Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
O
opcua-asyncio
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
1
Merge Requests
1
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Analytics
Analytics
CI / CD
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
Nikola Balog
opcua-asyncio
Commits
924bf379
Commit
924bf379
authored
Feb 18, 2016
by
olivier R-D
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
UaError typo in Client
parent
7de0c34c
Changes
1
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
with
3 additions
and
3 deletions
+3
-3
opcua/client/client.py
opcua/client/client.py
+3
-3
No files found.
opcua/client/client.py
View file @
924bf379
...
...
@@ -108,7 +108,7 @@ class Client(object):
ep
.
SecurityMode
==
security_mode
and
ep
.
SecurityPolicyUri
==
policy_uri
):
return
ep
raise
Value
Error
(
"No matching endpoints: {}, {}"
.
format
(
raise
ua
.
Ua
Error
(
"No matching endpoints: {}, {}"
.
format
(
security_mode
,
policy_uri
))
def
set_security_string
(
self
,
string
):
...
...
@@ -125,7 +125,7 @@ class Client(object):
return
parts
=
string
.
split
(
','
)
if
len
(
parts
)
<
4
:
raise
UaError
(
'Wrong format: `{}`, expected at least 4 '
raise
ua
.
UaError
(
'Wrong format: `{}`, expected at least 4 '
'comma-separated values'
.
format
(
string
))
policy_class
=
getattr
(
security_policies
,
'SecurityPolicy'
+
parts
[
0
])
mode
=
getattr
(
ua
.
MessageSecurityMode
,
parts
[
1
])
...
...
@@ -316,7 +316,7 @@ class Client(object):
if
not
self
.
security_policy
.
server_certificate
:
self
.
security_policy
.
server_certificate
=
response
.
ServerCertificate
elif
self
.
security_policy
.
server_certificate
!=
response
.
ServerCertificate
:
raise
UaError
(
"Server certificate mismatch"
)
raise
ua
.
UaError
(
"Server certificate mismatch"
)
# remember PolicyId's: we will use them in activate_session()
ep
=
Client
.
find_endpoint
(
response
.
ServerEndpoints
,
self
.
security_policy
.
Mode
,
self
.
security_policy
.
URI
)
self
.
_policy_ids
=
ep
.
UserIdentityTokens
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment