1
|
|
|
import time |
2
|
|
|
import logging |
3
|
|
|
from typing import Deque, Optional |
4
|
|
|
from collections import deque |
5
|
|
|
|
6
|
|
|
from asyncua import ua |
7
|
|
|
from ..ua.ua_binary import nodeid_from_binary, struct_from_binary, struct_to_binary, uatcp_to_binary |
8
|
|
|
from .internal_server import InternalServer, InternalSession |
9
|
|
|
from ..common.connection import SecureConnection |
10
|
|
|
from ..common.utils import ServiceError |
11
|
|
|
|
12
|
|
|
_logger = logging.getLogger(__name__) |
13
|
|
|
|
14
|
|
|
|
15
|
|
|
class PublishRequestData: |
16
|
|
|
|
17
|
|
|
def __init__(self, requesthdr=None, seqhdr=None): |
18
|
|
|
self.requesthdr = requesthdr |
19
|
|
|
self.seqhdr = seqhdr |
20
|
|
|
self.timestamp = time.time() |
21
|
|
|
|
22
|
|
|
|
23
|
|
|
class UaProcessor: |
24
|
|
|
""" |
25
|
|
|
Processor for OPC UA messages. Implements the OPC UA protocol for the server side. |
26
|
|
|
""" |
27
|
|
|
|
28
|
|
|
def __init__(self, internal_server: InternalServer, transport): |
29
|
|
|
self.iserver: InternalServer = internal_server |
30
|
|
|
self.name = transport.get_extra_info('peername') |
31
|
|
|
self.sockname = transport.get_extra_info('sockname') |
32
|
|
|
self.session: Optional[InternalSession] = None |
33
|
|
|
self._transport = transport |
34
|
|
|
# deque for Publish Requests |
35
|
|
|
self._publish_requests: Deque[PublishRequestData] = deque() |
36
|
|
|
# used when we need to wait for PublishRequest |
37
|
|
|
self._publish_results: Deque[ua.PublishResult] = deque() |
38
|
|
|
self._connection = SecureConnection(ua.SecurityPolicy()) |
39
|
|
|
|
40
|
|
|
def set_policies(self, policies): |
41
|
|
|
self._connection.set_policy_factories(policies) |
42
|
|
|
|
43
|
|
|
def send_response(self, requesthandle, seqhdr, response, msgtype=ua.MessageType.SecureMessage): |
44
|
|
|
response.ResponseHeader.RequestHandle = requesthandle |
45
|
|
|
data = self._connection.message_to_binary( |
46
|
|
|
struct_to_binary(response), message_type=msgtype, request_id=seqhdr.RequestId) |
47
|
|
|
self._transport.write(data) |
48
|
|
|
|
49
|
|
|
def open_secure_channel(self, algohdr, seqhdr, body): |
50
|
|
|
request = struct_from_binary(ua.OpenSecureChannelRequest, body) |
51
|
|
|
|
52
|
|
|
if not self._connection.is_open(): |
53
|
|
|
# Only call select_policy if the channel isn't open. Otherwise |
54
|
|
|
# it will break the Secure channel renewal. |
55
|
|
|
self._connection.select_policy( |
56
|
|
|
algohdr.SecurityPolicyURI, algohdr.SenderCertificate, request.Parameters.SecurityMode) |
57
|
|
|
|
58
|
|
|
channel = self._connection.open(request.Parameters, self.iserver) |
59
|
|
|
# send response |
60
|
|
|
response = ua.OpenSecureChannelResponse() |
61
|
|
|
response.Parameters = channel |
62
|
|
|
self.send_response(request.RequestHeader.RequestHandle, seqhdr, response, ua.MessageType.SecureOpen) |
63
|
|
|
|
64
|
|
|
async def forward_publish_response(self, result: ua.PublishResult): |
65
|
|
|
""" |
66
|
|
|
Try to send a `PublishResponse` with the given `PublishResult`. |
67
|
|
|
""" |
68
|
|
|
# _logger.info("forward publish response %s", result) |
69
|
|
|
while True: |
70
|
|
|
if not self._publish_requests: |
71
|
|
|
self._publish_results.append(result) |
72
|
|
|
_logger.info( |
73
|
|
|
"Server wants to send publish answer but no publish request is available," |
74
|
|
|
