Mercurial > hg > orthanc
annotate OrthancServer/Internals/CommandDispatcher.cpp @ 660:f0232774b913
fix warnings
author | Sebastien Jodogne <s.jodogne@gmail.com> |
---|---|
date | Mon, 04 Nov 2013 15:07:58 +0100 |
parents | 4aa6f0d79947 |
children | d233b5090105 |
rev | line source |
---|---|
0 | 1 /** |
62 | 2 * Orthanc - A Lightweight, RESTful DICOM Store |
399 | 3 * Copyright (C) 2012-2013 Medical Physics Department, CHU of Liege, |
0 | 4 * Belgium |
5 * | |
6 * This program is free software: you can redistribute it and/or | |
7 * modify it under the terms of the GNU General Public License as | |
8 * published by the Free Software Foundation, either version 3 of the | |
9 * License, or (at your option) any later version. | |
136 | 10 * |
11 * In addition, as a special exception, the copyright holders of this | |
12 * program give permission to link the code of its release with the | |
13 * OpenSSL project's "OpenSSL" library (or with modified versions of it | |
14 * that use the same license as the "OpenSSL" library), and distribute | |
15 * the linked executables. You must obey the GNU General Public License | |
16 * in all respects for all of the code used other than "OpenSSL". If you | |
17 * modify file(s) with this exception, you may extend this exception to | |
18 * your version of the file(s), but you are not obligated to do so. If | |
19 * you do not wish to do so, delete this exception statement from your | |
20 * version. If you delete this exception statement from all source files | |
21 * in the program, then also delete it here. | |
0 | 22 * |
23 * This program is distributed in the hope that it will be useful, but | |
24 * WITHOUT ANY WARRANTY; without even the implied warranty of | |
25 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU | |
26 * General Public License for more details. | |
27 * | |
28 * You should have received a copy of the GNU General Public License | |
29 * along with this program. If not, see <http://www.gnu.org/licenses/>. | |
30 **/ | |
31 | |
32 | |
33 #include "CommandDispatcher.h" | |
34 | |
35 #include "FindScp.h" | |
36 #include "StoreScp.h" | |
37 #include "MoveScp.h" | |
38 #include "../../Core/Toolbox.h" | |
39 | |
40 #include <dcmtk/dcmnet/dcasccfg.h> /* for class DcmAssociationConfiguration */ | |
101 | 41 #include <boost/lexical_cast.hpp> |
102
7593b57dc1bf
switch to google log
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
101
diff
changeset
|
42 #include <glog/logging.h> |
0 | 43 |
503 | 44 #define ORTHANC_PROMISCUOUS 1 |
45 | |
0 | 46 static OFBool opt_rejectWithoutImplementationUID = OFFalse; |
47 | |
48 | |
503 | 49 |
50 #if ORTHANC_PROMISCUOUS == 1 | |
51 static | |
52 DUL_PRESENTATIONCONTEXT * | |
53 findPresentationContextID(LST_HEAD * head, | |
54 T_ASC_PresentationContextID presentationContextID) | |
55 { | |
56 DUL_PRESENTATIONCONTEXT *pc; | |
57 LST_HEAD **l; | |
58 OFBool found = OFFalse; | |
59 | |
60 if (head == NULL) | |
61 return NULL; | |
62 | |
63 l = &head; | |
64 if (*l == NULL) | |
65 return NULL; | |
66 | |
67 pc = OFstatic_cast(DUL_PRESENTATIONCONTEXT *, LST_Head(l)); | |
68 (void)LST_Position(l, OFstatic_cast(LST_NODE *, pc)); | |
69 | |
70 while (pc && !found) { | |
71 if (pc->presentationContextID == presentationContextID) { | |
72 found = OFTrue; | |
73 } else { | |
74 pc = OFstatic_cast(DUL_PRESENTATIONCONTEXT *, LST_Next(l)); | |
75 } | |
76 } | |
77 return pc; | |
78 } | |
79 | |
80 | |
81 /** accept all presenstation contexts for unknown SOP classes, | |
82 * i.e. UIDs appearing in the list of abstract syntaxes | |
83 * where no corresponding name is defined in the UID dictionary. | |
84 * @param params pointer to association parameters structure | |
85 * @param transferSyntax transfer syntax to accept | |
86 * @param acceptedRole SCU/SCP role to accept | |
87 */ | |
88 static OFCondition acceptUnknownContextsWithTransferSyntax( | |
89 T_ASC_Parameters * params, | |
90 const char* transferSyntax, | |
