATUSCODE_GOOD) {
  283. UA_ServerConfig_delete(conf);
  284. return NULL;
  285. }
  286. if(trustListSize == 0)
  287. UA_LOG_WARNING(UA_Log_Stdout, UA_LOGCATEGORY_USERLAND,
  288. "No CA trust-list provided. Any remote certificate will be accepted.");
  289. /* Allocate the SecurityPolicies */
  290. conf->securityPoliciesSize = 0;
  291. conf->securityPolicies = (UA_SecurityPolicy *)UA_malloc(sizeof(UA_SecurityPolicy) * 2);
  292. if(!conf->securityPolicies) {
  293. UA_ServerConfig_delete(conf);
  294. return NULL;
  295. }
  296. /* Populate the SecurityPolicies */
  297. UA_ByteString localCertificate = UA_BYTESTRING_NULL;
  298. UA_ByteString localPrivateKey = UA_BYTESTRING_NULL;
  299. if(certificate)
  300. localCertificate = *certificate;
  301. if(privateKey)
  302. localPrivateKey = *privateKey;
  303. ++conf->securityPoliciesSize;
  304. retval =
  305. UA_SecurityPolicy_None(&conf->securityPolicies[0], NULL, localCertificate, &conf->logger);
  306. if(retval != UA_STATUSCODE_GOOD) {
  307. UA_ServerConfig_delete(conf);
  308. return NULL;
  309. }
  310. ++conf->securityPoliciesSize;
  311. retval =
  312. UA_SecurityPolicy_Basic128Rsa15(&conf->securityPolicies[1], &conf->certificateVerification,
  313. localCertificate, localPrivateKey, &conf->logger);
  314. if(retval != UA_STATUSCODE_GOOD) {
  315. UA_ServerConfig_delete(conf);
  316. return NULL;
  317. }
  318. /* Allocate the endpoints */
  319. conf->endpointsSize = 0;
  320. conf->endpoints = (UA_EndpointDescription *)UA_malloc(sizeof(UA_EndpointDescription) * 3);
  321. if(!conf->endpoints) {
  322. UA_ServerConfig_delete(conf);
  323. return NULL;
  324. }
  325. /* Populate the endpoints */
  326. ++conf->endpointsSize;
  327. retval = createEndpoint(conf, &conf->endpoints[0], &conf->securityPolicies[0],
  328. UA_MESSAGESECURITYMODE_NONE);
  329. if(retval != UA_STATUSCODE_GOOD) {
  330. UA_ServerConfig_delete(conf);
  331. return NULL;
  332. }
  333. ++conf->endpointsSize;
  334. retval = createEndpoint(conf, &conf->endpoints[1], &conf->securityPolicies[1],
  335. UA_MESSAGESECURITYMODE_SIGN);
  336. if(retval != UA_STATUSCODE_GOOD) {
  337. UA_ServerConfig_delete(conf);
  338. return NULL;
  339. }
  340. ++conf->endpointsSize;
  341. retval = createEndpoint(conf, &conf->endpoints[2], &conf->securityPolicies[1],
  342. UA_MESSAGESECURITYMODE_SIGNANDENCRYPT);
  343. if(retval != UA_STATUSCODE_GOOD) {
  344. UA_ServerConfig_delete(conf);
  345. return NULL;
  346. }
  347. return conf;
  348. }
  349. UA_ServerConfig *
  350. UA_ServerConfig_new_basic256sha256(UA_UInt16 portNumber,
  351. const UA_ByteString *certificate,
  352. const UA_ByteString *privateKey,
  353. const UA_ByteString *trustList,
  354. size_t trustListSize,
  355. const UA_ByteString *revocationList,
  356. size_t revocationListSize) {
  357. UA_ServerConfig *conf = createDefaultConfig();
  358. UA_StatusCode retval = UA_CertificateVerification_Trustlist(&conf->certificateVerification,
  359. trustList, trustListSize,
  360. revocationList, revocationListSize);
  361. if(retval != UA_STATUSCODE_GOOD) {
  362. UA_ServerConfig_delete(conf);
