This repository contains the components library and a running application in Rust for IoT MQTT messaging, Fleet Provisioning and Device Shadow.
The graphics shows the basic design, where the currently implemented components are indicated with continuous lines.
These components implement following functionality:
device_shadow
iot_shadow
For details see the IoT Bridge code documentation at artifacts download.
The IoT Bridge uses extensively the asynchronous multi-thread processing. The task interactions are summarized in the graphic below.
Remark: The device_interface
and iot_interface
are not explicit IoT Bridge tasks, but rather the corresponding connections to the corresponding messaging interfaces.
```mermaid sequenceDiagram participant DI as deviceinterface participant DM as devicemonitorthread participant DR as devicereceiverthread participant DS as deviceshadowthread participant IS as iotshadowthread participant IT as iottransmitterthread participant IR as iotreceiverthread participant IM as iotmonitorthread participant II as iotinterface
II-)IM: receive MQTT message IM-)IR: receive event IR->>IR: connectoraws::oniotevent alt event for IoT Shadow IR-)IT: send response to IoT IR-)IS: send shadow value IS->>IS: trigger cert rotation else event for Device Shadow IR-)IT: send response to IoT IR-)DS: send shadow value DS->>DS: deviceadapter::onreceivedevice_shadow end
DI-)DM: receive MQTT message DM-)DR: receive event DR->>DR: deviceadapter::ondevice_event DR-)IT: send device message to IoT IT-)II: send MQTT device message to IoT
```
Based on the Reference Architecture in DEVICE SHADOWS - MQTT TOPICS.
This implementation differentiates between the Device State (an object as Rust struct
) and the Local Shadow (a copy of Device State as serde_json::Value
with additional info)
The sequence diagram below covers the main "positive" cases (i.e., no rejection).
Observation: UPDATEDELTA is not send when the value of an attribute is set to null
._
```mermaid sequenceDiagram participant D as Device State participant I as IoT Bridge participant L as Shadow @ Device participant R as Shadow @ Cloud participant C as Cloud Application
Note right of L: Shadow Subscription L-)R: SUBSCRIBE (UPDATEACCEPTED, UPDATEREJECTED, UPDATE_DELTA)
Note right of L: Fleet Provisioning I-)R: UPDATE[reported] (Initialize IoT Bridge / Connector State Shadow at Provisioning with Defaults) I-)R: UPDATE[desired & reported] (Initialize Device State Shadow at Provisioning with Defaults) R-)L: UPDATE_ACCEPTED (Device State) L->>D: Transform & Store
Note right of L: IoT Bridge Start I-)R: UPDATE[reported] (Send IoT Bridge / Connector State) L-)R: GET (Get Device State Shadow at Start) R-)L: GET_ACCEPTED L->>D: Transform & Store
Note right of L: Change by Cloud Application (filtering / mapping) C->>R: UPDATE[desired] (filter/map change) R-)L: UPDATE_DELTA (Device State Shadow) par Shadow@Device to Shadow@Cloud L-)R: UPDATE[reported] (Device State Shadow) and Shadow@Device to Device State L-)D: Transform & Store end
Note right of L: Certificate Rotation by Cloud Application C->>R: UPDATE[desired] (cert rotation request) R-)L: UPDATE_DELTA (IoT Bridge / Connector State Shadow) par Shadow@Device to Shadow@Cloud L-)R: UPDATE[reported] (IoT Bridge / Connector State Shadow) and Shadow@Device to IoT Bridge / Connector L-)I: Initiate Certificate Rotation end I->>I: Execute Certificate Rotation ```
The IoT Bridge configuration section device
is specific for the device and will not be discussed here.
The iot
section configures the connectivity to the IoT infrastructure -- below focusing on the AWS solutions.
All values below are placeholders only -- replace with your proprietary values.
These elements can be left as defined if not specific requirements need to be considered.
yaml
shadow_name: iot_shadow
client_registration_status: INITIAL
ca_path: AmazonRootCA1.pem
The elements below are specific to the IoT connection of a group / a fleet of devices:
yaml
iot_topic_prefix: SPDIF/X320/16A8/
client_id: 16A8_99998
endpoint: ENDPOINTID-ats.iot.eu-central-1.amazonaws.com
port: 8883
For the AWS Fleet Provisioning the listed below elements of the configuration should be prepared and stored correspondingly, e.g., in the device-iot.config/certs
folder:
yaml
claim_cert_path: ClaimCertificate.pem
claim_priv_key_path: ClaimPrivateKey.pem
claim_pub_key_path: ClaimPubKey.pem
Additionally the Fleet Provisioning template is required and should be referenced (e.g., provisioning_template_name: iot-16A8-prov-templ
) and the corresponding provisioning policies and device policies defined. See AWS documentation for details.
The registration status client_registration_status: INITIAL
triggers the Fleet Provisioning. After successful registration the state changes to REGISTERED:thingname
The below listed client (device instance) specific elements will be generated during the Fleet Provisioning
yaml
client_cert_path: IotCertificate.pem
client_priv_key_path: IotPrivateKey.pem
client_pub_key_path: IotPubKey.pem