91 T_ASC_SC_ROLE acceptedRole) | |
92 { | |
93 OFCondition cond = EC_Normal; | |
94 int n, i, k; | |
95 DUL_PRESENTATIONCONTEXT *dpc; | |
96 T_ASC_PresentationContext pc; | |
97 OFBool accepted = OFFalse; | |
98 OFBool abstractOK = OFFalse; | |
99 | |
100 n = ASC_countPresentationContexts(params); | |
101 for (i = 0; i < n; i++) | |
102 { | |
103 cond = ASC_getPresentationContext(params, i, &pc); | |
104 if (cond.bad()) return cond; | |
105 abstractOK = OFFalse; | |
106 accepted = OFFalse; | |
107 | |
108 if (dcmFindNameOfUID(pc.abstractSyntax) == NULL) | |
109 { | |
110 abstractOK = OFTrue; | |
111 | |
112 /* check the transfer syntax */ | |
113 for (k = 0; (k < OFstatic_cast(int, pc.transferSyntaxCount)) && !accepted; k++) | |
114 { | |
115 if (strcmp(pc.proposedTransferSyntaxes[k], transferSyntax) == 0) | |
116 { | |
117 accepted = OFTrue; | |
118 } | |
119 } | |
120 } | |
121 | |
122 if (accepted) | |
123 { | |
124 cond = ASC_acceptPresentationContext( | |
125 params, pc.presentationContextID, | |
126 transferSyntax, acceptedRole); | |
127 if (cond.bad()) return cond; | |
128 } else { | |
129 T_ASC_P_ResultReason reason; | |
130 | |
131 /* do not refuse if already accepted */ | |
132 dpc = findPresentationContextID(params->DULparams.acceptedPresentationContext, | |
133 pc.presentationContextID); | |
134 if ((dpc == NULL) || ((dpc != NULL) && (dpc->result != ASC_P_ACCEPTANCE))) | |
135 { | |
136 | |
137 if (abstractOK) { | |
138 reason = ASC_P_TRANSFERSYNTAXESNOTSUPPORTED; | |
139 } else { | |
140 reason = ASC_P_ABSTRACTSYNTAXNOTSUPPORTED; | |
141 } | |
142 /* | |
143 * If previously this presentation context was refused | |
144 * because of bad transfer syntax let it stay that way. | |
145 */ | |
146 if ((dpc != NULL) && (dpc->result == ASC_P_TRANSFERSYNTAXESNOTSUPPORTED)) | |
147 reason = ASC_P_TRANSFERSYNTAXESNOTSUPPORTED; | |
148 | |
149 cond = ASC_refusePresentationContext(params, pc.presentationContextID, reason); | |
150 if (cond.bad()) return cond; | |
151 } | |
152 } | |
153 } | |
154 return EC_Normal; | |
155 } | |
156 | |
157 | |
158 /** accept all presenstation contexts for unknown SOP classes, | |
159 * i.e. UIDs appearing in the list of abstract syntaxes | |
160 * where no corresponding name is defined in the UID dictionary. | |
161 * This method is passed a list of "preferred" transfer syntaxes. | |
162 * @param params pointer to association parameters structure | |
163 * @param transferSyntax transfer syntax to accept | |
164 * @param acceptedRole SCU/SCP role to accept | |
165 */ | |
166 static OFCondition acceptUnknownContextsWithPreferredTransferSyntaxes( | |
167 T_ASC_Parameters * params, | |
168 const char* transferSyntaxes[], int transferSyntaxCount, | |
169 T_ASC_SC_ROLE acceptedRole = ASC_SC_ROLE_DEFAULT) | |
170 { | |
171 OFCondition cond = EC_Normal; | |
172 /* | |
173 ** Accept in the order "least wanted" to "most wanted" transfer | |
174 ** syntax. Accepting a transfer syntax will override previously | |
175 ** accepted transfer syntaxes. | |
176 */ | |
177 for (int i = transferSyntaxCount - 1; i >= 0; i--) | |
178 { | |
179 cond = acceptUnknownContextsWithTransferSyntax(params, transferSyntaxes[i], acceptedRole); | |
180 if (cond.bad()) return cond; | |
181 } | |
182 return cond; | |
183 } | |
184 #endif | |
185 | |
186 | |
62 | 187 namespace Orthanc |
0 | 188 { |
189 namespace Internals | |
190 { | |
191 OFCondition AssociationCleanup(T_ASC_Association *assoc) | |
192 { | |
193 OFString temp_str; | |
194 OFCondition cond = ASC_dropSCPAssociation(assoc); | |
195 if (cond.bad()) | |
196 { | |
102
7593b57dc1bf
switch to google log
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
101
diff
changeset
|
197 LOG(FATAL) << cond.text(); |
0 | 198 return cond; |
199 } | |
200 | |
201 cond = ASC_destroyAssociation(&assoc); | |
202 if (cond.bad()) | |
203 { | |
102
7593b57dc1bf
switch to google log
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
101
diff
changeset
|
