server_multicast.c 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385
  1. /* This work is licensed under a Creative Commons CCZero 1.0 Universal License.
  2. * See http://creativecommons.org/publicdomain/zero/1.0/ for more information. */
  3. /*
  4. * A simple server instance which registers with the discovery server.
  5. * Compared to server_register.c this example waits until the LDS server announces
  6. * itself through mDNS. Therefore the LDS server needs to support multicast extension
  7. * (i.e., LDS-ME).
  8. */
  9. #include <ua_server.h>
  10. #include <ua_config_default.h>
  11. #include <ua_types.h>
  12. #include <ua_log_stdout.h>
  13. #include <ua_securitypolicies.h>
  14. #include <signal.h>
  15. const UA_ByteString UA_SECURITY_POLICY_BASIC128_URI =
  16. {56, (UA_Byte *)"http://opcfoundation.org/UA/SecurityPolicy#Basic128Rsa15"};
  17. UA_Boolean running = true;
  18. static void stopHandler(int sign) {
  19. UA_LOG_INFO(UA_Log_Stdout, UA_LOGCATEGORY_SERVER, "received ctrl-c");
  20. running = false;
  21. }
  22. static UA_StatusCode
  23. readInteger(UA_Server *server, const UA_NodeId *sessionId,
  24. void *sessionContext, const UA_NodeId *nodeId,
  25. void *nodeContext, UA_Boolean includeSourceTimeStamp,
  26. const UA_NumericRange *range, UA_DataValue *value) {
  27. UA_Int32 *myInteger = (UA_Int32*)nodeContext;
  28. value->hasValue = true;
  29. UA_Variant_setScalarCopy(&value->value, myInteger, &UA_TYPES[UA_TYPES_INT32]);
  30. // we know the nodeid is a string
  31. UA_LOG_INFO(UA_Log_Stdout, UA_LOGCATEGORY_USERLAND, "Node read %.*s",
  32. (int)nodeId->identifier.string.length,
  33. nodeId->identifier.string.data);
  34. UA_LOG_INFO(UA_Log_Stdout, UA_LOGCATEGORY_USERLAND,
  35. "read value %i", *(UA_UInt32 *)myInteger);
  36. return UA_STATUSCODE_GOOD;
  37. }
  38. static UA_StatusCode
  39. writeInteger(UA_Server *server, const UA_NodeId *sessionId,
  40. void *sessionContext, const UA_NodeId *nodeId,
  41. void *nodeContext, const UA_NumericRange *range,
  42. const UA_DataValue *value) {
  43. UA_Int32 *myInteger = (UA_Int32*)nodeContext;
  44. if(value->hasValue && UA_Variant_isScalar(&value->value) &&
  45. value->value.type == &UA_TYPES[UA_TYPES_INT32] && value->value.data)
  46. *myInteger = *(UA_Int32 *)value->value.data;
  47. // we know the nodeid is a string
  48. UA_LOG_INFO(UA_Log_Stdout, UA_LOGCATEGORY_USERLAND, "Node written %.*s",
  49. (int)nodeId->identifier.string.length,
  50. nodeId->identifier.string.data);
  51. UA_LOG_INFO(UA_Log_Stdout, UA_LOGCATEGORY_USERLAND,
  52. "written value %i", *(UA_UInt32 *)myInteger);
  53. return UA_STATUSCODE_GOOD;
  54. }
  55. char *discovery_url = NULL;
  56. static void
  57. serverOnNetworkCallback(const UA_ServerOnNetwork *serverOnNetwork, UA_Boolean isServerAnnounce,
  58. UA_Boolean isTxtReceived, void *data) {
  59. if(discovery_url != NULL || !isServerAnnounce) {
  60. UA_LOG_DEBUG(UA_Log_Stdout, UA_LOGCATEGORY_SERVER,
  61. "serverOnNetworkCallback called, but discovery URL "
  62. "already initialized or is not announcing. Ignoring.");
  63. return; // we already have everything we need or we only want server announces
  64. }
  65. if(!isTxtReceived)
  66. return; // we wait until the corresponding TXT record is announced.
