Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
* fix(pubsub): include GroupVersion data type in pubsub informaiton model (open62541#6789) The data type of the mandatory entry GroupVersion in the PubSub info model was uninitialized because of a missing read callback. * fix(pubsub): Only check message timeout if message is valid (open62541#6786) This issue has already been resolved on the master branch with commit c4686f6. * refactor(core): Encode string as empty (instead of NULL) when the data-pointer is > NULL Before we required the data pointer to be exactly the UA_EMPTY_ARRAY_SENTINEL. But there can be situations where the data pointers goes to "" (empty string with the \0 ending). Then the string should be empty -- and not null (length -1). * fix(plugins): Reenable writing rejected certificates to a reject folder * refactor(server): Search for the last '#' in securityPolicyUriPostfix There might be strange cases where the URI has several #. And searching from the back is faster. * refactor(server): Expose securityPolicyUriPostfix in the internal API * refactor(server): Check the postfix of the UserTokenPolicy PolicyId also * fix(server): Consider allowNonePolicyPassword in GetEndpoints Remove all UserTokenPolicies that would allow an unencrypted password transmitted. * fix(build): Enable building static library on Win32 * fix(pubsub): fix setting writer group messsage & transport settings (open62541#6814) * fix(build): unit test compilation under MSVC * refactor(server): Don't extend the DiscoveryUrls in the configuration with EndpointUrls from requests * refactor(build): Bump version to v1.4.7 * fix(pubsub): Fix MQTT subscribe ReaderGroup config copying (open62541#6808) (open62541#6850) * refactor(tools): Add visual studio temp files to .gitignore (open62541#6872) also added Visual Studio CMakeSettings.json * refactor(core): Make SecureChannel message processing less indirect * fix(core): Stop processing after a synchronous response Before it was possible that two responses were received at the same time. If the client is waiting for the first response, then the second was processed also before returning the control flow to the client. This lead to situations where a PublishResponse was processed before notifying the client about a MonitoredItem handle established just before. This fixes open62541#5226. * fix(server): Immediately set new SecureChannels to CONNECTED Now they are correctly purged when too many connections are open. This fixes the problem reported in open62541#6863. * feat(plugins): Support certificate generation with mbedTLS. (open62541#6145) (cherry picked from commit 1f19a8e) * fix(plugin): cert_gen mbedTLS fix header file include and add to build Co-authored-by: Christian von Arnim <[email protected]> Signed-off-by: Goetz Goerisch <[email protected]> * fix(build): align inclusion of architecture.h Co-authored-by: Noel Graf <[email protected]> Signed-off-by: Goetz Goerisch <[email protected]> * fix(build): Remove CMake warnings concerning PRE_BUILD custom command options * refactor(build): Use the native Python3 support for CMake * fix(build): Fix caching of UA_FILE_NS0 variable The caching lead reconfigurations in the CMake GUI to be ignored. * refactor(plugins): Refactor out mbedtlsSameBuf to compare mbedTLS buffers * refactor(plugins): Small cleanups in ua_pki_mbedtls.c * fix(plugins): Also consider the trustlist to find issuers in ua_pki_mbedtls.c * fix(plugins): Return detailed status codes for revocation checks in ua_pki_mbedtls.c * fix(plugins): Also consider the trustlist to find issuers in ua_pki_openssl.c * fix(plugins): Return detailed status codes for revocation checks in ua_pki_openssl.c * feat(plugins): Disable revocation lists checks in ua_pki_mbedtls.c if zero crl are loaded Avoid breakage for users of the 1.3 release family but still log a warning. * feat(plugins): Disable revocation lists checks in ua_pki_openssl.c if zero crl are loaded Avoid breakage for users of the 1.3 release family but still log a warning. * refactor(build): Bump version to v1.3.15 * Fix amalgamation order ua_securitypolicy_none.c requires UA_*_LoadCertificate() if encryption is enabled. * refactor(build): Bump version to v1.4.8 * fix(core): Mask additional certificate verification statuscodes in the ERR response * refactor(plugins): Remove comparison of authorityKeyIdentifier / subjectKeyIdentifier not supported by CTT The CTT example Security User X509/001.js expects that an issuer is selected where the authorityKeyIdentifier / subjectKeyIdentifier do not match. No longer use X509_check_issued, but rather manually check if the issuer name and subject name match -- with no other checks beyond that. * fix(core): avoid double decrement in UA_KeyValueMap_remove() * test(core): add test for removing keys from UA_KeyValueMap * test(core): add tests for most UA_KeyValueMap operations * fix(plugin): fix clearing previous plugin in UA_AccessControl_default() * fix(plugins): Fix generation of wrong private key format for MbedTLS - Re-order case statements to match order in other code - Use derived compile-time constant to avoid duplication * refactor(client): Simplify getEndpointUrl * fix(client): The server can send no ServerCertificate in the asym header for #None Even if a ServerCertificate is defined for the Endpoint. Some servers in the wild show this behavior. This was reported by @mario-reif in open62541#6926. * fix[pubsub]: Properly remove key rollover callback * fix(plugin): add SecurityPolicy#Aes256_Sha256_RsaPss to json configuration plugin Add the Aes256_Sha256_RsaPss security policy to the json configuration plugin. The server_config.json5 example configuration file is updated as well. * fix(pubsub): Don’t add the key rollover callback twice (open62541#6933) * fix(tools): Fix compilation for Microsoft C compiler * fix(pubsub): missing parameter in UA_LOCK_ASSERT() macro * fis(pubsub): fix some copy past error after apparently changing an API to work on the server rather than the PubSubManager reference * improve(eventloop): make conditional macros more clear for the Ehernet ConnectionManager which is only implemented on Linux * fix(pubsub): Always update the timed callback in UA_PubSubKeyStorage_addKeyRolloverCallback * refactor(examples,tests): avoid spaces for mDNS records Avoid spaces in mdnsServerName as this is used for mDNS records. This is a backport of 711b032 into the 1.4 branch. Signed-off-by: Florian La Roche <[email protected]> * feat(ci): build and upload amalgamation sources for releases * feat(ci): always run release workflow --------- Signed-off-by: Goetz Goerisch <[email protected]> Signed-off-by: Florian La Roche <[email protected]> Co-authored-by: Andreas Eckerstorfer <[email protected]> Co-authored-by: estr Eckerstorfer Andreas <[email protected]> Co-authored-by: Julius Pfrommer <[email protected]> Co-authored-by: Eugene Melekhov <[email protected]> Co-authored-by: Leonardo <[email protected]> Co-authored-by: Julius Pfrommer <[email protected]> Co-authored-by: Leonardo <[email protected]> Co-authored-by: Noel Graf <[email protected]> Co-authored-by: Goetz Goerisch <[email protected]> Co-authored-by: Christian von Arnim <[email protected]> Co-authored-by: Jannis Völker <[email protected]> Co-authored-by: Sebastian Goll <[email protected]> Co-authored-by: Sebastian Goll <[email protected]> Co-authored-by: Maciej Stolarczyk <[email protected]> Co-authored-by: Costin Zanfir <[email protected]> Co-authored-by: Maciej Stolarczyk <[email protected]> Co-authored-by: Rolf Kalbermatter <[email protected]> Co-authored-by: Florian La Roche <[email protected]> Co-authored-by: Marwin Glaser <[email protected]>
- Loading branch information