  363. return NULL;
  364. }
  365. retval = UA_Nodestore_default_new(&conf->nodestore);
  366. if(retval != UA_STATUSCODE_GOOD) {
  367. UA_ServerConfig_delete(conf);
  368. return NULL;
  369. }
  370. if(addDefaultNetworkLayers(conf, portNumber, 0, 0) != UA_STATUSCODE_GOOD) {
  371. UA_ServerConfig_delete(conf);
  372. return NULL;
  373. }
  374. if(trustListSize == 0)
  375. UA_LOG_WARNING(UA_Log_Stdout, UA_LOGCATEGORY_USERLAND,
  376. "No CA trust-list provided. Any remote certificate will be accepted.");
  377. /* Allocate the SecurityPolicies */
  378. conf->securityPoliciesSize = 0;
  379. conf->securityPolicies = (UA_SecurityPolicy *)UA_malloc(sizeof(UA_SecurityPolicy) * 2);
  380. if(!conf->securityPolicies) {
  381. UA_ServerConfig_delete(conf);
  382. return NULL;
  383. }
  384. /* Populate the SecurityPolicies */
  385. UA_ByteString localCertificate = UA_BYTESTRING_NULL;
  386. UA_ByteString localPrivateKey = UA_BYTESTRING_NULL;
  387. if(certificate)
  388. localCertificate = *certificate;
  389. if(privateKey)
  390. localPrivateKey = *privateKey;
  391. ++conf->securityPoliciesSize;
  392. retval =
  393. UA_SecurityPolicy_None(&conf->securityPolicies[0], NULL, localCertificate, &conf->logger);
  394. if(retval != UA_STATUSCODE_GOOD) {
  395. UA_ServerConfig_delete(conf);
  396. return NULL;
  397. }
  398. ++conf->securityPoliciesSize;
  399. retval =
  400. UA_SecurityPolicy_Basic256Sha256(&conf->securityPolicies[1], &conf->certificateVerification,
  401. localCertificate, localPrivateKey, &conf->logger);
  402. if(retval != UA_STATUSCODE_GOOD) {
  403. UA_ServerConfig_delete(conf);
  404. return NULL;
  405. }
  406. /* Allocate the endpoints */
  407. conf->endpointsSize = 0;
  408. conf->endpoints = (UA_EndpointDescription *)UA_malloc(sizeof(UA_EndpointDescription) * 3);
  409. if(!conf->endpoints) {
  410. UA_ServerConfig_delete(conf);
  411. return NULL;
  412. }
  413. /* Populate the endpoints */
  414. ++conf->endpointsSize;
  415. retval = createEndpoint(conf, &conf->endpoints[0], &conf->securityPolicies[0],
  416. UA_MESSAGESECURITYMODE_NONE);
  417. if(retval != UA_STATUSCODE_GOOD) {
  418. UA_ServerConfig_delete(conf);
  419. return NULL;
  420. }
  421. ++conf->endpointsSize;
  422. retval = createEndpoint(conf, &conf->endpoints[1], &conf->securityPolicies[1],
  423. UA_MESSAGESECURITYMODE_SIGN);
  424. if(retval != UA_STATUSCODE_GOOD) {
  425. UA_ServerConfig_delete(conf);
  426. return NULL;
  427. }
  428. ++conf->endpointsSize;
  429. retval = createEndpoint(conf, &conf->endpoints[2], &conf->securityPolicies[1],
  430. UA_MESSAGESECURITYMODE_SIGNANDENCRYPT);
  431. if(retval != UA_STATUSCODE_GOOD) {
  432. UA_ServerConfig_delete(conf);
  433. return NULL;
  434. }
  435. return conf;
  436. }
  437. UA_ServerConfig *
  438. UA_ServerConfig_new_allSecurityPolicies(UA_UInt16 portNumber,
  439. const UA_ByteString *certificate,
  440. const UA_ByteString *privateKey,
  441. const UA_ByteString *trustList,
  442. size_t trustListSize,
  443. const UA_ByteString *revocationList,
  444. size_t revocationListSize) {
  445. UA_ServerConfig *conf = createDefaultConfig();