  67. // Problem: how to handle if a Server does not announce the
  68. // optional TXT?
  69. // here you can filter for a specific LDS server, e.g. call FindServers on
  70. // the serverOnNetwork to make sure you are registering with the correct
  71. // LDS. We will ignore this for now
  72. UA_LOG_INFO(UA_Log_Stdout, UA_LOGCATEGORY_SERVER, "Another server announced itself on %.*s",
  73. (int)serverOnNetwork->discoveryUrl.length, serverOnNetwork->discoveryUrl.data);
  74. if(discovery_url != NULL)
  75. UA_free(discovery_url);
  76. discovery_url = (char*)UA_malloc(serverOnNetwork->discoveryUrl.length + 1);
  77. memcpy(discovery_url, serverOnNetwork->discoveryUrl.data, serverOnNetwork->discoveryUrl.length);
  78. discovery_url[serverOnNetwork->discoveryUrl.length] = 0;
  79. }
  80. /*
  81. * Get the endpoint from the server, where we can call RegisterServer2 (or RegisterServer).
  82. * This is normally the endpoint with highest supported encryption mode.
  83. *
  84. * @param discoveryServerUrl The discovery url from the remote server
  85. * @return The endpoint description (which needs to be freed) or NULL
  86. */
  87. static
  88. UA_EndpointDescription *getRegisterEndpointFromServer(const char *discoveryServerUrl) {
  89. UA_Client *client = UA_Client_new();
  90. UA_ClientConfig_setDefault(UA_Client_getConfig(client));
  91. UA_EndpointDescription *endpointArray = NULL;
  92. size_t endpointArraySize = 0;
  93. UA_StatusCode retval = UA_Client_getEndpoints(client, discoveryServerUrl,
  94. &endpointArraySize, &endpointArray);
  95. if(retval != UA_STATUSCODE_GOOD) {
  96. UA_Array_delete(endpointArray, endpointArraySize,
  97. &UA_TYPES[UA_TYPES_ENDPOINTDESCRIPTION]);
  98. UA_LOG_ERROR(UA_Log_Stdout, UA_LOGCATEGORY_SERVER,
  99. "GetEndpoints failed with %s", UA_StatusCode_name(retval));
  100. UA_Client_delete(client);
  101. return NULL;
  102. }
  103. UA_LOG_DEBUG(UA_Log_Stdout, UA_LOGCATEGORY_SERVER, "Server has %lu endpoints", (unsigned long)endpointArraySize);
  104. UA_EndpointDescription *foundEndpoint = NULL;
  105. for(size_t i = 0; i < endpointArraySize; i++) {
  106. UA_LOG_DEBUG(UA_Log_Stdout, UA_LOGCATEGORY_SERVER, "\tURL = %.*s, SecurityMode = %s",
  107. (int) endpointArray[i].endpointUrl.length,
  108. endpointArray[i].endpointUrl.data,
  109. endpointArray[i].securityMode == UA_MESSAGESECURITYMODE_NONE ? "None" :
  110. endpointArray[i].securityMode == UA_MESSAGESECURITYMODE_SIGN ? "Sign" :
  111. endpointArray[i].securityMode == UA_MESSAGESECURITYMODE_SIGNANDENCRYPT ? "SignAndEncrypt" :
  112. "Invalid"
  113. );
  114. // find the endpoint with highest supported security mode
  115. if((UA_String_equal(&endpointArray[i].securityPolicyUri, &UA_SECURITY_POLICY_NONE_URI) ||
  116. UA_String_equal(&endpointArray[i].securityPolicyUri, &UA_SECURITY_POLICY_BASIC128_URI)) && (
  117. foundEndpoint == NULL || foundEndpoint->securityMode < endpointArray[i].securityMode))
  118. foundEndpoint = &endpointArray[i];
  119. }
  120. UA_EndpointDescription *returnEndpoint = NULL;
  121. if(foundEndpoint != NULL) {
  122. returnEndpoint = UA_EndpointDescription_new();
  123. UA_EndpointDescription_copy(foundEndpoint, returnEndpoint);
  124. }
  125. UA_Array_delete(endpointArray, endpointArraySize,
  126. &UA_TYPES[UA_TYPES_ENDPOINTDESCRIPTION]);
  127. return returnEndpoint;
  128. }
  129. #ifdef UA_ENABLE_ENCRYPTION
  130. /* loadFile parses the certificate file.
