Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

1.05.04 json encoder fixes v2 #2539

Open
wants to merge 122 commits into
base: master
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
122 commits
Select commit Hold shift + click to select a range
1b50e73
latest nodeset without reference to servicemodel
mregen Jan 21, 2021
e73f66b
Merge remote-tracking branch 'origin/master' into noservicemod
mregen Jan 21, 2021
d78bd57
fix reference server
mregen Jan 22, 2021
525b85e
no async server stubs
mregen Jan 22, 2021
868b638
Merge remote-tracking branch 'source/prototyping_noservicemodel'
randy-armstrong Feb 6, 2021
07bc4d1
Update generated files.
randy-armstrong Feb 6, 2021
066ab73
Errata 1.04.10.
randy-armstrong Feb 13, 2021
d4642f1
Fix Typos.
randy-armstrong Feb 13, 2021
90d7cec
Update PubSub to use new autogenerated APIs.
randy-armstrong Feb 13, 2021
8f7cd8a
Fix build errors in tests.
randy-armstrong Feb 13, 2021
6ebd5d2
Remove undocumented fields from the NodeSet.
randy-armstrong Feb 26, 2021
928f5bb
Sync with Errata 1.04.9.
randy-armstrong Feb 26, 2021
17eb21d
Merge branch 'master' of https://github.com/OPCF-Members/UA-.NETStand…
randy-armstrong Feb 26, 2021
4ffd217
Back out changes to APIs caused by AllowSubtypes handling.
randy-armstrong Feb 26, 2021
1d37945
Merge remote-tracking branch 'source/master'
randy-armstrong Feb 26, 2021
6f5621a
Fix build errors.
randy-armstrong Feb 26, 2021
2bcbc1c
1.04.10 errata.
randy-armstrong Mar 2, 2021
c4d301c
Merge branch '1.04.10'
randy-armstrong Mar 2, 2021
928f93b
Updates for Errata 1.04.10.
randy-armstrong Mar 2, 2021
a374e31
Regenerate autogenerated filed.
randy-armstrong Mar 2, 2021
42e655e
Deprecate DataTypeDictionary.
randy-armstrong Mar 3, 2021
26b700e
Fix error in UANodeSet.xsd.
randy-armstrong Mar 3, 2021
5296fee
Merge remote-tracking branch 'source/master'
randy-armstrong Mar 11, 2021
bb03736
Merge remote-tracking branch 'source/master'
randy-armstrong Jul 3, 2021
df37f48
Update to 1.04.10.
randy-armstrong Jul 3, 2021
955eaa9
Add additional Aliases in default NodeSet.
randy-armstrong Aug 23, 2021
7266727
Upgrade NuGet packages.
randy-armstrong Aug 23, 2021
4209867
Updates for ModelCompiler https://github.com/OPCFoundation/UA-ModelCo…
randy-armstrong Aug 24, 2021
18e56b2
Merge remote-tracking branch 'source/master'
randy-armstrong Aug 25, 2021
f9381b8
Set release flag (#1527)
mrsuciu Sep 29, 2021
ab4d2ec
Merge remote-tracking branch 'source/release/1.4.367'
randy-armstrong Sep 30, 2021
88255c5
1.04.10 Release.
randy-armstrong Sep 30, 2021
b801a59
UA-1.04.10-2021-09-15
randy-armstrong Oct 1, 2021
4c5f833
Merge remote-tracking branch 'source/master'
randy-armstrong Oct 10, 2021
c13ca81
Fix https://github.com/OPCFoundation/UA-ModelCompiler/issues/94
randy-armstrong Nov 2, 2021
83ef0f5
Add sample node managers to ref server (#1535)
mregen Oct 15, 2021
35f7aa5
Remove unnecessary Nuget dependencies in Opc.Ua.Core (#1551)
bdovaz Oct 22, 2021
92fe57f
Bump Portable.BouncyCastle from 1.8.10 to 1.9.0 (#1556)
dependabot[bot] Oct 22, 2021
b8bc942
Bump Microsoft.NET.Test.Sdk from 16.11.0 to 17.0.0 (#1560)
dependabot[bot] Oct 28, 2021
9f61e64
IOP workshop 2021 fixes and build improvements (#1562)