204 LOG(FATAL) << cond.text(); |
0 | 205 return cond; |
206 } | |
207 | |
208 return cond; | |
209 } | |
210 | |
211 | |
212 | |
213 CommandDispatcher* AcceptAssociation(const DicomServer& server, T_ASC_Network *net) | |
214 { | |
215 DcmAssociationConfiguration asccfg; | |
216 char buf[BUFSIZ]; | |
217 T_ASC_Association *assoc; | |
218 OFCondition cond; | |
219 OFString sprofile; | |
220 OFString temp_str; | |
221 | |
222 std::vector<const char*> knownAbstractSyntaxes; | |
223 | |
224 // For C-STORE | |
225 if (server.HasStoreRequestHandlerFactory()) | |
226 { | |
227 knownAbstractSyntaxes.push_back(UID_VerificationSOPClass); | |
228 } | |
229 | |
230 // For C-FIND | |
231 if (server.HasFindRequestHandlerFactory()) | |
232 { | |
233 knownAbstractSyntaxes.push_back(UID_FINDPatientRootQueryRetrieveInformationModel); | |
234 knownAbstractSyntaxes.push_back(UID_FINDStudyRootQueryRetrieveInformationModel); | |
235 } | |
236 | |
237 // For C-MOVE | |
238 if (server.HasMoveRequestHandlerFactory()) | |
239 { | |
240 knownAbstractSyntaxes.push_back(UID_MOVEStudyRootQueryRetrieveInformationModel); | |
241 } | |
242 | |
243 const char* transferSyntaxes[] = { NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL }; | |
244 int numTransferSyntaxes = 0; | |
245 | |
246 cond = ASC_receiveAssociation(net, &assoc, | |
247 /*opt_maxPDU*/ ASC_DEFAULTMAXPDU, | |
248 NULL, NULL, | |
249 /*opt_secureConnection*/ OFFalse, | |
250 DUL_NOBLOCK, 1); | |
251 | |
252 if (cond == DUL_NOASSOCIATIONREQUEST) | |
253 { | |
254 // Timeout | |
255 AssociationCleanup(assoc); | |
256 return NULL; | |
257 } | |
258 | |
259 // if some kind of error occured, take care of it | |
260 if (cond.bad()) | |
261 { | |
102
7593b57dc1bf
switch to google log
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
101
diff
changeset
|
262 LOG(ERROR) << "Receiving Association failed: " << cond.text(); |
0 | 263 // no matter what kind of error occurred, we need to do a cleanup |
264 AssociationCleanup(assoc); | |
265 return NULL; | |
266 } | |
267 | |
102
7593b57dc1bf
switch to google log
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
101
diff
changeset
|
268 LOG(INFO) << "Association Received"; |
0 | 269 |
270 transferSyntaxes[0] = UID_LittleEndianExplicitTransferSyntax; | |
271 transferSyntaxes[1] = UID_BigEndianExplicitTransferSyntax; | |
272 transferSyntaxes[2] = UID_LittleEndianImplicitTransferSyntax; | |
273 numTransferSyntaxes = 3; | |
274 | |
275 /* accept the Verification SOP Class if presented */ | |
276 cond = ASC_acceptContextsWithPreferredTransferSyntaxes( assoc->params, &knownAbstractSyntaxes[0], knownAbstractSyntaxes.size(), transferSyntaxes, numTransferSyntaxes); | |
277 if (cond.bad()) | |
278 { | |
102
7593b57dc1bf
switch to google log
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
101
diff
changeset
|
279 LOG(INFO) << cond.text(); |
0 | 280 AssociationCleanup(assoc); |
281 return NULL; | |
282 } | |
283 | |
284 /* the array of Storage SOP Class UIDs comes from dcuid.h */ | |
285 cond = ASC_acceptContextsWithPreferredTransferSyntaxes( assoc->params, dcmAllStorageSOPClassUIDs, numberOfAllDcmStorageSOPClassUIDs, transferSyntaxes, numTransferSyntaxes); | |
286 if (cond.bad()) | |
287 { | |
102
7593b57dc1bf
switch to google log
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
101
diff
changeset
|
288 LOG(INFO) << cond.text(); |
0 | 289 AssociationCleanup(assoc); |
290 return NULL; | |
291 } | |
292 | |
503 | 293 #if ORTHANC_PROMISCUOUS == 1 |
294 /* accept everything not known not to be a storage SOP class */ | |
295 cond = acceptUnknownContextsWithPreferredTransferSyntaxes( | |
296 assoc->params, transferSyntaxes, numTransferSyntaxes); | |
297 if (cond.bad()) | |
298 { | |
299 LOG(INFO) << cond.text(); | |
300 AssociationCleanup(assoc); | |
301 return NULL; | |
302 } | |
303 #endif | |
304 | |
0 | 305 /* set our app title */ |
306 ASC_setAPTitles(assoc->params, NULL, NULL, server.GetApplicationEntityTitle().c_str()); | |
307 | |
