In this page
OPC UA
Introduction
OPC UA, or Open Platform Communications Unified Architecture, is a standardized communication protocol for industrial automation applications. It provides a platform-independent, service-oriented architecture that enables secure and reliable data exchange between various industrial devices and systems. OPC UA is used to facilitate interoperability and communication in industrial environments, allowing different types of machines, sensors, and control systems to seamlessly exchange data regardless of the underlying hardware or software platforms. It ensures compatibility, scalability, and security in distributed systems, making it a preferred choice for implementing Industrial Internet of Things (IIoT) and Industry 4.0 solutions. In that regard, we provide for users of GreyCat, an OPC UA Client allowing the seamless connection to OPC UA devices to retrieve their values, without the need to leave GCL code and use external tools!
Plugin availability
Platform | Availability |
---|---|
arm64-apple | Yes |
arm64-freebsd | No |
arm64-linux | Yes |
arm64-windows | No |
x64-apple | Yes |
x64-freebsd | No |
x64-linux | Yes |
x64-windows | Planned |
OpcuaClient
The OpcuaClient
type is responsible for establishing a connection to an OPC UA device.
Properties
When instantiating this type, the following properties are available:
host: String
: Specifies the hostname or IP address of the OPC UA device.port: int
: Indicates the OPC UA port number (usually4840
).path: String?
: (Optional) Represents the optional path to the required endpoint. If not provided, it defaults to\
.timeout: duration?
: (Optional) Response timeout (by default:20s
)security_mode: OpcuaSecurityMode
: Specifies the OPC UA security mode to be applied to the connection.security_policy: OpcuaSecurityPolicy?
: (Optional) Specifies the OPC UA security policy to be applied to the connection, if required.credentials: OpcuaCredentials?
: (Optional) Provides credentials for authentication, if necessary.certificate: OpcuaCertificate?
: (Optional) Optionally includes a client certificate for authentication purposes.
Reading Node Values in OPC UA
To read the current value of a specified NodeID, it must be provided in its string representation, following the OPC UA encoding format: ns=<namespaceindex>;<type>=<value>
. For example, ns=0;i=2258
or ns=1;s=string.id
.
String Representation Format:
ns
: Indicates the namespace index of the NodeID.<type>
: Represents the type of the NodeID. It can bei
for numeric NodeIDs,s
for string NodeIDs,g
for Guid orb
for Opaque/ByteString identifier.<value>
: Specifies the value of the NodeID.
Supported OPC UA Types and their mapping in GreyCat
The following table illustrates the OPC UA types supported by GreyCat and their corresponding mappings:
OPC UA Type | GreyCat mapping |
---|---|
Boolean | bool |
SByte | int |
Byte | int |
Int16 | int |
UInt16 | int |
Int32 | int |
UInt32 | int |
Int64 | int |
UInt64 | int |
Float | float |
Double | float |
String | String |
DateTime | time |
ByteString | String |
XmlElement | String |
Guid | String |
StatusCode | String |
NodeId | String |
ExpandedNodeId | String |
QualifiedName | String |
LocalizedText | String |
ExtensionObject | NOT SUPPORTED |
DataValue | NOT SUPPORTED |
Variant | NOT SUPPORTED |
DiagnosticInfo | NOT SUPPORTED |
OPC UA arrays are converted into GreyCat arrays, while OPC UA matrices are transformed into GreyCat arrays of arrays.
Read a single node
opcua.read(nodeId: String):any?
opcua.read("ns=1;s=float"); //return 12.3456
opcua.read("non valid or unknwown node"); //return null
Read a batch of nodes
opcua.read_all(nodeIds: Array<String>): Array<any?>
opcua.read_all(["ns=1;s=float", "ns1;s=int", "ns1;s=hello"]); //return [12.3456, 42, "hello world"];
opcua.read_all(["ns=1;s=float", "ns1;s=int", "non valid", "ns1;s=hello"]); //return [12.3456, 42, null, "hello world"];
Read a node and retrieve its server/source timestamp
opcua.read_with_time(nodeId: String):OpcuaValueDetails?