"enqueuing notification, length of result queue is %s", |
75
|
|
|
len(self._publish_results) |
76
|
|
|
) |
77
|
|
|
return |
78
|
|
|
# We pop left from the Publish Request deque (FIFO) |
79
|
|
|
requestdata = self._publish_requests.popleft() |
80
|
|
|
if (requestdata.requesthdr.TimeoutHint == 0 or |
81
|
|
|
requestdata.requesthdr.TimeoutHint != 0 and |
82
|
|
|
time.time() - requestdata.timestamp < requestdata.requesthdr.TimeoutHint / 1000): |
83
|
|
|
# Continue and use `requestdata` only if there was no timeout |
84
|
|
|
break |
85
|
|
|
response = ua.PublishResponse() |
86
|
|
|
response.Parameters = result |
87
|
|
|
self.send_response(requestdata.requesthdr.RequestHandle, requestdata.seqhdr, response) |
88
|
|
|
|
89
|
|
|
async def process(self, header, body): |
90
|
|
|
try: |
91
|
|
|
msg = self._connection.receive_from_header_and_body(header, body) |
92
|
|
|
except ua.uaerrors.BadUserAccessDenied: |
93
|
|
|
_logger.warning("Unauthenticated user attempted to connect") |
94
|
|
|
return False |
95
|
|
|
if isinstance(msg, ua.Message): |
96
|
|
|
if header.MessageType == ua.MessageType.SecureOpen: |
97
|
|
|
self.open_secure_channel(msg.SecurityHeader(), msg.SequenceHeader(), msg.body()) |
98
|
|
|
elif header.MessageType == ua.MessageType.SecureClose: |
99
|
|
|
self._connection.close() |
100
|
|
|
return False |
101
|
|
|
elif header.MessageType == ua.MessageType.SecureMessage: |
102
|
|
|
return await self.process_message(msg.SequenceHeader(), msg.body()) |
103
|
|
|
elif isinstance(msg, ua.Hello): |
104
|
|
|
ack = ua.Acknowledge() |
105
|
|
|
ack.ReceiveBufferSize = msg.ReceiveBufferSize |
106
|
|
|
ack.SendBufferSize = msg.SendBufferSize |
107
|
|
|
data = uatcp_to_binary(ua.MessageType.Acknowledge, ack) |
108
|
|
|
self._transport.write(data) |
109
|
|
|
elif isinstance(msg, ua.ErrorMessage): |
110
|
|
|
_logger.warning("Received an error message type") |
111
|
|
|
elif msg is None: |
112
|
|
|
pass # msg is a ChunkType.Intermediate of an ua.MessageType.SecureMessage |
113
|
|
|
else: |
114
|
|
|
_logger.warning("Unsupported message type: %s", header.MessageType) |
115
|
|
|
raise ServiceError(ua.StatusCodes.BadTcpMessageTypeInvalid) |
116
|
|
|
return True |
117
|
|
|
|
118
|
|
|
async def process_message(self, seqhdr, body): |
119
|
|
|
""" |
120
|
|
|
Process incoming messages. |
121
|
|
|
""" |
122
|
|
|
typeid = nodeid_from_binary(body) |
123
|
|
|
requesthdr = struct_from_binary(ua.RequestHeader, body) |
124
|
|
|
_logger.debug('process_message %r %r', typeid, requesthdr) |
125
|
|
|
try: |
126
|
|
|
return await self._process_message(typeid, requesthdr, seqhdr, body) |
127
|
|
|
except ServiceError as e: |
128
|
|
|
status = ua.StatusCode(e.code) |
129
|
|
|
response = ua.ServiceFault() |
130
|
|
|
response.ResponseHeader.ServiceResult = status |
131
|
|
|
_logger.error("sending service fault response: %s (%s)", status.doc, status.name) |
132
|
|
|
self.send_response(requesthdr.RequestHandle, seqhdr, response) |
133
|
|
|
return True |
134
|
|
|
except ua.uaerrors.BadUserAccessDenied: |
135
|
|
|
if self.session: |
136
|
|
|
user = self.session.user |
137
|
|
|
else: |
138
|
|
|
user = 'Someone' |
139
|
|
|
_logger.warning("%s attempted to do something they are not permitted to do", user) |
140
|
|
|
response = ua.ServiceFault() |
141
|
|
|
response.ResponseHeader.ServiceResult = ua.StatusCode(ua.StatusCodes.BadUserAccessDenied) |
142