mregen Oct 29, 2021
93aef64
Bump System.Io.Pipelines from 4.5.4 to 5.0.1 (#1570)
dependabot[bot] Nov 1, 2021
27a4933
Bump System.Text.Encodings.Web from 4.5.1 to 5.0.1 (#1569)
dependabot[bot] Nov 1, 2021
3980201
Remove PubSub MQTT startup repeat (#1547)
einarmo Nov 1, 2021
3d387b8
fix subcode mask (#1563)
mregen Nov 1, 2021
a2038ff
Fix VS2022 build (#1566)
mregen Nov 2, 2021
806f7cb
1.05.01 Release Preparation.
randy-armstrong Nov 16, 2021
fb28cba
Fixed MethodDeclarationId issue.
randy-armstrong Nov 21, 2021
5fc0cc3
Fix for MethodDefinitionId issue that should be backward compatible.
randy-armstrong Nov 22, 2021
ffdf57e
Update to fix for MethodDefinitionId issue that should be backward co…
randy-armstrong Nov 22, 2021
cc32093
Reapply MethodDeclarationId fix.
randy-armstrong Nov 24, 2021
b70e214
Update to 1.05.00 NodeSet.
randy-armstrong Nov 24, 2021
d91a84c
Add MethodDefinitionId fixes with 1.04.10 NodeSet.
randy-armstrong Nov 24, 2021
b4c197f
Revert MethodDeclarationId fix because it broke code, Update NodeSet.
randy-armstrong Nov 26, 2021
6433466
Replace NodeSet with 1.04.10.
randy-armstrong Dec 5, 2021
c6d881a
Merge remote-tracking branch 'source/master'
randy-armstrong Feb 27, 2022
d4beaa7
Add UA-1.05.01 NodeSet Files.
randy-armstrong Feb 27, 2022
5d31e6f
Re-generate Opc.Ua.DataTypes.cs.
randy-armstrong Feb 27, 2022
25ed111
update branch to 1.5 release candidate
mregen Feb 28, 2022
bc03c7c
Modelcompiler 1.05.01 2022 02 24 (#1722)
mregen Feb 28, 2022
c0cabbd
Merge remote-tracking branch 'source/release/1.5.368'
randy-armstrong Mar 1, 2022
5b40c2b
Merge branch 'master' of https://github.com/OPCF-Members/UA-.NETStand…
randy-armstrong Mar 1, 2022
19faed4
Merge pull request #1761 from OPCFoundation/master
mregen Apr 1, 2022
b0fa4c1
Merge remote-tracking branch 'source/master'
randy-armstrong Apr 4, 2022
9dd0867
merge release 368 branch
mregen May 13, 2022
8e989f4
Merge pull request #1819 from OPCFoundation/rel15368
mregen May 13, 2022
deaefe2
Tag as release
mregen Jun 10, 2022
fb231ea
Merge remote-tracking branch 'source/release/1.4.369'
randy-armstrong Jun 15, 2022
4f48564
Fixes Decoding ExtensionObjects when DataType NamespaceUris are not u…
randy-armstrong Jun 15, 2022
c29a41f
UA-1.04.11-2022-03-29
randy-armstrong Jun 15, 2022
b9255ff
Update to 1.05.02 NodeSets.
randy-armstrong Jun 30, 2022
3eed300
Merge remote-tracking branch 'source/release/1.5.368'
randy-armstrong Jun 30, 2022
82e94f6
Merge remote-tracking branch 'source/master'
randy-armstrong Oct 1, 2022
8be757f
Add support for Roles.
randy-armstrong Oct 1, 2022
6d950c7
1.05.02 preparations.
randy-armstrong Oct 1, 2022
746195c
Resync with baseline.
randy-armstrong Oct 14, 2022
73435df
Updates for 1.05.02.
randy-armstrong Oct 15, 2022
1455b26
Preview for 1.05.03 release;
randy-armstrong Jul 1, 2023
ece04e2
Merge remote-tracking branch 'public/master'
randy-armstrong Jul 1, 2023
8856f0f
Merge branch '1.05.03-release-preview'
randy-armstrong Jul 1, 2023
2eeba9b
Update autogenerated files to 1.05.03
randy-armstrong Jul 1, 2023
0e18098
Remove deleted types.
randy-armstrong Jul 1, 2023
fe39e6c
Fix AccessRestriction bug.
randy-armstrong Jul 1, 2023
9000be1
Add SyntaxReferenceId references.