  446. UA_StatusCode retval = UA_CertificateVerification_Trustlist(&conf->certificateVerification,
  447. trustList, trustListSize,
  448. revocationList, revocationListSize);
  449. if(retval != UA_STATUSCODE_GOOD) {
  450. UA_ServerConfig_delete(conf);
  451. return NULL;
  452. }
  453. retval = UA_Nodestore_default_new(&conf->nodestore);
  454. if(retval != UA_STATUSCODE_GOOD) {
  455. UA_ServerConfig_delete(conf);
  456. return NULL;
  457. }
  458. if(addDefaultNetworkLayers(conf, portNumber, 0, 0) != UA_STATUSCODE_GOOD) {
  459. UA_ServerConfig_delete(conf);
  460. return NULL;
  461. }
  462. if(trustListSize == 0)
  463. UA_LOG_WARNING(UA_Log_Stdout, UA_LOGCATEGORY_USERLAND,
  464. "No CA trust-list provided. Any remote certificate will be accepted.");
  465. /* Allocate the SecurityPolicies */
  466. conf->securityPoliciesSize = 0;
  467. conf->securityPolicies = (UA_SecurityPolicy *)UA_malloc(sizeof(UA_SecurityPolicy) * 4);
  468. if(!conf->securityPolicies) {
  469. UA_ServerConfig_delete(conf);
  470. return NULL;
  471. }
  472. /* Populate the SecurityPolicies */
  473. UA_ByteString localCertificate = UA_BYTESTRING_NULL;
  474. UA_ByteString localPrivateKey = UA_BYTESTRING_NULL;
  475. if(certificate)
  476. localCertificate = *certificate;
  477. if(privateKey)
  478. localPrivateKey = *privateKey;
  479. ++conf->securityPoliciesSize;
  480. retval =
  481. UA_SecurityPolicy_None(&conf->securityPolicies[0], NULL, localCertificate, &conf->logger);
  482. if(retval != UA_STATUSCODE_GOOD) {
  483. UA_ServerConfig_delete(conf);
  484. return NULL;
  485. }
  486. ++conf->securityPoliciesSize;
  487. retval =
  488. UA_SecurityPolicy_Basic128Rsa15(&conf->securityPolicies[1], &conf->certificateVerification,
  489. localCertificate, localPrivateKey, &conf->logger);
  490. if(retval != UA_STATUSCODE_GOOD) {
  491. UA_ServerConfig_delete(conf);
  492. return NULL;
  493. }
  494. ++conf->securityPoliciesSize;
  495. retval =
  496. UA_SecurityPolicy_Basic256(&conf->securityPolicies[2], &conf->certificateVerification,
  497. localCertificate, localPrivateKey, &conf->logger);
  498. if(retval != UA_STATUSCODE_GOOD) {
  499. UA_ServerConfig_delete(conf);
  500. return NULL;
  501. }
  502. ++conf->securityPoliciesSize;
  503. retval =
  504. UA_SecurityPolicy_Basic256Sha256(&conf->securityPolicies[3], &conf->certificateVerification,
  505. localCertificate, localPrivateKey, &conf->logger);
  506. if(retval != UA_STATUSCODE_GOOD) {
  507. UA_ServerConfig_delete(conf);
  508. return NULL;
  509. }
  510. /* Allocate the endpoints */
  511. conf->endpointsSize = 0;
  512. conf->endpoints = (UA_EndpointDescription *)UA_malloc(sizeof(UA_EndpointDescription) * 7);
  513. if(!conf->endpoints) {
  514. UA_ServerConfig_delete(conf);
  515. return NULL;
  516. }
  517. /* Populate the endpoints */
  518. retval = createEndpoint(conf, &conf->endpoints[conf->endpointsSize], &conf->securityPolicies[0],
  519. UA_MESSAGESECURITYMODE_NONE);
  520. ++conf->endpointsSize;
  521. if(retval != UA_STATUSCODE_GOOD) {
  522. UA_ServerConfig_delete(conf);
  523. return NULL;
  524. }