|
|
|
self.send_response(requesthdr.RequestHandle, seqhdr, response) |
143
|
|
|
except Exception: |
144
|
|
|
_logger.exception('Error while processing message') |
145
|
|
|
response = ua.ServiceFault() |
146
|
|
|
response.ResponseHeader.ServiceResult = ua.StatusCode(ua.StatusCodes.BadInternalError) |
147
|
|
|
self.send_response(requesthdr.RequestHandle, seqhdr, response) |
148
|
|
|
return True |
149
|
|
|
|
150
|
|
|
async def _process_message(self, typeid, requesthdr, seqhdr, body): |
151
|
|
|
if typeid in [ua.NodeId(ua.ObjectIds.CreateSessionRequest_Encoding_DefaultBinary), |
152
|
|
|
ua.NodeId(ua.ObjectIds.ActivateSessionRequest_Encoding_DefaultBinary), |
153
|
|
|
ua.NodeId(ua.ObjectIds.FindServersRequest_Encoding_DefaultBinary), |
154
|
|
|
ua.NodeId(ua.ObjectIds.GetEndpointsRequest_Encoding_DefaultBinary)]: |
155
|
|
|
# The connection is first created without a user being attached, and then during activation the |
156
|
|
|
user = None |
157
|
|
|
elif self.session is None: |
158
|
|
|
_logger.warning("Received a request of type %d without an existing session", typeid.Identifier) |
159
|
|
|
raise ua.uaerrors.BadUserAccessDenied |
160
|
|
|
else: |
161
|
|
|
user = self.session.user |
162
|
|
|
if self._connection.security_policy.permissions is not None: |
163
|
|
|
if self._connection.security_policy.permissions.check_validity(user, typeid, body) is False: |
164
|
|
|
raise ua.uaerrors.BadUserAccessDenied |
165
|
|
|
|
166
|
|
|
if typeid == ua.NodeId(ua.ObjectIds.CreateSessionRequest_Encoding_DefaultBinary): |
167
|
|
|
_logger.info("Create session request (%s)", user) |
168
|
|
|
params = struct_from_binary(ua.CreateSessionParameters, body) |
169
|
|
|
# create the session on server |
170
|
|
|
self.session = self.iserver.create_session(self.name, external=True) |
171
|
|
|
# get a session creation result to send back |
172
|
|
|
sessiondata = await self.session.create_session(params, sockname=self.sockname) |
173
|
|
|
response = ua.CreateSessionResponse() |
174
|
|
|
response.Parameters = sessiondata |
175
|
|
|
response.Parameters.ServerCertificate = self._connection.security_policy.host_certificate |
176
|
|
|
if self._connection.security_policy.peer_certificate is None: |
177
|
|
|
data = params.ClientNonce |
178
|
|
|
else: |
179
|
|
|
data = self._connection.security_policy.peer_certificate + params.ClientNonce |
180
|
|
|
response.Parameters.ServerSignature.Signature = \ |
181
|
|
|
self._connection.security_policy.asymmetric_cryptography.signature(data) |
182
|
|
|
response.Parameters.ServerSignature.Algorithm = self._connection.security_policy.AsymmetricSignatureURI |
183
|
|
|
# _logger.info("sending create session response") |
184
|
|
|
self.send_response(requesthdr.RequestHandle, seqhdr, response) |
185
|
|
|
|
186
|
|
|
elif typeid == ua.NodeId(ua.ObjectIds.CloseSessionRequest_Encoding_DefaultBinary): |
187
|
|
|
_logger.info("Close session request (%s)", user) |
188
|
|
|
if self.session: |
189
|
|
|
deletesubs = ua.ua_binary.Primitives.Boolean.unpack(body) |
190
|
|
|
await self.session.close_session(deletesubs) |
191
|
|
|
else: |
192
|
|
|
_logger.info("Request to close non-existing session (%s)", user) |
193
|
|
|
|
194
|
|
|
response = ua.CloseSessionResponse() |
195
|
|
|
_logger.info("sending close session response (%s)", user) |
196
|
|
|
self.send_response(requesthdr.RequestHandle, seqhdr, response) |
197