308 /* acknowledge or reject this association */ | |
309 cond = ASC_getApplicationContextName(assoc->params, buf); | |
310 if ((cond.bad()) || strcmp(buf, UID_StandardApplicationContext) != 0) | |
311 { | |
312 /* reject: the application context name is not supported */ | |
313 T_ASC_RejectParameters rej = | |
314 { | |
315 ASC_RESULT_REJECTEDPERMANENT, | |
316 ASC_SOURCE_SERVICEUSER, | |
317 ASC_REASON_SU_APPCONTEXTNAMENOTSUPPORTED | |
318 }; | |
319 | |
102
7593b57dc1bf
switch to google log
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
101
diff
changeset
|
320 LOG(INFO) << "Association Rejected: Bad Application Context Name: " << buf; |
0 | 321 cond = ASC_rejectAssociation(assoc, &rej); |
322 if (cond.bad()) | |
323 { | |
102
7593b57dc1bf
switch to google log
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
101
diff
changeset
|
324 LOG(INFO) << cond.text(); |
0 | 325 } |
326 AssociationCleanup(assoc); | |
327 return NULL; | |
328 } | |
620
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
329 |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
330 std::string callingIP; |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
331 std::string callingTitle; |
0 | 332 |
333 /* check the AETs */ | |
334 { | |
335 DIC_AE callingTitle_C; | |
336 DIC_AE calledTitle_C; | |
337 DIC_AE callingIP_C; | |
338 DIC_AE calledIP_C; | |
339 if (ASC_getAPTitles(assoc->params, callingTitle_C, calledTitle_C, NULL).bad() || | |
340 ASC_getPresentationAddresses(assoc->params, callingIP_C, calledIP_C).bad()) | |
341 { | |
342 T_ASC_RejectParameters rej = | |
343 { | |
344 ASC_RESULT_REJECTEDPERMANENT, | |
345 ASC_SOURCE_SERVICEUSER, | |
346 ASC_REASON_SU_NOREASON | |
347 }; | |
348 ASC_rejectAssociation(assoc, &rej); | |
349 AssociationCleanup(assoc); | |
350 return NULL; | |
351 } | |
352 | |
620
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
353 callingIP = std::string(/*OFSTRING_GUARD*/(callingIP_C)); |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
354 callingTitle = std::string(/*OFSTRING_GUARD*/(callingTitle_C)); |
101 | 355 std::string calledTitle(/*OFSTRING_GUARD*/(calledTitle_C)); |
0 | 356 Toolbox::ToUpperCase(callingIP); |
357 Toolbox::ToUpperCase(callingTitle); | |
358 Toolbox::ToUpperCase(calledTitle); | |
359 | |
360 if (server.HasCalledApplicationEntityTitleCheck() && | |
361 calledTitle != server.GetApplicationEntityTitle()) | |
362 { | |
363 T_ASC_RejectParameters rej = | |
364 { | |
365 ASC_RESULT_REJECTEDPERMANENT, | |
366 ASC_SOURCE_SERVICEUSER, | |
367 ASC_REASON_SU_CALLEDAETITLENOTRECOGNIZED | |
368 }; | |
369 ASC_rejectAssociation(assoc, &rej); | |
370 AssociationCleanup(assoc); | |
371 return NULL; | |
372 } | |
373 | |
374 if (server.HasApplicationEntityFilter() && | |
620
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
375 !server.GetApplicationEntityFilter().IsAllowedConnection(callingIP, callingTitle)) |
0 | 376 { |
377 T_ASC_RejectParameters rej = | |
378 { | |
379 ASC_RESULT_REJECTEDPERMANENT, | |
380 ASC_SOURCE_SERVICEUSER, | |
381 ASC_REASON_SU_CALLINGAETITLENOTRECOGNIZED | |
382 }; | |
383 ASC_rejectAssociation(assoc, &rej); | |
384 AssociationCleanup(assoc); | |
385 return NULL; | |
386 } | |
387 } | |
388 | |
389 if (opt_rejectWithoutImplementationUID && strlen(assoc->params->theirImplementationClassUID) == 0) | |
390 { | |
391 /* reject: the no implementation Class UID provided */ | |
392 T_ASC_RejectParameters rej = | |
393 { | |
394 ASC_RESULT_REJECTEDPERMANENT, | |
395 ASC_SOURCE_SERVICEUSER, | |
396 ASC_REASON_SU_NOREASON | |
397 }; | |
398 | |
102
7593b57dc1bf
switch to google log
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
101
diff
changeset
|
399 LOG(INFO) << "Association Rejected: No Implementation Class UID provided"; |
0 | 400 cond = ASC_rejectAssociation(assoc, &rej); |
401 if (cond.bad()) | |
402 { | |
102
7593b57dc1bf
switch to google log
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
101
diff
changeset
|