opcua.read_with_time("ns=1;s=boolean"); // return OpcuaValueDetails{value:true,source_time:'2024-05-15T14:55:57Z',server_time:'2024-05-15T14:55:57Z'}
Read a batch of node and retrieve their server/source timestamp
opcua.read_all_with_time(nodeId: Array<String>):Array<OpcuaValueDetails?>
opcua.read_all_with_time(["ns=1;s=boolean","ns=1;s=float"]); // return [OpcuaValueDetails{value:true,source_time:'2024-05-15T14:57:55Z',server_time:'2024-05-15T14:57:55Z'},OpcuaValueDetails{value:123.4560012817,source_time:'2024-05-15T14:57:55Z',server_time:'2024-05-15T14:57:55Z'}]
Read the history of a node
The server needs to be capable of supporting data historization for the specified node.
opcua.read_history(nodeId: String, from: time?, to:time?):Array<OpcuaValueDetails>?
opcua.read_history("ns=1;s=history.uint32", time::parse("2023-07-11T12:00:00Z", null), time::parse("2024-08-11T12:00:00Z", null));
// Return [OpcuaValueDetails{value:100,source_time:'2024-05-15T15:01:08Z',server_time:'2024-05-15T15:01:08Z'},OpcuaValueDetails{value:150,source_time:'2024-05-15T15:01:09Z',server_time:'2024-05-15T15:01:09Z'},OpcuaValueDetails{value:200,source_time:'2024-05-15T15:01:10Z',server_time:'2024-05-15T15:01:10Z'}]
Writing Node Values in OPC UA
In the context of Industry 4.0, the capability to write data back to a machine after data analytics or machine learning algorithms have been applied serves multiple essential purposes. Firstly, it enables proactive maintenance strategies by allowing machines to be stopped or alarms raised immediately upon detection of anomalies or potential malfunctions. Secondly, providing aggregated data or results from machine learning algorithms directly to the machine enables informed decision-making at the operational level, empowering machines to adjust their behavior autonomously based on insights derived from the data. Moreover, fine-tuning machine parameters based on the analyzed data ensures optimal performance and efficiency, as adjustments can be made in real-time to adapt to changing production conditions or quality requirements.
OpcuaClient
provides a write
method to write data on a OPC UA device. The prerequisites are that the node must be writable,
the OPC Ua user must have write
permissions on the device and the provided value
must match the node type.
write(nodeId: String, value:any)
The following types can be written on devices:
OPC UA Type | GreyCat mapping |
---|---|
Boolean | bool |
SByte | int |
Byte | int |
Int16 | int |
UInt16 | int |
Int32 | int |
UInt32 | int |
Int64 | int |
UInt64 | int |
Float | float |
Double | float |
String | String |
DateTime | time |
ByteString | NOT SUPPORTED |
XmlElement | NOT SUPPORTED |
Guid | NOT SUPPORTED |
StatusCode | NOT SUPPORTED |
NodeId | NOT SUPPORTED |
ExpandedNodeId | NOT SUPPORTED |
QualifiedName | NOT SUPPORTED |
LocalizedText | NOT SUPPORTED |
ExtensionObject | NOT SUPPORTED |
DataValue | NOT SUPPORTED |
Variant | NOT SUPPORTED |
DiagnosticInfo | NOT SUPPORTED |
Calling OPC-UA methods
The call
method is used to invoke methods on OPC UA nodes. This method requires two parameters: the OPC UA node identifier and an array of parameters to pass to the method.
opcua.call(nodeId: String, parameters:Array<any>):any?
Error management
Read
You may want to protect the read calls with try{} catch {}
. The plugin
will raise runtime exceptions on:
- Unable to read client key and/or certificate
- Unable to connect to the OPC UA server
- OPC UA responses with a StatusCode != Good
- Unable to convert an ExpandedNodeId to a String
- Unsupported OPCUA type
- Unable to parse the node id
Write
You may want to protect the read calls with try{} catch {}
. The plugin
will raise runtime exceptions on:
- Unable to read client key and/or certificate
- Unable to connect to the OPC UA server
- OPC UA responses with a StatusCode != Good
- Unsupported OPC UA type for writing
- Unable to find the OPC UA node type
- Unable to serialize the GreyCat value
- Unsupported GreyCat type for a given OPC UA type
- Overflow on OPC UA type
- Unable to parse the node id
OpcuaSecurityMode
In OPC UA, security is an essential aspect to ensure the integrity, confidentiality, and authenticity of data exchange between clients and servers. OPC UA offers several security modes that dictate how communication is secured between parties. Here’s an explanation of the differences between the “None,” “Sign,” and “SignAndEncrypt” security modes:
OpcuaSecurityMode::None
- In this mode, no encryption or digital signatures are applied to the communication.