|
|
|
|
198
|
|
|
elif typeid == ua.NodeId(ua.ObjectIds.ActivateSessionRequest_Encoding_DefaultBinary): |
199
|
|
|
_logger.info("Activate session request (%s)", user) |
200
|
|
|
params = struct_from_binary(ua.ActivateSessionParameters, body) |
201
|
|
|
if not self.session: |
202
|
|
|
_logger.info("request to activate non-existing session (%s)", user) |
203
|
|
|
raise ServiceError(ua.StatusCodes.BadSessionIdInvalid) |
204
|
|
|
if self._connection.security_policy.host_certificate is None: |
205
|
|
|
data = self.session.nonce |
206
|
|
|
else: |
207
|
|
|
data = self._connection.security_policy.host_certificate + self.session.nonce |
208
|
|
|
self._connection.security_policy.asymmetric_cryptography.verify(data, params.ClientSignature.Signature) |
209
|
|
|
result = self.session.activate_session(params, self._connection.security_policy.peer_certificate) |
210
|
|
|
response = ua.ActivateSessionResponse() |
211
|
|
|
response.Parameters = result |
212
|
|
|
# _logger.info("sending read response") |
213
|
|
|
self.send_response(requesthdr.RequestHandle, seqhdr, response) |
214
|
|
|
|
215
|
|
|
elif typeid == ua.NodeId(ua.ObjectIds.ReadRequest_Encoding_DefaultBinary): |
216
|
|
|
_logger.info("Read request (%s)", user) |
217
|
|
|
params = struct_from_binary(ua.ReadParameters, body) |
218
|
|
|
results = await self.session.read(params) |
219
|
|
|
response = ua.ReadResponse() |
220
|
|
|
response.Results = results |
221
|
|
|
# _logger.info("sending read response") |
222
|
|
|
self.send_response(requesthdr.RequestHandle, seqhdr, response) |
223
|
|
|
|
224
|
|
|
elif typeid == ua.NodeId(ua.ObjectIds.WriteRequest_Encoding_DefaultBinary): |
225
|
|
|
_logger.info("Write request (%s)", user) |
226
|
|
|
params = struct_from_binary(ua.WriteParameters, body) |
227
|
|
|
results = await self.session.write(params) |
228
|
|
|
response = ua.WriteResponse() |
229
|
|
|
response.Results = results |
230
|
|
|
# _logger.info("sending write response") |
231
|
|
|
self.send_response(requesthdr.RequestHandle, seqhdr, response) |
232
|
|
|
|
233
|
|
|
elif typeid == ua.NodeId(ua.ObjectIds.BrowseRequest_Encoding_DefaultBinary): |
234
|
|
|
_logger.info("Browse request (%s)", user) |
235
|
|
|
params = struct_from_binary(ua.BrowseParameters, body) |
236
|
|
|
results = await self.session.browse(params) |
237
|
|
|
response = ua.BrowseResponse() |
238
|
|
|
response.Results = results |
239
|
|
|
# _logger.info("sending browse response") |
240
|
|
|
self.send_response(requesthdr.RequestHandle, seqhdr, response) |
241
|
|
|
|
242
|
|
|
elif typeid == ua.NodeId(ua.ObjectIds.GetEndpointsRequest_Encoding_DefaultBinary): |
243
|
|
|
_logger.info("get endpoints request (%s)", user) |
244
|
|
|
params = struct_from_binary(ua.GetEndpointsParameters, body) |
245
|
|
|
endpoints = await self.iserver.get_endpoints(params, sockname=self.sockname) |
246
|
|
|
response = ua.GetEndpointsResponse() |
247
|
|
|
response.Endpoints = endpoints |
248
|
|
|
# _logger.info("sending get endpoints response") |
249
|
|
|
self.send_response(requesthdr.RequestHandle, seqhdr, response) |
250
|
|
|
|
251
|
|
|
elif typeid == ua.NodeId(ua.ObjectIds.FindServersRequest_Encoding_DefaultBinary): |
252
|
|
|
_logger.info("find servers request (%s)", user) |
253
|
|
|
params = struct_from_binary(ua.FindServersParameters, body) |
254
|
|
|
servers = self.iserver.find_servers(params) |
255
|
|
|