randy-armstrong Jul 2, 2023
f8d0b81
Fix messed up GDS files.
randy-armstrong Jul 2, 2023
442e706
Backout Part 8 changes.
randy-armstrong Jul 2, 2023
9ac181e
fix tests
mregen Jul 2, 2023
bccecee
Back out Part 4 changes.
randy-armstrong Jul 2, 2023
690bcd8
Add SyntaxReferenceId references.
randy-armstrong Jul 2, 2023
dd82d1b
Fix messed up GDS files.
randy-armstrong Jul 2, 2023
ea0eb6b
Backout Part 8 changes.
randy-armstrong Jul 2, 2023
47244ac
Back out Part 4 changes.
randy-armstrong Jul 2, 2023
e89f05e
Merge remote-tracking branch 'origin/master' into 1.05.03-release-pre…
mregen Jul 4, 2023
9a981a4
Merge remote-tracking branch 'origin/master' into 1.05.03-release-pre…
mregen Jul 12, 2023
01971c6
Merge remote-tracking branch 'public/master'
randy-armstrong Jul 14, 2023
e1d814e
Merge branch 'master' of https://github.com/OPCF-Members/UA-.NETStand…
randy-armstrong Jul 14, 2023
b642f1b
1.05.03 RC
randy-armstrong Jul 14, 2023
17350cb
Merge remote-tracking branch 'prototypes/master' into 1.05.03-release…
randy-armstrong Jul 14, 2023
bd7e0f3
Rebuild 1.05.03 files.
randy-armstrong Aug 28, 2023
ce9f2c9
Merge remote-tracking branch 'public/master'
randy-armstrong Nov 16, 2023
d6fcf29
Add generated code for 1.05.03 final release.
randy-armstrong Nov 17, 2023
89b4d74
Add generated code for 1.05.03 final release.
randy-armstrong Nov 17, 2023
b0778e2
Remove unused ids from autogenerated files.
randy-armstrong Nov 17, 2023
91b8dbb
Regenerate files.
randy-armstrong Nov 22, 2023
dd3dc4b
Merge remote-tracking branch 'public/master'
Dec 11, 2023
d2ae190
Update generated files to 1.05.03 release.
Dec 12, 2023
e51184c
Update copyright.
Dec 12, 2023
6d52e31
Remove RegEx from UANodeSet
Dec 12, 2023
4fc7562
Update version.json (#2504)
mrsuciu Feb 6, 2024
d84c947
Numerous JSON encoder fixes.
randy-armstrong Feb 26, 2024
1030c81
Update JsonEncoder to match 1.05.04 Draft.
randy-armstrong Feb 26, 2024
0fbc1df
Merge remote-tracking branch 'public/release/1.5.373'
randy-armstrong Feb 26, 2024
68d0ab8
Merge branch 'master' of https://github.com/OPCF-Members/UA-.NETStand…
randy-armstrong Feb 26, 2024
97eeab2
Merge remote-tracking branch 'public/master' into JSON encoder fixes.
randy-armstrong Feb 26, 2024
fab21f4
Merge branch 'master' of https://github.com/OPCF-Members/UA-.NETStand…
randy-armstrong Feb 26, 2024
ac0d7fe
Fix errors introduced in JsonEncoder by merge into master.
randy-armstrong Feb 27, 2024
65c45e3
Fix issues with JSON encoding and sessionless messages.
randy-armstrong Feb 27, 2024
70ef1ac
Fix issue with decoder mapping tables.
randy-armstrong Feb 28, 2024
49b6e26
Update to latest JSON encoding proposal.
randy-armstrong Mar 30, 2024
6e8d9ef
Merge branch 'master' into 1.05.04-JSON-encoder-fixes-v2
randy-armstrong Apr 24, 2024
540331f
Incorporate 1.05.04 GDS Changes.
randy-armstrong Apr 29, 2024
b4a4e70
Add Configuration/ConfigurationFile.cs
randy-armstrong Apr 29, 2024
bb031c8
Add PubSub types.
randy-armstrong Apr 29, 2024
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Jump to
Jump to file
Failed to load files.
Diff view
Diff view
Expand Up @@ -93,7 +93,7 @@ public override void Encode(IEncoder encoder)
{
encoder.PushNamespace(XmlNamespace);