  525. retval = createEndpoint(conf, &conf->endpoints[conf->endpointsSize], &conf->securityPolicies[1],
  526. UA_MESSAGESECURITYMODE_SIGN);
  527. ++conf->endpointsSize;
  528. if(retval != UA_STATUSCODE_GOOD) {
  529. UA_ServerConfig_delete(conf);
  530. return NULL;
  531. }
  532. retval = createEndpoint(conf, &conf->endpoints[conf->endpointsSize], &conf->securityPolicies[1],
  533. UA_MESSAGESECURITYMODE_SIGNANDENCRYPT);
  534. ++conf->endpointsSize;
  535. if(retval != UA_STATUSCODE_GOOD) {
  536. UA_ServerConfig_delete(conf);
  537. return NULL;
  538. }
  539. retval = createEndpoint(conf, &conf->endpoints[conf->endpointsSize], &conf->securityPolicies[2],
  540. UA_MESSAGESECURITYMODE_SIGN);
  541. ++conf->endpointsSize;
  542. if(retval != UA_STATUSCODE_GOOD) {
  543. UA_ServerConfig_delete(conf);
  544. return NULL;
  545. }
  546. retval = createEndpoint(conf, &conf->endpoints[conf->endpointsSize], &conf->securityPolicies[2],
  547. UA_MESSAGESECURITYMODE_SIGNANDENCRYPT);
  548. ++conf->endpointsSize;
  549. if(retval != UA_STATUSCODE_GOOD) {
  550. UA_ServerConfig_delete(conf);
  551. return NULL;
  552. }
  553. retval = createEndpoint(conf, &conf->endpoints[conf->endpointsSize], &conf->securityPolicies[3],
  554. UA_MESSAGESECURITYMODE_SIGN);
  555. ++conf->endpointsSize;
  556. if(retval != UA_STATUSCODE_GOOD) {
  557. UA_ServerConfig_delete(conf);
  558. return NULL;
  559. }
  560. retval = createEndpoint(conf, &conf->endpoints[conf->endpointsSize], &conf->securityPolicies[3],
  561. UA_MESSAGESECURITYMODE_SIGNANDENCRYPT);
  562. ++conf->endpointsSize;
  563. if(retval != UA_STATUSCODE_GOOD) {
  564. UA_ServerConfig_delete(conf);
  565. return NULL;
  566. }
  567. return conf;
  568. }
  569. #endif
  570. void
  571. UA_ServerConfig_delete(UA_ServerConfig *config) {
  572. if(!config)
  573. return;
  574. /* Server Description */
  575. UA_BuildInfo_deleteMembers(&config->buildInfo);
  576. UA_ApplicationDescription_deleteMembers(&config->applicationDescription);
  577. #ifdef UA_ENABLE_DISCOVERY
  578. UA_String_deleteMembers(&config->mdnsServerName);
  579. UA_Array_delete(config->serverCapabilities, config->serverCapabilitiesSize,
  580. &UA_TYPES[UA_TYPES_STRING]);
  581. config->serverCapabilities = NULL;
  582. config->serverCapabilitiesSize = 0;
  583. #endif
  584. /* Nodestore */
  585. if(config->nodestore.deleteNodestore)
  586. config->nodestore.deleteNodestore(config->nodestore.context);
  587. /* Custom DataTypes */
  588. /* nothing to do */
  589. /* Networking */
  590. for(size_t i = 0; i < config->networkLayersSize; ++i)
  591. config->networkLayers[i].deleteMembers(&config->networkLayers[i]);
  592. UA_free(config->networkLayers);
  593. config->networkLayers = NULL;
  594. config->networkLayersSize = 0;
  595. UA_String_deleteMembers(&config->customHostname);
  596. config->customHostname = UA_STRING_NULL;
  597. for(size_t i = 0; i < config->securityPoliciesSize; ++i) {
  598. UA_SecurityPolicy *policy = &config->securityPolicies[i];
  599. policy->deleteMembers(policy);
  600. }
  601. UA_free(config->securityPolicies);
  602. config->securityPolicies = NULL;
  603. config->securityPoliciesSize = 0;