response = ua.FindServersResponse() |
256
|
|
|
response.Servers = servers |
257
|
|
|
# _logger.info("sending find servers response") |
258
|
|
|
self.send_response(requesthdr.RequestHandle, seqhdr, response) |
259
|
|
|
|
260
|
|
|
elif typeid == ua.NodeId(ua.ObjectIds.RegisterServerRequest_Encoding_DefaultBinary): |
261
|
|
|
_logger.info("register server request %s", user) |
262
|
|
|
serv = struct_from_binary(ua.RegisteredServer, body) |
263
|
|
|
self.iserver.register_server(serv) |
264
|
|
|
response = ua.RegisterServerResponse() |
265
|
|
|
# _logger.info("sending register server response") |
266
|
|
|
self.send_response(requesthdr.RequestHandle, seqhdr, response) |
267
|
|
|
|
268
|
|
|
elif typeid == ua.NodeId(ua.ObjectIds.RegisterServer2Request_Encoding_DefaultBinary): |
269
|
|
|
_logger.info("register server 2 request %s", user) |
270
|
|
|
params = struct_from_binary(ua.RegisterServer2Parameters, body) |
271
|
|
|
results = self.iserver.register_server2(params) |
272
|
|
|
response = ua.RegisterServer2Response() |
273
|
|
|
response.ConfigurationResults = results |
274
|
|
|
# _logger.info("sending register server 2 response") |
275
|
|
|
self.send_response(requesthdr.RequestHandle, seqhdr, response) |
276
|
|
|
|
277
|
|
|
elif typeid == ua.NodeId(ua.ObjectIds.TranslateBrowsePathsToNodeIdsRequest_Encoding_DefaultBinary): |
278
|
|
|
_logger.info("translate browsepaths to nodeids request (%s)", user) |
279
|
|
|
params = struct_from_binary(ua.TranslateBrowsePathsToNodeIdsParameters, body) |
280
|
|
|
paths = await self.session.translate_browsepaths_to_nodeids(params.BrowsePaths) |
281
|
|
|
response = ua.TranslateBrowsePathsToNodeIdsResponse() |
282
|
|
|
response.Results = paths |
283
|
|
|
# _logger.info("sending translate browsepaths to nodeids response") |
284
|
|
|
self.send_response(requesthdr.RequestHandle, seqhdr, response) |
285
|
|
|
|
286
|
|
|
elif typeid == ua.NodeId(ua.ObjectIds.AddNodesRequest_Encoding_DefaultBinary): |
287
|
|
|
_logger.info("add nodes request (%s)", user) |
288
|
|
|
params = struct_from_binary(ua.AddNodesParameters, body) |
289
|
|
|
results = await self.session.add_nodes(params.NodesToAdd) |
290
|
|
|
response = ua.AddNodesResponse() |
291
|
|
|
response.Results = results |
292
|
|
|
# _logger.info("sending add node response") |
293
|
|
|
self.send_response(requesthdr.RequestHandle, seqhdr, response) |
294
|
|
|
|
295
|
|
|
elif typeid == ua.NodeId(ua.ObjectIds.DeleteNodesRequest_Encoding_DefaultBinary): |
296
|
|
|
_logger.info("delete nodes request (%s)", user) |
297
|
|
|
params = struct_from_binary(ua.DeleteNodesParameters, body) |
298
|
|
|
results = await self.session.delete_nodes(params) |
299
|
|
|
response = ua.DeleteNodesResponse() |
300
|
|
|
response.Results = results |
301
|
|
|
# _logger.info("sending delete node response") |
302
|
|
|
self.send_response(requesthdr.RequestHandle, seqhdr, response) |
303
|
|
|
|
304
|
|
|
elif typeid == ua.NodeId(ua.ObjectIds.AddReferencesRequest_Encoding_DefaultBinary): |
305
|
|
|
_logger.info("add references request (%s)", user) |
306
|
|
|
params = struct_from_binary(ua.AddReferencesParameters, body) |
307
|
|
|
results = await self.session.add_references(params.ReferencesToAdd) |
308
|
|
|
response = ua.AddReferencesResponse() |
309
|
|
|
response.Results = results |
310
|
|
|
# _logger.info("sending add references response") |
311
|
|
|