if (encoder.UseReversibleEncoding)
if (encoder.UseCompactEncoding)
{
encoder.WriteUInt32("EncodingMask", m_encodingMask);
}
Expand Down
Expand Up @@ -95,7 +95,7 @@ public override void Encode(IEncoder encoder)
encoder.PushNamespace(XmlNamespace);

string fieldName = null;
if (encoder.UseReversibleEncoding)
if (encoder.UseCompactEncoding)
{
encoder.WriteUInt32("SwitchField", m_switchField);
fieldName = "Value";
Expand All @@ -116,7 +116,7 @@ public override void Encode(IEncoder encoder)
}
EncodeProperty(encoder, fieldName, unionProperty);
}
else if (!encoder.UseReversibleEncoding)
else if (!encoder.UseCompactEncoding)
{
encoder.WriteString(null, "null");
}
Expand Down
@@ -1,5 +1,5 @@
/* ========================================================================
* Copyright (c) 2005-2021 The OPC Foundation, Inc. All rights reserved.
* Copyright (c) 2005-2024 The OPC Foundation, Inc. All rights reserved.
*
* OPC Foundation MIT License 1.00
*
Expand Down
2 changes: 1 addition & 1 deletion Libraries/Opc.Ua.Configuration/ApplicationInstance.cs
@@ -1,5 +1,5 @@
/* ========================================================================
* Copyright (c) 2005-2021 The OPC Foundation, Inc. All rights reserved.
* Copyright (c) 2005-2024 The OPC Foundation, Inc. All rights reserved.
*
* OPC Foundation MIT License 1.00
*
Expand Down
@@ -1,5 +1,5 @@
/* ========================================================================
* Copyright (c) 2005-2021 The OPC Foundation, Inc. All rights reserved.
* Copyright (c) 2005-2024 The OPC Foundation, Inc. All rights reserved.
*
* OPC Foundation MIT License 1.00
*
Expand Down
2 changes: 1 addition & 1 deletion Libraries/Opc.Ua.Configuration/IApplicationMessageDlg.cs
@@ -1,5 +1,5 @@
/* ========================================================================
* Copyright (c) 2005-2021 The OPC Foundation, Inc. All rights reserved.
* Copyright (c) 2005-2024 The OPC Foundation, Inc. All rights reserved.
*
* OPC Foundation MIT License 1.00
*
Expand Down
@@ -1,5 +1,5 @@
/* ========================================================================
* Copyright (c) 2005-2021 The OPC Foundation, Inc. All rights reserved.
* Copyright (c) 2005-2024 The OPC Foundation, Inc. All rights reserved.
*
* OPC Foundation MIT License 1.00
*
Expand Down
@@ -1,5 +1,5 @@
/* ========================================================================
* Copyright (c) 2005-2021 The OPC Foundation, Inc. All rights reserved.
* Copyright (c) 2005-2024 The OPC Foundation, Inc. All rights reserved.
*
* OPC Foundation MIT License 1.00
*
Expand Down
@@ -1,5 +1,5 @@
/* ========================================================================
* Copyright (c) 2005-2021 The OPC Foundation, Inc. All rights reserved.
* Copyright (c) 2005-2024 The OPC Foundation, Inc. All rights reserved.
*
* OPC Foundation MIT License 1.00
*
Expand Down Expand Up @@ -81,7 +81,7 @@
// For non RSA certificates, RSA keys are null
if (rsaPrivateKey != null && rsaPublicKey != null)
{
X509KeyUsageFlags keyUsage = GetKeyUsage(certWithPublicKey);

Check warning on line 84 in Libraries/Opc.Ua.Security.Certificates/X509Certificate/X509PfxUtils.cs

View workflow job for this annotation

GitHub Actions / test-windows-latest-Gds

In externally visible method 'bool X509PfxUtils.VerifyRSAKeyPair(X509Certificate2 certWithPublicKey, X509Certificate2 certWithPrivateKey, bool throwOnError = false)', validate parameter 'certWithPublicKey' is non-null before using it. If appropriate, throw an 'ArgumentNullException' when the argument is 'null'. (https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1062)

Check warning on line 84 in Libraries/Opc.Ua.Security.Certificates/X509Certificate/X509PfxUtils.cs

View workflow job for this annotation

GitHub Actions / test-windows-latest-Security.Certificates

In externally visible method 'bool X509PfxUtils.VerifyRSAKeyPair(X509Certificate2 certWithPublicKey, X509Certificate2 certWithPrivateKey, bool throwOnError = false)', validate parameter 'certWithPublicKey' is non-null before using it. If appropriate, throw an 'ArgumentNullException' when the argument is 'null'. (https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1062)