- Data is transmitted in plaintext, making it vulnerable to interception and tampering.
- This mode is suitable for environments where security is not a concern, such as local testing or isolated networks. However, it should not be used in production environments where data confidentiality and integrity are paramount.
OpcuaSecurityMode::Sign
- In this mode, digital signatures are applied to the communication but encryption is not used.
- Data remains in plaintext, but each message is signed with a cryptographic signature to ensure its integrity and authenticity.
- While this mode provides some level of security by preventing tampering with data, it does not protect data confidentiality. It is suitable for scenarios where data confidentiality is not a requirement, but data integrity and authenticity are important.
OpcuaSecurityMode::SignAndEncrypt
- This mode offers the highest level of security by both signing and encrypting communication.
- Data is encrypted before transmission, ensuring confidentiality, and each message is signed to ensure its integrity and authenticity.
- SignAndEncrypt mode provides comprehensive protection against eavesdropping, tampering, and unauthorized access, making it suitable for environments where data security is critical, such as industrial control systems and IIoT applications.
OpcuaSecurityPolicy
OpcuaSecurityPolicy::Aes128_Sha256_RsaOaep
- This security policy utilizes AES (Advanced Encryption Standard) with a key length of 128 bits for encryption, SHA-256 (Secure Hash Algorithm 256) for hashing, and RSA-OAEP (RSA Optimal Asymmetric Encryption Padding) for asymmetric encryption.
- SHA-256 is a cryptographic hash function that produces a 256-bit (32-byte) hash value, ensuring data integrity.
- RSA-OAEP is an asymmetric encryption scheme based on RSA, providing secure encryption and decryption of data.
OpcuaSecurityPolicy::Aes256_Sha256_RsaPss
- This security policy is similar to Aes128_Sha256_RsaOaep but uses AES with a key length of 256 bits for encryption.
- AES-256 offers stronger encryption compared to AES-128, suitable for environments requiring higher security levels.
OpcuaSecurityPolicy::Basic128Rsa15
- This security policy utilizes Basic128 encryption and RSA with PKCS#1 v1.5 padding for asymmetric encryption.
- Basic128 refers to AES with a key length of 128 bits for encryption, providing basic security measures.
- RSA15 refers to RSA encryption with PKCS#1 v1.5 padding, an older encryption scheme that is less secure than RSA-OAEP.
OpcuaSecurityPolicy::Basic256
- This security policy uses AES with a key length of 256 bits for encryption without specifying the hash and asymmetric encryption algorithms.
- While it provides stronger encryption compared to Basic128, it lacks specificity regarding hashing and asymmetric encryption algorithms.
OpcuaSecurityPolicy::Basic256Sha256
- Similar to Basic256, this security policy uses AES with a key length of 256 bits for encryption.
- Additionally, it specifies SHA-256 for hashing, enhancing data integrity compared to Basic256.
OpcuaSecurityPolicy::None
- This security policy indicates that no security measures are applied to communication.
- It should only be used in environments where security is not a concern, such as local testing or isolated networks.
OpcuaCertificate
The OpcuaCertificate
type represents a certificate used for OPC UA connections.
path: String
: Specifies the file path to the certificate.private_key_path: String
: Specifies the file path to the private key associated with the certificate.application_uri: String?
: (Optional) Represents the application URI associated with the certificate.allow_self_signed: bool?
: (Optional) Indicates whether self-signed certificates are allowed. Iftrue
, self-signed certificates are permitted; iffalse
or not specified, they are not allowed.
OpcuaCredentials
The OpcuaCredentials
type represents credentials used for authentication in OPC UA connections.
login: String
: Specifies the login or username associated with the credentials.password: String
: Specifies the password associated with the credentials.
Log levels
GreyCat Log Level | Open62541 Log Level |
---|---|
error |
error |
warn |
warn |
trace |
debug |
all others | off |
Examples
Reading a single node
@library("opcua", "0.0.0");
fn main() {
var opcua = OpcuaClient {
host: "localhost",
port: 4842,
security_mode: OpcuaSecurityMode::SignAndEncrypt,
security_policy: OpcuaSecurityPolicy::Aes128_Sha256_RsaOaep,
certificate: OpcuaCertificate {
allow_self_signed: true,
path: "./test/key/client_cert.der",
private_key_path: "./test/key/client_key.der",
},
credentials: OpcuaCredentials { login: "root", password: "opcua" }
};
var result = opcua.read("ns=0;i=2258");
println(result);
println(result is time);
}
This code perform a OPC UA connection to a local server running on port 4842
. The connection is password protected and uses signature/encryption with the Aes128_Sha256_RsaOaep policy. We want to read the node i=2258
on namespace 0
(this node is present on all OPC UA servers and store the server timestamp). We also assess the result is a core::time.