403 LOG(INFO) << cond.text(); |
0 | 404 } |
405 AssociationCleanup(assoc); | |
406 return NULL; | |
407 } | |
408 | |
409 { | |
410 cond = ASC_acknowledgeAssociation(assoc); | |
411 if (cond.bad()) | |
412 { | |
102
7593b57dc1bf
switch to google log
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
101
diff
changeset
|
413 LOG(ERROR) << cond.text(); |
0 | 414 AssociationCleanup(assoc); |
415 return NULL; | |
416 } | |
102
7593b57dc1bf
switch to google log
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
101
diff
changeset
|
417 LOG(INFO) << "Association Acknowledged (Max Send PDV: " << assoc->sendPDVLength << ")"; |
0 | 418 if (ASC_countAcceptedPresentationContexts(assoc->params) == 0) |
102
7593b57dc1bf
switch to google log
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
101
diff
changeset
|
419 LOG(INFO) << " (but no valid presentation contexts)"; |
0 | 420 } |
421 | |
620
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
422 IApplicationEntityFilter* filter = server.HasApplicationEntityFilter() ? &server.GetApplicationEntityFilter() : NULL; |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
423 return new CommandDispatcher(server, assoc, callingIP, callingTitle, filter); |
0 | 424 } |
425 | |
426 bool CommandDispatcher::Step() | |
427 /* | |
428 * This function receives DIMSE commmands over the network connection | |
429 * and handles these commands correspondingly. Note that in case of | |
430 * storscp only C-ECHO-RQ and C-STORE-RQ commands can be processed. | |
431 */ | |
432 { | |
433 bool finished = false; | |
434 | |
435 // receive a DIMSE command over the network, with a timeout of 1 second | |
436 DcmDataset *statusDetail = NULL; | |
437 T_ASC_PresentationContextID presID = 0; | |
438 T_DIMSE_Message msg; | |
439 | |
440 OFCondition cond = DIMSE_receiveCommand(assoc_, DIMSE_NONBLOCKING, 1, &presID, &msg, &statusDetail); | |
441 elapsedTimeSinceLastCommand_++; | |
442 | |
443 // if the command which was received has extra status | |
444 // detail information, dump this information | |
445 if (statusDetail != NULL) | |
446 { | |
101 | 447 //LOG4CPP_WARN(Internals::GetLogger(), "Status Detail:" << OFendl << DcmObject::PrintHelper(*statusDetail)); |
0 | 448 delete statusDetail; |
449 } | |
450 | |
451 if (cond == DIMSE_OUTOFRESOURCES) | |
452 { | |
453 finished = true; | |
454 } | |
455 else if (cond == DIMSE_NODATAAVAILABLE) | |
456 { | |
457 // Timeout due to DIMSE_NONBLOCKING | |
458 if (clientTimeout_ != 0 && | |
459 elapsedTimeSinceLastCommand_ >= clientTimeout_) | |
460 { | |
461 // This timeout is actually a client timeout | |
462 finished = true; | |
463 } | |
464 } | |
465 else if (cond == EC_Normal) | |
466 { | |
467 // Reset the client timeout counter | |
468 elapsedTimeSinceLastCommand_ = 0; | |
469 | |
620
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
470 // Convert the type of request to Orthanc's internal type |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
471 bool supported = false; |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
472 DicomRequestType request; |
0 | 473 switch (msg.CommandField) |
474 { | |
620
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
475 case DIMSE_C_ECHO_RQ: |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
476 request = DicomRequestType_Echo; |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
477 supported = true; |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
478 break; |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
479 |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
480 case DIMSE_C_STORE_RQ: |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
481 request = DicomRequestType_Store; |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
482 supported = true; |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
483 break; |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
484 |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
485 case DIMSE_C_MOVE_RQ: |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
486 request = DicomRequestType_Move; |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
487 supported = true; |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
488 break; |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
489 |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
490 case DIMSE_C_FIND_RQ: |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
491 request = DicomRequestType_Find; |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
492 supported = true; |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
493 break; |
0 | 494 |
620
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
495 default: |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
496 // we cannot handle this kind of message |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
497 cond = DIMSE_BADCOMMANDTYPE; |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
498 LOG(ERROR) << "cannot handle command: 0x" << std::hex << msg.CommandField; |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
499 break; |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
500 } |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
501 |
0 | 502 |
620
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
503 // Check whether this request is allowed by the security filter |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
504 if (supported && |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
505 filter_ != NULL && |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
506 !filter_->IsAllowedRequest(callingIP_, callingAETitle_, request)) |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
507 { |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
508 LOG(ERROR) << EnumerationToString(request) |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
509 << " requests are disallowed for the AET \"" |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
510 << callingAETitle_ << "\""; |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
511 cond = DIMSE_BADCOMMANDTYPE; |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
512 supported = false; |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
513 } |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
514 |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
515 // in case we received a supported message, process this command |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
516 if (supported) |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
517 { |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
518 // If anything goes wrong, there will be a "BADCOMMANDTYPE" answer |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
519 cond = DIMSE_BADCOMMANDTYPE; |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
520 |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
521 switch (request) |
0 | 522 { |
620
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
523 case DicomRequestType_Echo: |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
524 cond = EchoScp(assoc_, &msg, presID); |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
525 break; |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
526 |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
527 case DicomRequestType_Store: |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
528 if (server_.HasStoreRequestHandlerFactory()) // Should always be true |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
529 { |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
530 std::auto_ptr<IStoreRequestHandler> handler |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
531 (server_.GetStoreRequestHandlerFactory().ConstructStoreRequestHandler()); |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
532 cond = Internals::storeScp(assoc_, &msg, presID, *handler); |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
533 } |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
534 break; |
0 | 535 |
620