Check warning on line 84 in Libraries/Opc.Ua.Security.Certificates/X509Certificate/X509PfxUtils.cs

View workflow job for this annotation

GitHub Actions / test-windows-latest-Core

In externally visible method 'bool X509PfxUtils.VerifyRSAKeyPair(X509Certificate2 certWithPublicKey, X509Certificate2 certWithPrivateKey, bool throwOnError = false)', validate parameter 'certWithPublicKey' is non-null before using it. If appropriate, throw an 'ArgumentNullException' when the argument is 'null'. (https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1062)
if ((keyUsage & X509KeyUsageFlags.DataEncipherment) != 0)
{
result = VerifyRSAKeyPairCrypt(rsaPublicKey, rsaPrivateKey);
Expand Down Expand Up @@ -187,7 +187,7 @@
RSA rsaPrivateKey)
{
byte[] testBlock = new byte[TestBlockSize];
s_rnd.NextBytes(testBlock);

Check warning on line 190 in Libraries/Opc.Ua.Security.Certificates/X509Certificate/X509PfxUtils.cs

View workflow job for this annotation

GitHub Actions / test-windows-latest-Gds

Random is an insecure random number generator. Use cryptographically secure random number generators when randomness is required for security. (https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5394)

Check warning on line 190 in Libraries/Opc.Ua.Security.Certificates/X509Certificate/X509PfxUtils.cs

View workflow job for this annotation

GitHub Actions / test-windows-latest-Core

Random is an insecure random number generator. Use cryptographically secure random number generators when randomness is required for security. (https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5394)

Check warning on line 190 in Libraries/Opc.Ua.Security.Certificates/X509Certificate/X509PfxUtils.cs

View workflow job for this annotation

GitHub Actions / test-macOS-latest-PubSub

Random is an insecure random number generator. Use cryptographically secure random number generators when randomness is required for security. (https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5394)
byte[] encryptedBlock = rsaPublicKey.Encrypt(testBlock, RSAEncryptionPadding.OaepSHA1);
byte[] decryptedBlock = rsaPrivateKey.Decrypt(encryptedBlock, RSAEncryptionPadding.OaepSHA1);
if (decryptedBlock != null)
Expand All @@ -205,7 +205,7 @@
RSA rsaPrivateKey)
{
byte[] testBlock = new byte[TestBlockSize];
s_rnd.NextBytes(testBlock);

Check warning on line 208 in Libraries/Opc.Ua.Security.Certificates/X509Certificate/X509PfxUtils.cs

View workflow job for this annotation

GitHub Actions / test-windows-latest-Gds

Random is an insecure random number generator. Use cryptographically secure random number generators when randomness is required for security. (https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5394)

Check warning on line 208 in Libraries/Opc.Ua.Security.Certificates/X509Certificate/X509PfxUtils.cs

View workflow job for this annotation

GitHub Actions / test-windows-latest-Core

Random is an insecure random number generator. Use cryptographically secure random number generators when randomness is required for security. (https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5394)
byte[] signature = rsaPrivateKey.SignData(testBlock, HashAlgorithmName.SHA256, RSASignaturePadding.Pkcs1);
return rsaPublicKey.VerifyData(testBlock, signature, HashAlgorithmName.SHA256, RSASignaturePadding.Pkcs1);
}
Expand Down Expand Up @@ -263,7 +263,7 @@
ECDsa ecdsaPrivateKey)
{
byte[] testBlock = new byte[TestBlockSize];
s_rnd.NextBytes(testBlock);

Check warning on line 266 in Libraries/Opc.Ua.Security.Certificates/X509Certificate/X509PfxUtils.cs

View workflow job for this annotation

GitHub Actions / test-windows-latest-Gds

Random is an insecure random number generator. Use cryptographically secure random number generators when randomness is required for security. (https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5394)

Check warning on line 266 in Libraries/Opc.Ua.Security.Certificates/X509Certificate/X509PfxUtils.cs

View workflow job for this annotation

GitHub Actions / test-windows-latest-Core

Random is an insecure random number generator. Use cryptographically secure random number generators when randomness is required for security. (https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5394)
byte[] signature = ecdsaPrivateKey.SignData(testBlock, HashAlgorithmName.SHA256);
return ecdsaPublicKey.VerifyData(testBlock, signature, HashAlgorithmName.SHA256);
}
Expand Down