  604. for(size_t i = 0; i < config->endpointsSize; ++i)
  605. UA_EndpointDescription_deleteMembers(&config->endpoints[i]);
  606. UA_free(config->endpoints);
  607. config->endpoints = NULL;
  608. config->endpointsSize = 0;
  609. /* Certificate Validation */
  610. config->certificateVerification.deleteMembers(&config->certificateVerification);
  611. /* Access Control */
  612. config->accessControl.deleteMembers(&config->accessControl);
  613. /* Historical data */
  614. #ifdef UA_ENABLE_HISTORIZING
  615. if(config->historyDatabase.deleteMembers)
  616. config->historyDatabase.deleteMembers(&config->historyDatabase);
  617. #endif
  618. /* Logger */
  619. if(config->logger.clear)
  620. config->logger.clear(config->logger.context);
  621. UA_free(config);
  622. }
  623. #ifdef UA_ENABLE_PUBSUB /* conditional compilation */
  624. /**
  625. * Add a pubsubTransportLayer to the configuration.
  626. * Memory is reallocated on demand */
  627. UA_StatusCode
  628. UA_ServerConfig_addPubSubTransportLayer(UA_ServerConfig *config,
  629. UA_PubSubTransportLayer *pubsubTransportLayer) {
  630. if(config->pubsubTransportLayersSize == 0) {
  631. config->pubsubTransportLayers = (UA_PubSubTransportLayer *)
  632. UA_malloc(sizeof(UA_PubSubTransportLayer));
  633. } else {
  634. config->pubsubTransportLayers = (UA_PubSubTransportLayer*)
  635. UA_realloc(config->pubsubTransportLayers,
  636. sizeof(UA_PubSubTransportLayer) * (config->pubsubTransportLayersSize + 1));
  637. }
  638. if (config->pubsubTransportLayers == NULL) {
  639. return UA_STATUSCODE_BADOUTOFMEMORY;
  640. }
  641. memcpy(&config->pubsubTransportLayers[config->pubsubTransportLayersSize],
  642. pubsubTransportLayer, sizeof(UA_PubSubTransportLayer));
  643. config->pubsubTransportLayersSize++;
  644. return UA_STATUSCODE_GOOD;
  645. }
  646. #endif /* UA_ENABLE_PUBSUB */
  647. /***************************/
  648. /* Default Client Settings */
  649. /***************************/
  650. static UA_INLINE void UA_ClientConnectionTCP_poll_callback(UA_Client *client, void *data) {
  651. UA_ClientConnectionTCP_poll(client, data);
  652. }
  653. UA_StatusCode
  654. UA_ClientConfig_setDefault(UA_ClientConfig *config) {
  655. config->timeout = 5000;
  656. config->secureChannelLifeTime = 10 * 60 * 1000; /* 10 minutes */
  657. config->logger.log = UA_Log_Stdout_log;
  658. config->logger.context = NULL;
  659. config->logger.clear = UA_Log_Stdout_clear;
  660. config->localConnectionConfig = UA_ConnectionConfig_default;
  661. /* Certificate Verification that accepts every certificate. Can be
  662. * overwritten when the policy is specialized. */
  663. UA_CertificateVerification_AcceptAll(&config->certificateVerification);
  664. /* With encryption enabled, the applicationUri needs to match the URI from
  665. * the certificate */
  666. config->clientDescription.applicationUri = UA_STRING_ALLOC(APPLICATION_URI);
  667. config->clientDescription.applicationType = UA_APPLICATIONTYPE_CLIENT;
  668. if(config->securityPoliciesSize > 0) {
  669. UA_LOG_ERROR(&config->logger, UA_LOGCATEGORY_NETWORK,