  131. *
  132. * @param path specifies the file name given in argv[]
  133. * @return Returns the file content after parsing */
  134. static UA_ByteString loadFile(const char *const path) {
  135. UA_ByteString fileContents = UA_BYTESTRING_NULL;
  136. if(path == NULL)
  137. return fileContents;
  138. /* Open the file */
  139. FILE *fp = fopen(path, "rb");
  140. if(!fp) {
  141. errno = 0; /* We read errno also from the tcp layer */
  142. return fileContents;
  143. }
  144. /* Get the file length, allocate the data and read */
  145. fseek(fp, 0, SEEK_END);
  146. fileContents.length = (size_t) ftell(fp);
  147. fileContents.data = (UA_Byte *) UA_malloc(fileContents.length * sizeof(UA_Byte));
  148. if(fileContents.data) {
  149. fseek(fp, 0, SEEK_SET);
  150. size_t read = fread(fileContents.data, sizeof(UA_Byte), fileContents.length, fp);
  151. if(read != fileContents.length)
  152. UA_ByteString_clear(&fileContents);
  153. } else {
  154. fileContents.length = 0;
  155. }
  156. fclose(fp);
  157. return fileContents;
  158. }
  159. #endif
  160. /**
  161. * Initialize a client instance which is used for calling the registerServer service.
  162. * If the given endpoint has securityMode NONE, a client with default configuration
  163. * is returned.
  164. * If it is using SignAndEncrypt, the client certificates must be provided as a
  165. * command line argument and then the client is initialized using these certificates.
  166. * @param endpointRegister The remote endpoint where this server should register
  167. * @param argc from the main method
  168. * @param argv from the main method
  169. * @return NULL or the initialized non-connected client
  170. */
  171. static
  172. UA_Client *getRegisterClient(UA_EndpointDescription *endpointRegister, int argc, char **argv) {
  173. if(endpointRegister->securityMode == UA_MESSAGESECURITYMODE_NONE) {
  174. UA_LOG_INFO(UA_Log_Stdout, UA_LOGCATEGORY_SERVER, "Using LDS endpoint with security None");
  175. UA_Client *client = UA_Client_new();
  176. UA_ClientConfig_setDefault(UA_Client_getConfig(client));
  177. return client;
  178. }
  179. #ifdef UA_ENABLE_ENCRYPTION
  180. if(endpointRegister->securityMode == UA_MESSAGESECURITYMODE_SIGN) {
  181. UA_LOG_INFO(UA_Log_Stdout, UA_LOGCATEGORY_SERVER,
  182. "LDS endpoint which only supports Sign is currently not supported");
  183. return NULL;
  184. }
  185. UA_LOG_INFO(UA_Log_Stdout, UA_LOGCATEGORY_SERVER,
  186. "Using LDS endpoint with security SignAndEncrypt");
  187. UA_ByteString certificate = UA_BYTESTRING_NULL;
  188. UA_ByteString privateKey = UA_BYTESTRING_NULL;
  189. UA_ByteString *trustList = NULL;
  190. size_t trustListSize = 0;
  191. UA_ByteString *revocationList = NULL;
  192. size_t revocationListSize = 0;
  193. if(argc < 3) {
  194. UA_LOG_FATAL(UA_Log_Stdout, UA_LOGCATEGORY_USERLAND,
  195. "The Certificate and key is missing."