self.send_response(requesthdr.RequestHandle, seqhdr, response) |
312
|
|
|
|
313
|
|
|
elif typeid == ua.NodeId(ua.ObjectIds.DeleteReferencesRequest_Encoding_DefaultBinary): |
314
|
|
|
_logger.info("delete references request (%s)", user) |
315
|
|
|
params = struct_from_binary(ua.DeleteReferencesParameters, body) |
316
|
|
|
results = await self.session.delete_references(params.ReferencesToDelete) |
317
|
|
|
response = ua.DeleteReferencesResponse() |
318
|
|
|
response.Parameters.Results = results |
319
|
|
|
# _logger.info("sending delete references response") |
320
|
|
|
self.send_response(requesthdr.RequestHandle, seqhdr, response) |
321
|
|
|
|
322
|
|
|
elif typeid == ua.NodeId(ua.ObjectIds.CreateSubscriptionRequest_Encoding_DefaultBinary): |
323
|
|
|
_logger.info("create subscription request (%s)", user) |
324
|
|
|
params = struct_from_binary(ua.CreateSubscriptionParameters, body) |
325
|
|
|
result = await self.session.create_subscription(params, callback=self.forward_publish_response) |
326
|
|
|
response = ua.CreateSubscriptionResponse() |
327
|
|
|
response.Parameters = result |
328
|
|
|
# _logger.info("sending create subscription response") |
329
|
|
|
self.send_response(requesthdr.RequestHandle, seqhdr, response) |
330
|
|
|
|
331
|
|
|
elif typeid == ua.NodeId(ua.ObjectIds.ModifySubscriptionRequest_Encoding_DefaultBinary): |
332
|
|
|
_logger.info("modify subscription request") |
333
|
|
|
params = struct_from_binary(ua.ModifySubscriptionParameters, body) |
334
|
|
|
|
335
|
|
|
result = self.session.modify_subscription(params, self.forward_publish_response) |
336
|
|
|
|
337
|
|
|
response = ua.ModifySubscriptionResponse() |
338
|
|
|
response.Parameters = result |
339
|
|
|
|
340
|
|
|
#_logger.info("sending modify subscription response") |
341
|
|
|
self.send_response(requesthdr.RequestHandle, seqhdr, response) |
342
|
|
|
|
343
|
|
|
elif typeid == ua.NodeId(ua.ObjectIds.DeleteSubscriptionsRequest_Encoding_DefaultBinary): |
344
|
|
|
_logger.info("delete subscriptions request (%s)", user) |
345
|
|
|
params = struct_from_binary(ua.DeleteSubscriptionsParameters, body) |
346
|
|
|
results = await self.session.delete_subscriptions(params.SubscriptionIds) |
347
|
|
|
response = ua.DeleteSubscriptionsResponse() |
348
|
|
|
response.Results = results |
349
|
|
|
# _logger.info("sending delete subscription response") |
350
|
|
|
self.send_response(requesthdr.RequestHandle, seqhdr, response) |
351
|
|
|
|
352
|
|
|
elif typeid == ua.NodeId(ua.ObjectIds.CreateMonitoredItemsRequest_Encoding_DefaultBinary): |
353
|
|
|
_logger.info("create monitored items request (%s)", user) |
354
|
|
|
params = struct_from_binary(ua.CreateMonitoredItemsParameters, body) |
355
|
|
|
results = await self.session.create_monitored_items(params) |
356
|
|
|
response = ua.CreateMonitoredItemsResponse() |
357
|
|
|
response.Results = results |
358
|
|
|
# _logger.info("sending create monitored items response") |
359
|
|
|
self.send_response(requesthdr.RequestHandle, seqhdr, response) |
360
|
|
|
|
361
|
|
|
elif typeid == ua.NodeId(ua.ObjectIds.ModifyMonitoredItemsRequest_Encoding_DefaultBinary): |
362
|
|
|
_logger.info("modify monitored items request (%s)", user) |
363
|
|
|
params = struct_from_binary(ua.ModifyMonitoredItemsParameters, body) |
364
|
|
|
results = await self.session.modify_monitored_items(params) |
365
|
|
|
response = ua.ModifyMonitoredItemsResponse() |