Result:
'2025-03-26T10:15:12.288884Z'
true
Read a single node with times
In a similar way, we want to retrieve the content of node ns=0;i=2258
, alongside with the server
and source
times:
@library("opcua", "0.0.0");
fn main() {
var opcua = OpcuaClient {
host: "localhost",
port: 4842,
security_mode: OpcuaSecurityMode::SignAndEncrypt,
security_policy: OpcuaSecurityPolicy::Aes128_Sha256_RsaOaep,
certificate: OpcuaCertificate {
allow_self_signed: true,
path: "./test/key/client_cert.der",
private_key_path: "./test/key/client_key.der",
},
credentials: OpcuaCredentials { login: "root", password: "opcua" }
};
var result = opcua.read_with_time("ns=0;i=2258");
pprint(result);
}
Result:
OpcuaValueDetails {
value: '2025-03-26T10:17:47.286130Z',
source_time: '2025-03-26T10:17:47Z',
server_time: '2025-03-26T10:17:47Z'
}
Writing a value
Node ns=1;s=boolean
hosts a boolean value. We want to write a new value on this node:
@library("opcua", "0.0.0");
fn main() {
var opcua = OpcuaClient {
host: "localhost",
port: 4842,
security_mode: OpcuaSecurityMode::None,
security_policy: OpcuaSecurityPolicy::None,
};
println(opcua.read("ns=1;s=boolean"));
opcua.write("ns=1;s=boolean", true);
println(opcua.read("ns=1;s=boolean"));
opcua.write("ns=1;s=boolean", 42);
}
Result:
false
true
ERROR 2025-03-26T10:20:08.348155Z 1/3.0 project::main
Unsupported GreyCat type (3) for OPCUA type: Boolean
at main (project.gcl:15:38)
Initially, the value on the node was false
. We replace it with true
and a subsequent call shows the value has been correctly written back to the server. Writing an incompatible value (42
instead of a boolean value) raises a runtime_error
.
Writing an array
Node ns=1;s=bool.array
hosts a boolean array (size = 3). We want to write new values on this node:
@library("opcua", "0.0.0");
fn main() {
var opcua = OpcuaClient {
host: "localhost",
port: 4842,
security_mode: OpcuaSecurityMode::None,
security_policy: OpcuaSecurityPolicy::None,
};
println(opcua.read("ns=1;s=bool.array"));
opcua.write("ns=1;s=bool.array", [false, false, true]);
println(opcua.read("ns=1;s=bool.array"));
}
Result:
[true,false,true] //Original value
[false,false,true] //After writing
Calling a method
Our OPC UA server exposes two RPC methods:
ns=1;i=62541
: Take one string argument and returnHello <argument>
ns=1;s=IncInt32ArrayValues
: Take two arguments, a int array, and an increment. This method returns an array with elements increased by the increment value
@library("opcua", "0.0.0");
fn main() {
var opcua = OpcuaClient {
host: "localhost",
port: 4842,
security_mode: OpcuaSecurityMode::SignAndEncrypt,
security_policy: OpcuaSecurityPolicy::Aes128_Sha256_RsaOaep,
certificate: OpcuaCertificate {
allow_self_signed: true,
path: "./test/key/client_cert.der",
private_key_path: "./test/key/client_key.der",
},
credentials: OpcuaCredentials { login: "root", password: "opcua" }
};
println(opcua.call("ns=1;i=62541", ["DataThings"]));
println(opcua.call("ns=1;s=IncInt32ArrayValues", [[1, 2, 3, 4, 5], 5]));
}
Result:
Hello DataThings
Array{6,7,8,9,10}
Third party licenses
open62541 (https://www.open62541.org/)
This plugin uses internally open62541
, an Open Source OPC UA licensed under the MPL v2.0
openssl (https://www.openssl.org/)
open62541
is built with openssl to perform the encryption. Openssl is licensed under Apache-2.0 license.