  196. "The required arguments are "
  197. "<client-certificate.der> <client-private-key.der> "
  198. "[<trustlist1.crl>, ...]");
  199. return NULL;
  200. }
  201. certificate = loadFile(argv[1]);
  202. privateKey = loadFile(argv[2]);
  203. /* Load the trustList. Load revocationList is not supported now */
  204. if(argc > 3) {
  205. trustListSize = (size_t) argc - 3;
  206. UA_StatusCode retval = UA_ByteString_allocBuffer(trustList, trustListSize);
  207. if(retval != UA_STATUSCODE_GOOD) {
  208. UA_ByteString_clear(&certificate);
  209. UA_ByteString_clear(&privateKey);
  210. return NULL;
  211. }
  212. for(size_t trustListCount = 0; trustListCount < trustListSize; trustListCount++) {
  213. trustList[trustListCount] = loadFile(argv[trustListCount + 3]);
  214. }
  215. }
  216. /* Secure client initialization */
  217. UA_Client *clientRegister = UA_Client_new();
  218. UA_ClientConfig *cc = UA_Client_getConfig(clientRegister);
  219. UA_ClientConfig_setDefaultEncryption(cc, certificate, privateKey,
  220. trustList, trustListSize,
  221. revocationList, revocationListSize);
  222. cc->securityMode = UA_MESSAGESECURITYMODE_SIGNANDENCRYPT;
  223. UA_ByteString_clear(&certificate);
  224. UA_ByteString_clear(&privateKey);
  225. for(size_t deleteCount = 0; deleteCount < trustListSize; deleteCount++)
  226. UA_ByteString_clear(&trustList[deleteCount]);
  227. return clientRegister;
  228. #else
  229. return NULL;
  230. #endif
  231. }
  232. int main(int argc, char **argv) {
  233. signal(SIGINT, stopHandler); /* catches ctrl-c */
  234. signal(SIGTERM, stopHandler);
  235. UA_ServerConfig *config = UA_ServerConfig_new_minimal(16600, NULL);
  236. // To enable mDNS discovery, set application type to discovery server.
  237. config->applicationDescription.applicationType = UA_APPLICATIONTYPE_DISCOVERYSERVER;
  238. UA_String_clear(&config->applicationDescription.applicationUri);
  239. config->applicationDescription.applicationUri =
  240. UA_String_fromChars("urn:open62541.example.server_multicast");
  241. config->mdnsServerName = UA_String_fromChars("Sample Multicast Server");
  242. // See http://www.opcfoundation.org/UA/schemas/1.03/ServerCapabilities.csv
  243. //config.serverCapabilitiesSize = 1;
  244. //UA_String caps = UA_String_fromChars("LDS");
  245. //config.serverCapabilities = &caps;
  246. UA_Server *server = UA_Server_new(config);
  247. /* add a variable node to the address space */
  248. UA_Int32 myInteger = 42;
  249. UA_NodeId myIntegerNodeId = UA_NODEID_STRING(1, "the.answer");
  250. UA_QualifiedName myIntegerName = UA_QUALIFIEDNAME(1, "the answer");
  251. UA_DataSource dateDataSource;
  252. dateDataSource.read = readInteger;
  253. dateDataSource.write = writeInteger;
  254. UA_VariableAttributes attr = UA_VariableAttributes_default;
  255. attr.description = UA_LOCALIZEDTEXT("en-US", "the answer");
  256. attr.displayName = UA_LOCALIZEDTEXT("en-US", "the answer");
  257. UA_Server_addDataSourceVariableNode(server, myIntegerNodeId,
  258. UA_NODEID_NUMERIC(0, UA_NS0ID_OBJECTSFOLDER),
  259. UA_NODEID_NUMERIC(0, UA_NS0ID_ORGANIZES),
  260. myIntegerName, UA_NODEID_NULL, attr, dateDataSource,
  261. &myInteger, NULL);
  262. // callback which is called when a new server is detected through mDNS
  263. UA_Server_setServerOnNetworkCallback(server, serverOnNetworkCallback, NULL);