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
536 case DicomRequestType_Move: |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
537 if (server_.HasMoveRequestHandlerFactory()) // Should always be true |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
538 { |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
539 std::auto_ptr<IMoveRequestHandler> handler |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
540 (server_.GetMoveRequestHandlerFactory().ConstructMoveRequestHandler()); |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
541 cond = Internals::moveScp(assoc_, &msg, presID, *handler); |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
542 } |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
543 break; |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
544 |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
545 case DicomRequestType_Find: |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
546 if (server_.HasFindRequestHandlerFactory()) // Should always be true |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
547 { |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
548 std::auto_ptr<IFindRequestHandler> handler |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
549 (server_.GetFindRequestHandlerFactory().ConstructFindRequestHandler()); |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
550 cond = Internals::findScp(assoc_, &msg, presID, *handler); |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
551 } |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
552 break; |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
553 |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
554 default: |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
555 // Should never happen |
4aa6f0d79947
security filter for dicom requests
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
503
diff
changeset
|
556 break; |
0 | 557 } |
558 } | |
559 } | |
560 else | |
561 { | |
562 // Bad status, which indicates the closing of the connection by | |
563 // the peer or a network error | |
564 finished = true; | |
565 } | |
566 | |
567 if (finished) | |
568 { | |
569 if (cond == DUL_PEERREQUESTEDRELEASE) | |
570 { | |
102
7593b57dc1bf
switch to google log
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
101
diff
changeset
|
571 LOG(INFO) << "Association Release"; |
0 | 572 ASC_acknowledgeRelease(assoc_); |
573 } | |
574 else if (cond == DUL_PEERABORTEDASSOCIATION) | |
575 { | |
102
7593b57dc1bf
switch to google log
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
101
diff
changeset
|
576 LOG(INFO) << "Association Aborted"; |
0 | 577 } |
578 else | |
579 { | |
580 OFString temp_str; | |
102
7593b57dc1bf
switch to google log
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
101
diff
changeset
|
581 LOG(ERROR) << "DIMSE failure (aborting association): " << cond.text(); |
0 | 582 /* some kind of error so abort the association */ |
583 ASC_abortAssociation(assoc_); | |
584 } | |
585 } | |
586 | |
587 return !finished; | |
588 } | |
589 | |
590 | |
591 OFCondition EchoScp( T_ASC_Association * assoc, T_DIMSE_Message * msg, T_ASC_PresentationContextID presID) | |
592 { | |
593 OFString temp_str; | |
102
7593b57dc1bf
switch to google log
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
101
diff
changeset
|
594 LOG(INFO) << "Received Echo Request"; |
7593b57dc1bf
switch to google log
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
101
diff
changeset
|
595 //LOG(DEBUG) << DIMSE_dumpMessage(temp_str, msg->msg.CEchoRQ, DIMSE_INCOMING, NULL, presID)); |
0 | 596 |
597 /* the echo succeeded !! */ | |
598 OFCondition cond = DIMSE_sendEchoResponse(assoc, presID, &msg->msg.CEchoRQ, STATUS_Success, NULL); | |
599 if (cond.bad()) | |
600 { | |
102
7593b57dc1bf
switch to google log
Sebastien Jodogne <s.jodogne@gmail.com>
parents:
101
diff
changeset
|
601 LOG(ERROR) << "Echo SCP Failed: " << cond.text(); |
0 | 602 } |
603 return cond; | |
604 } | |
605 } | |
606 } |