366
|
|
|
response.Results = results |
367
|
|
|
# _logger.info("sending modify monitored items response") |
368
|
|
|
self.send_response(requesthdr.RequestHandle, seqhdr, response) |
369
|
|
|
|
370
|
|
|
elif typeid == ua.NodeId(ua.ObjectIds.DeleteMonitoredItemsRequest_Encoding_DefaultBinary): |
371
|
|
|
_logger.info("delete monitored items request (%s)", user) |
372
|
|
|
params = struct_from_binary(ua.DeleteMonitoredItemsParameters, body) |
373
|
|
|
results = await self.session.delete_monitored_items(params) |
374
|
|
|
response = ua.DeleteMonitoredItemsResponse() |
375
|
|
|
response.Results = results |
376
|
|
|
# _logger.info("sending delete monitored items response") |
377
|
|
|
self.send_response(requesthdr.RequestHandle, seqhdr, response) |
378
|
|
|
|
379
|
|
|
elif typeid == ua.NodeId(ua.ObjectIds.HistoryReadRequest_Encoding_DefaultBinary): |
380
|
|
|
_logger.info("history read request (%s)", user) |
381
|
|
|
params = struct_from_binary(ua.HistoryReadParameters, body) |
382
|
|
|
results = await self.session.history_read(params) |
383
|
|
|
response = ua.HistoryReadResponse() |
384
|
|
|
response.Results = results |
385
|
|
|
# _logger.info("sending history read response") |
386
|
|
|
self.send_response(requesthdr.RequestHandle, seqhdr, response) |
387
|
|
|
|
388
|
|
|
elif typeid == ua.NodeId(ua.ObjectIds.RegisterNodesRequest_Encoding_DefaultBinary): |
389
|
|
|
_logger.info("register nodes request (%s)", user) |
390
|
|
|
params = struct_from_binary(ua.RegisterNodesParameters, body) |
391
|
|
|
_logger.info("Node registration not implemented") |
392
|
|
|
response = ua.RegisterNodesResponse() |
393
|
|
|
response.Parameters.RegisteredNodeIds = params.NodesToRegister |
394
|
|
|
# _logger.info("sending register nodes response") |
395
|
|
|
self.send_response(requesthdr.RequestHandle, seqhdr, response) |
396
|
|
|
|
397
|
|
|
elif typeid == ua.NodeId(ua.ObjectIds.UnregisterNodesRequest_Encoding_DefaultBinary): |
398
|
|
|
_logger.info("unregister nodes request (%s)", user) |
399
|
|
|
params = struct_from_binary(ua.UnregisterNodesParameters, body) |
400
|
|
|
response = ua.UnregisterNodesResponse() |
401
|
|
|
# _logger.info("sending unregister nodes response") |
402
|
|
|
self.send_response(requesthdr.RequestHandle, seqhdr, response) |
403
|
|
|
|
404
|
|
|
elif typeid == ua.NodeId(ua.ObjectIds.PublishRequest_Encoding_DefaultBinary): |
405
|
|
|
_logger.debug("publish request (%s)", user) |
406
|
|
|
if not self.session: |
407
|
|
|
return False |
408
|
|
|
params = struct_from_binary(ua.PublishParameters, body) |
409
|
|
|
data = PublishRequestData(requesthdr=requesthdr, seqhdr=seqhdr) |
410
|
|
|
# Store the Publish Request (will be used to send publish answers from server) |
411
|
|
|
self._publish_requests.append(data) |
412
|
|
|
# If there is an enqueued result forward it immediately |
413
|
|
|
while self._publish_results: |
414
|
|
|
result = self._publish_results.popleft() |
415
|
|
|
if result.SubscriptionId not in self.session.subscription_service.active_subscription_ids: |
416
|
|
|
# Discard the result if the subscription is no longer active |
417
|
|
|
continue |
418
|
|
|
await self.forward_publish_response(result) |
419
|
|
|
break |
420
|
|
|
self.session.publish(params.SubscriptionAcknowledgements) |
421
|
|
|
# _logger.debug("publish forward to server") |
422
|
|
|
|
423
|
|
|
elif typeid == ua.NodeId(ua.ObjectIds.RepublishRequest_Encoding_DefaultBinary): |
424
|
|
|
_logger.info("re-publish request (%s)", user) |
425
|
|
|
params = struct_from_binary(ua.RepublishParameters, body) |
426
|
|
|
msg = self.session.republish(params) |
427
|
|
|
response = ua.RepublishResponse() |
428
|
|
|
response.NotificationMessage = msg |
429
|
|
|
self.send_response(requesthdr.RequestHandle, seqhdr, response) |
430
|
|
|
|
431
|
|
|
elif typeid == ua.NodeId(ua.ObjectIds.CloseSecureChannelRequest_Encoding_DefaultBinary): |
432
|
|
|
_logger.info("close secure channel request (%s)", user) |
433
|
|
|
self._connection.close() |
434
|
|
|
response = ua.CloseSecureChannelResponse() |
435
|
|
|
self.send_response(requesthdr.RequestHandle, seqhdr, response) |
436
|
|
|
return False |
437
|
|
|
|
438
|
|
|
elif typeid == ua.NodeId(ua.ObjectIds.CallRequest_Encoding_DefaultBinary): |
439
|
|
|
_logger.info("call request (%s)", user) |
440
|
|
|
params = struct_from_binary(ua.CallParameters, body) |
441
|
|
|
results = await self.session.call(params.MethodsToCall) |
442
|
|
|
response = ua.CallResponse() |
443
|
|
|
response.Results = results |
444
|
|
|
self.send_response(requesthdr.RequestHandle, seqhdr, response) |
445
|
|
|
|
446
|
|
|
elif typeid == ua.NodeId(ua.ObjectIds.SetMonitoringModeRequest_Encoding_DefaultBinary): |
447
|
|
|
_logger.info("set monitoring mode request (%s)", user) |
448
|
|
|
params = struct_from_binary(ua.SetMonitoringModeParameters, body) |
449
|
|
|
# FIXME: Implement SetMonitoringMode |
450
|
|
|
# For now send dummy results to keep clients happy |
451
|
|
|
response = ua.SetMonitoringModeResponse() |
452
|
|
|
results = ua.SetMonitoringModeResult() |
453
|
|
|
ids = params.MonitoredItemIds |
454
|
|
|
statuses = [ua.StatusCode(ua.StatusCodes.Good) for node_id in ids] |
455
|
|
|
results.Results = statuses |
456
|
|
|
response.Parameters = results |
457
|
|
|
_logger.info("sending set monitoring mode response") |
458
|
|
|
self.send_response(requesthdr.RequestHandle, seqhdr, response) |
459
|
|
|
|
460
|
|
|
elif typeid == ua.NodeId(ua.ObjectIds.SetPublishingModeRequest_Encoding_DefaultBinary): |
461
|
|
|
_logger.info("set publishing mode request (%s)", user) |
462
|
|
|
params = struct_from_binary(ua.SetPublishingModeParameters, body) |
463
|
|
|
# FIXME: Implement SetPublishingMode |
464
|
|
|
# For now send dummy results to keep clients happy |
465
|
|
|
response = ua.SetPublishingModeResponse() |
466
|
|
|
results = ua.SetPublishingModeResult() |
467
|
|
|
ids = params.SubscriptionIds |
468
|
|
|
statuses = [ua.StatusCode(ua.StatusCodes.Good) for node_id in ids] |
469
|
|
|
results.Results = statuses |
470
|
|
|
response.Parameters = results |
471
|
|
|
_logger.info("sending set publishing mode response") |
472
|
|
|
self.send_response(requesthdr.RequestHandle, seqhdr, response) |
473
|
|
|
|
474
|
|
|
else: |
475
|
|
|
_logger.warning("Unknown message received %s (%s)", typeid, user) |
476
|
|
|
raise ServiceError(ua.StatusCodes.BadServiceUnsupported) |
477
|
|
|
|
478
|
|
|
return True |
479
|
|
|
|
480
|
|
|
async def close(self): |
481
|
|
|
""" |
482
|
|
|
to be called when client has disconnected to ensure we really close |
483
|
|
|
everything we should |
484
|
|
|
""" |
485
|
|
|
_logger.info("Cleanup client connection: %s", self.name) |
486
|
|
|
if self.session: |
487
|
|
|
await self.session.close_session(True) |
488
|
|
|
|