  264. // Start the server and call iterate to wait for the multicast discovery of the LDS
  265. UA_StatusCode retval = UA_Server_run_startup(server);
  266. if(retval != UA_STATUSCODE_GOOD) {
  267. UA_LOG_ERROR(UA_Log_Stdout, UA_LOGCATEGORY_SERVER,
  268. "Could not start the server. StatusCode %s",
  269. UA_StatusCode_name(retval));
  270. UA_Server_delete(server);
  271. UA_ServerConfig_delete(config);
  272. UA_free(discovery_url);
  273. return 1;
  274. }
  275. UA_LOG_INFO(UA_Log_Stdout, UA_LOGCATEGORY_SERVER,
  276. "Server started. Waiting for announce of LDS Server.");
  277. while (running && discovery_url == NULL)
  278. UA_Server_run_iterate(server, true);
  279. if(!running) {
  280. UA_Server_delete(server);
  281. UA_ServerConfig_delete(config);
  282. UA_free(discovery_url);
  283. return 1;
  284. }
  285. UA_LOG_INFO(UA_Log_Stdout, UA_LOGCATEGORY_SERVER, "LDS-ME server found on %s", discovery_url);
  286. /* Check if the server supports sign and encrypt. OPC Foundation LDS
  287. * requires an encrypted session for RegisterServer call, our server
  288. * currently uses encrpytion optionally */
  289. UA_EndpointDescription *endpointRegister = getRegisterEndpointFromServer(discovery_url);
  290. UA_free(discovery_url);
  291. if(endpointRegister == NULL || endpointRegister->securityMode == UA_MESSAGESECURITYMODE_INVALID) {
  292. UA_LOG_ERROR(UA_Log_Stdout, UA_LOGCATEGORY_SERVER,
  293. "Could not find any suitable endpoints on discovery server");
  294. UA_Server_delete(server);
  295. UA_ServerConfig_delete(config);
  296. return 1;
  297. }
  298. UA_Client *clientRegister = getRegisterClient(endpointRegister, argc, argv);
  299. if(!clientRegister) {
  300. UA_LOG_FATAL(UA_Log_Stdout, UA_LOGCATEGORY_USERLAND,
  301. "Could not create the client for remote registering");
  302. UA_Server_delete(server);
  303. UA_ServerConfig_delete(config);
  304. return 1;
  305. }
  306. /* Connect the client */
  307. char *endpointUrl = (char*)UA_malloc(endpointRegister->endpointUrl.length + 1);
  308. memcpy(endpointUrl, endpointRegister->endpointUrl.data, endpointRegister->endpointUrl.length);
  309. endpointUrl[endpointRegister->endpointUrl.length] = 0;
  310. retval = UA_Server_addPeriodicServerRegisterCallback(server, clientRegister, endpointUrl,
  311. 10 * 60 * 1000, 500, NULL);
  312. if(retval != UA_STATUSCODE_GOOD) {
  313. UA_LOG_ERROR(UA_Log_Stdout, UA_LOGCATEGORY_SERVER,
  314. "Could not create periodic job for server register. StatusCode %s",
  315. UA_StatusCode_name(retval));
  316. UA_free(endpointUrl);
  317. UA_Client_disconnect(clientRegister);
  318. UA_Client_delete(clientRegister);
  319. UA_Server_delete(server);
  320. UA_ServerConfig_delete(config);
  321. return 1;
  322. }
  323. while (running)
  324. UA_Server_run_iterate(server, true);
  325. UA_Server_run_shutdown(server);
  326. // UNregister the server from the discovery server.
  327. retval = UA_Server_unregister_discovery(server, clientRegister);
  328. if(retval != UA_STATUSCODE_GOOD)
  329. UA_LOG_ERROR(UA_Log_Stdout, UA_LOGCATEGORY_SERVER,
  330. "Could not unregister server from discovery server. "
  331. "StatusCode %s", UA_StatusCode_name(retval));
  332. UA_free(endpointUrl);
  333. UA_Client_disconnect(clientRegister);
  334. UA_Client_delete(clientRegister);
  335. UA_Server_delete(server);
  336. UA_ServerConfig_delete(config);
  337. return (int)retval;
  338. }