  670. "Could not initialize a config that already has SecurityPolicies");
  671. return UA_STATUSCODE_BADINTERNALERROR;
  672. }
  673. config->securityPolicies = (UA_SecurityPolicy*)malloc(sizeof(UA_SecurityPolicy));
  674. if(!config->securityPolicies)
  675. return UA_STATUSCODE_BADOUTOFMEMORY;
  676. UA_StatusCode retval = UA_SecurityPolicy_None(config->securityPolicies, NULL,
  677. UA_BYTESTRING_NULL, &config->logger);
  678. if(retval != UA_STATUSCODE_GOOD) {
  679. free(config->securityPolicies);
  680. config->securityPolicies = NULL;
  681. return retval;
  682. }
  683. config->securityPoliciesSize = 1;
  684. config->connectionFunc = UA_ClientConnectionTCP;
  685. config->initConnectionFunc = UA_ClientConnectionTCP_init; /* for async client */
  686. config->pollConnectionFunc = UA_ClientConnectionTCP_poll_callback; /* for async connection */
  687. config->customDataTypes = NULL;
  688. config->stateCallback = NULL;
  689. config->connectivityCheckInterval = 0;
  690. config->requestedSessionTimeout = 1200000; /* requestedSessionTimeout */
  691. config->inactivityCallback = NULL;
  692. config->clientContext = NULL;
  693. #ifdef UA_ENABLE_SUBSCRIPTIONS
  694. config->outStandingPublishRequests = 10;
  695. config->subscriptionInactivityCallback = NULL;
  696. #endif
  697. return UA_STATUSCODE_GOOD;
  698. }
  699. #ifdef UA_ENABLE_ENCRYPTION
  700. UA_StatusCode
  701. UA_ClientConfig_setDefaultEncryption(UA_ClientConfig *config,
  702. UA_ByteString localCertificate, UA_ByteString privateKey,
  703. const UA_ByteString *trustList, size_t trustListSize,
  704. const UA_ByteString *revocationList, size_t revocationListSize) {
  705. UA_StatusCode retval = UA_ClientConfig_setDefault(config);
  706. if(retval != UA_STATUSCODE_GOOD)
  707. return retval;
  708. retval = UA_CertificateVerification_Trustlist(&config->certificateVerification,
  709. trustList, trustListSize,
  710. revocationList, revocationListSize);
  711. if(retval != UA_STATUSCODE_GOOD)
  712. return retval;
  713. /* Populate SecurityPolicies */
  714. UA_SecurityPolicy *sp = (UA_SecurityPolicy*)
  715. realloc(config->securityPolicies, sizeof(UA_SecurityPolicy) * 4);
  716. if(!sp)
  717. return UA_STATUSCODE_BADOUTOFMEMORY;
  718. config->securityPolicies = sp;
  719. retval = UA_SecurityPolicy_Basic128Rsa15(&config->securityPolicies[1],
  720. &config->certificateVerification,
  721. localCertificate, privateKey, &config->logger);
  722. if(retval != UA_STATUSCODE_GOOD)
  723. return retval;
  724. ++config->securityPoliciesSize;
  725. retval = UA_SecurityPolicy_Basic256(&config->securityPolicies[2],
  726. &config->certificateVerification,
  727. localCertificate, privateKey, &config->logger);
  728. if(retval != UA_STATUSCODE_GOOD)
  729. return retval;
  730. ++config->securityPoliciesSize;
  731. retval = UA_SecurityPolicy_Basic256Sha256(&config->securityPolicies[3],
  732. &config->certificateVerification,
  733. localCertificate, privateKey, &config->logger);
  734. if(retval != UA_STATUSCODE_GOOD)
  735. return retval;
  736. ++config->securityPoliciesSize;
  737. return UA_STATUSCODE_GOOD;
  738. }
  739. #endif