1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
|
/**
* @file server_lds.c
* @brief Local Discovery Server implementation.
*
* This program runs an OPC UA Local Discovery Server (LDS) configured with
* encryption and a configurable cleanup timeout. Other OPC UA servers register
* with this LDS using the RegisterServer2 service. Clients can query this LDS
* using the FindServers service to discover registered servers.
*/
#include "common.h"
#include <open62541/plugin/accesscontrol_default.h>
#include <open62541/plugin/log_stdout.h>
#include <open62541/server.h>
#include <open62541/server_config_default.h>
#include <signal.h>
#include <stdlib.h>
UA_Boolean running = true;
static void
stopHandler (int sig)
{
UA_LOG_INFO (UA_Log_Stdout, UA_LOGCATEGORY_SERVER, "received ctrl-c");
running = false;
}
int
main (int argc, char *argv[])
{
signal (SIGINT, stopHandler);
signal (SIGTERM, stopHandler);
if (argc < 6)
{
UA_LOG_FATAL (UA_Log_Stdout, UA_LOGCATEGORY_USERLAND,
"Usage: %s\n"
" <port> <applicationUri>\n"
" <server-certificate.der> <private-key.der>\n"
" <cleanup-timeout-seconds>\n"
" [<trustlist1.der>, ...]",
argv[0]);
return EXIT_FAILURE;
}
UA_UInt16 port = (UA_UInt16)atoi (argv[1]);
int cleanupTimeout = atoi (argv[5]);
/* The OPC UA specification requires the cleanup timeout to exceed the
register-server interval. open62541 enforces a floor of 10 seconds. */
if (cleanupTimeout <= 10)
{
UA_LOG_FATAL (UA_Log_Stdout, UA_LOGCATEGORY_USERLAND,
"Cleanup timeout must be > 10 seconds (got %d)",
cleanupTimeout);
return EXIT_FAILURE;
}
size_t trustSize = (argc > 6) ? (size_t)argc - 6 : 0;
UA_StatusCode retval;
UA_Server *server = createSecureServer (port, argv[2], argv[3], argv[4],
argv + 6, trustSize, &retval);
if (!server)
return EXIT_FAILURE;
UA_ServerConfig *serverConfig = UA_Server_getConfig (server);
/* Disallow anonymous sessions.
UA_ServerConfig_setDefaultWithSecurityPolicies (called by
createSecureServer) resets access control, so this must come after server
creation. The static credential list is deep-copied. */
UA_UsernamePasswordLogin logins[]
= { { UA_STRING_STATIC ("user"), UA_STRING_STATIC ("password") } };
retval = UA_AccessControl_default (serverConfig, false, NULL, 1, logins);
if (retval != UA_STATUSCODE_GOOD)
{
UA_Server_delete (server);
return EXIT_FAILURE;
}
/* Mark this server as a Discovery Server so clients can identify it. */
serverConfig->applicationDescription.applicationType
= UA_APPLICATIONTYPE_DISCOVERYSERVER;
/* Time (seconds) after which stale registrations are removed. Must
exceed the registering server's re-register interval. */
serverConfig->discoveryCleanupTimeout = cleanupTimeout;
retval = UA_Server_run (server, &running);
UA_Server_delete (server);
return retval == UA_STATUSCODE_GOOD ? EXIT_SUCCESS : EXIT_FAILURE;
}
|