View Issue Details
ID | Project | Category | View Status | Date Submitted | Last Update |
---|---|---|---|---|---|
0005524 | 10000-006: Mappings | Spec | public | 2020-03-12 10:57 | 2024-05-21 15:38 |
Reporter | V. Monfort | Assigned To | Randy Armstrong | ||
Priority | normal | Severity | minor | Reproducibility | have not tried |
Status | closed | Resolution | reopened | ||
Product Version | 1.03 | ||||
Fixed in Version | 1.05.04 RC1 | ||||
Summary | 0005524: No error code identified to limit size on server side of response message to be sent | ||||
Description | Hello, In TCPUA protocol and sessions services each peer (client/server) might declare a maximum size for OPC UA message it will accept to receive.
Status codes 1. and 2. indicates explicitly that it means to be used for the peer limit (and not for self limit when encoding the message). Status code 3. might be appropriate given its description but the only mention in the specification also indicate it shall be used for decoding only in §5.3: And finally status code 4 is only meant to be used for a reception of a message invalid size. I guess status code 3 might be used also in case of sender limit that cannot be declared during HEL/ACK or CreateSession, but it is not cleary stated by the spec. It is also what I understand from 0000254. Moreover this analysis came from issues with UACTT 1.3.341.390 for View Basic tests 005/015/020 in which UACTT specifies no limit in reception and send huge BrowseRequest of more than 3000 elements. As a consequence the response need 12 chunks of 65k and sending a ServiceFault with Bad_EncodingLimitsExceeded is not managed by UACTT to reduce the request size in addition to issue 0005517. Best regards | ||||
Tags | No tags attached. | ||||
Commit Version | 1.05.04 RC | ||||
Fix Due Date | |||||
related to | 0009556 | closed | Matthias Damm | 10000-004: Services | No error code identified to limit size on server side of response message to be sent |
|
Randy needs to read this to see if there is an issue. |
|
Bad_RequestTooLarge and Bad_ResponseTooLarge are used when the peer MaxMessageSize limits provided in HEL/ACK are exceeded. Bad_TcpMessageTooLarge is used when the a MessageChunk exceeds the ReceiveBufferSize for the Server. Bad_EncodingLimitsExceeded are reported by encoders/decoders at a layer above the UA-CP message and apply to max lengths of arrays and strings appearing in a Message. Changed Bad_TcpMessageTooLarge text to: |
|
Agreed to changes in virtual F2F. |
|
The text for Bad_ResponseTooLarge still refers only to the client but the server may have reduced the limit futher. |
|
Changed to: |
|
Agreed to change in Web Meeting. |
Date Modified | Username | Field | Change |
---|---|---|---|
2020-03-12 10:57 | V. Monfort | New Issue | |
2020-05-19 16:56 | Jim Luth | Project | UA Specification => 10000-006: Mappings |
2020-05-19 16:56 | Jim Luth | Note Added: 0012080 | |
2020-05-19 16:56 | Jim Luth | Assigned To | => Randy Armstrong |
2020-05-19 16:56 | Jim Luth | Status | new => assigned |
2020-06-17 03:36 | Randy Armstrong | Status | assigned => resolved |
2020-06-17 03:36 | Randy Armstrong | Resolution | open => fixed |
2020-06-17 03:36 | Randy Armstrong | Note Added: 0012367 | |
2020-06-18 17:31 | Jim Luth | Status | resolved => closed |
2020-06-18 17:31 | Jim Luth | Fixed in Version | => 1.05 |
2020-06-18 17:31 | Jim Luth | Note Added: 0012435 | |
2023-10-17 10:01 | Matthias Damm | Status | closed => feedback |
2023-10-17 10:01 | Matthias Damm | Resolution | fixed => reopened |
2023-10-17 10:01 | Matthias Damm | Note Added: 0020198 | |
2023-10-18 01:45 | Randy Armstrong | Status | feedback => resolved |
2023-10-18 01:45 | Randy Armstrong | Note Added: 0020203 | |
2024-05-21 15:35 | Jim Luth | Issue cloned: 0009556 | |
2024-05-21 15:35 | Jim Luth | Relationship added | related to 0009556 |
2024-05-21 15:38 | Jim Luth | Status | resolved => closed |
2024-05-21 15:38 | Jim Luth | Fixed in Version | => 1.05.04 RC1 |
2024-05-21 15:38 | Jim Luth | Commit Version | => 1.05.04 RC |
2024-05-21 15:38 | Jim Luth | Note Added: 0021219 |