Skip to content

Commit

Permalink
Update Paho to latest version (#186)
Browse files Browse the repository at this point in the history
Updates Paho to version 1.2.4 and adds documentation on the maximum in-flight message issue.
  • Loading branch information
TwistedTwigleg authored Aug 18, 2022
1 parent 4a19719 commit 57ee0c9
Show file tree
Hide file tree
Showing 2 changed files with 117 additions and 69 deletions.
184 changes: 116 additions & 68 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -5,11 +5,11 @@ A new AWS IoT Device SDK is [now available](https://github.com/awslabs/aws-iot-d
This SDK will no longer receive feature updates, but will receive security updates.

# AWS IoT Device SDK for Java
The **AWS IoT Device SDK for Java** enables Java developers to access the AWS
IoT Platform through [MQTT or MQTT over the WebSocket protocol][aws-iot-protocol].
The SDK is built with [AWS IoT device shadow support][aws-iot-thing], providing
The **AWS IoT Device SDK for Java** enables Java developers to access the AWS
IoT Platform through [MQTT or MQTT over the WebSocket protocol][aws-iot-protocol].
The SDK is built with [AWS IoT device shadow support][aws-iot-thing], providing
access to thing shadows (sometimes referred to as device shadows) using shadow methods, including GET, UPDATE, and DELETE.
It also supports a simplified shadow access model, which allows developers to
It also supports a simplified shadow access model, which allows developers to
exchange data with their shadows by just using getter and setter methods without
having to serialize or deserialize any JSON documents.

Expand All @@ -24,8 +24,8 @@ To get started, use the Maven repository or download the [latest JAR file][lates
* [Support](#support)

## Overview
This document provides instructions for installing and configuring the AWS
IoT device SDK for Java. It also includes some examples that demonstrate the use of different
This document provides instructions for installing and configuring the AWS
IoT device SDK for Java. It also includes some examples that demonstrate the use of different
APIs.

### MQTT Connection Types
Expand All @@ -36,44 +36,44 @@ the AWS IoT service:
* MQTT (over TLS 1.2) with X.509 certificate-based mutual authentication
* MQTT over WebSocket with AWS Signature Version 4 authentication

For MQTT over TLS (port 8883), a valid certificate and private key are required
For MQTT over TLS (port 8883), a valid certificate and private key are required
for authentication. For MQTT over WebSocket (port 443), a valid AWS Identity and Access Management (IAM)
access key ID and secret access key pair is required for authentication.

### Thing Shadows
A thing shadow represents the cloud counterpart of a physical device or thing.
A thing shadow represents the cloud counterpart of a physical device or thing.
Although a device is not always online, its thing shadow is. A thing shadow
stores data in and out of the device in a JSON based document. When the device is offline, its shadow document is still
accessible to the application. When the device comes back online,
accessible to the application. When the device comes back online,
the thing shadow publishes the delta to the device (which the device didn't
see while it was offline).
see while it was offline).

The SDK implements the protocol for applications to retrieve, update, and
delete shadow documents mentioned [here][aws-iot-thing].
The SDK implements the protocol for applications to retrieve, update, and
delete shadow documents mentioned [here][aws-iot-thing].
When you use the simplified access model, you have the option to enable strict document versioning. To reduce the overhead of subscribing to shadow topics
for each method requested, the SDK automatically subscribes to all of the method
for each method requested, the SDK automatically subscribes to all of the method
topics when a connection is established.

#### Simplified Shadow Access Model
Unlike the shadow methods, which operate on JSON documents, the simplified
shadow access model allows developers to access their shadows with getter and
setter methods.
Unlike the shadow methods, which operate on JSON documents, the simplified
shadow access model allows developers to access their shadows with getter and
setter methods.

To use this feature, you must extend the device class ```AWSIotDevice```,
use the annotation ```AWSIotDeviceProperty``` to mark class member variables to be
managed by the SDK, and provide getter and setter methods for accessing these
managed by the SDK, and provide getter and setter methods for accessing these
variables. The getter methods will be used by the SDK to report to the shadow
periodically. The setter methods will be invoked whenever there is a change
periodically. The setter methods will be invoked whenever there is a change
to the desired state of the shadow document. For more information, see [Use the SDK](#use-the-sdk)
later in this document.

## Install the SDK

### Minimum Requirements
To use the SDK, you will need Java 1.7+.
To use the SDK, you will need Java 1.7+.

### Install the SDK Using Maven
The recommended way to use the AWS IoT Device SDK for Java in your project is
The recommended way to use the AWS IoT Device SDK for Java in your project is
to consume it from Maven. Simply add the following dependency to the POM file
of your Maven project.

Expand All @@ -100,17 +100,17 @@ The sample applications included with the SDK can also be installed using the fo
```

### Install the SDK Using the Latest JAR
The latest JAR files can be downloaded [here][latest-jar]. You can simply extract
The latest JAR files can be downloaded [here][latest-jar]. You can simply extract
and copy the JAR files to your project's library directory, and then update your IDE to
include them to your library build path.
include them to your library build path.

You will also need to add two libraries the SDK depends on:
* Jackson 2.x, including [Jackson-core] [jackson-core] and [Jackson-databind] [jackson-databind]
* Jackson 2.x, including [Jackson-core] [jackson-core] and [Jackson-databind] [jackson-databind]
* Paho MQTT client for Java 1.1.x. [download instructions][paho-mqtt-java-download]

### Build the SDK from the GitHub Source
You can build both the SDK and its sample applications from the source
hosted at GitHub.
You can build both the SDK and its sample applications from the source
hosted at GitHub.

```sh
$ git clone https://github.com/aws/aws-iot-device-sdk-java.git
Expand All @@ -119,19 +119,19 @@ $ mvn clean install -Dgpg.skip=true
```

## Use the SDK
The following sections provide some basic examples of using the SDK to access the
The following sections provide some basic examples of using the SDK to access the
AWS IoT service over MQTT. For more information about each API, see the [API documentation][api-docs].

### Initialize the Client
To access the AWS IoT service, you must initialize ```AWSIotMqttClient```. The
To access the AWS IoT service, you must initialize ```AWSIotMqttClient```. The
way in which you initialize the client depends on the connection
type (MQTT or MQTT over WebSocket) you choose. In both cases,
a valid client endpoint and client ID are required for setting up the connection.
a valid client endpoint and client ID are required for setting up the connection.

* Initialize the Client with MQTT (over TLS 1.2):
For this MQTT connection type (port 8883), the AWS IoT service requires TLS
For this MQTT connection type (port 8883), the AWS IoT service requires TLS
mutual authentication, so a valid client certificate (X.509)
and RSA keys are required. You can use the
and RSA keys are required. You can use the
[AWS IoT console][aws-iot-console] or the AWS command line tools to generate certificates and keys. For the SDK,
only a certificate file and private key file are required.

Expand All @@ -151,13 +151,13 @@ client.connect();
```

* Initialize the Client with MQTT Over WebSocket:
For this MQTT connection type (port 443), you will need valid IAM credentials
to initialize the client. This includes an AWS access key ID and secret
access key. There are a number of ways to get IAM credentials (for example, by creating
For this MQTT connection type (port 443), you will need valid IAM credentials
to initialize the client. This includes an AWS access key ID and secret
access key. There are a number of ways to get IAM credentials (for example, by creating
permanent IAM users or by requesting temporary credentials through the Amazon Cognito
service). For more information, see the developer guides for these services.
service). For more information, see the developer guides for these services.

As a best practice for application security, do not embed
As a best practice for application security, do not embed
credentials directly in the source code.

```java
Expand All @@ -169,7 +169,7 @@ AWSIotMqttClient client = new AWSIotMqttClient(clientEndpoint, clientId, awsAcce

// optional parameters can be set before connect()
client.connect();
```
```

### Publish and Subscribe
After the client is initialized and connected, you can publish messages and subscribe
Expand Down Expand Up @@ -238,6 +238,14 @@ MyTopic topic = new MyTopic(topicName, qos);
client.subscribe(topic);
```

**Note**: all operations (publish, subscribe, unsubscribe) will not timeout unless
you define a timeout when performing the operation. If no timeout is defined, then
a value of `0` is used, meaning the operation will never timeout and, in rare cases,
wait forever for the server to respond and block the calling thread indefinitely.
It is recommended to set a timeout for QoS1 operations if your application expects
responses within a fixed duration or if there is the possibility the server you are
communicating with may not respond.

### Shadow Methods
To access a shadow using a blocking API:

Expand Down Expand Up @@ -298,13 +306,13 @@ device.get(message, timeout);
```

### Simplified Shadow Access Model
To use the simplified shadow access model, you need to extend the device class
To use the simplified shadow access model, you need to extend the device class
```AWSIotDevice```, and then use the annotation class ```AWSIotDeviceProperty```
to mark the device attributes and provide getter and setter methods for them.
to mark the device attributes and provide getter and setter methods for them.
The following very simple example has one attribute, ```someValue```, defined.
The code will report the attribute to the shadow, identified by ***thingName***
The code will report the attribute to the shadow, identified by ***thingName***
every 5 seconds, in the ***reported*** section of the shadow document. The SDK
will call the setter method ```setSomeValue()``` whenever there's
will call the setter method ```setSomeValue()``` whenever there's
a change to the ***desired*** section of the shadow document.

```java
Expand Down Expand Up @@ -334,38 +342,38 @@ client.attach(device);
client.connect();
```

### Other Topics
### Other Topics
#### Enable Logging
The SDK uses ```java.util.logging``` for logging. To change
the logging behavior (for example, to change the logging level or logging destination), you can
specify a property file using the JVM property
```java.util.logging.config.file```. It can be provided through JVM arguments like so:
```java.util.logging.config.file```. It can be provided through JVM arguments like so:

```sh
-Djava.util.logging.config.file="logging.properties"
-Djava.util.logging.config.file="logging.properties"
```

To change the console logging level, the property file ***logging.properties***
should contain the following lines:
To change the console logging level, the property file ***logging.properties***
should contain the following lines:

```
# Override of console logging level
java.util.logging.ConsoleHandler.level=INFO
# Override of console logging level
java.util.logging.ConsoleHandler.level=INFO
```

#### Load KeyStore from File to Initialize the Client
You can load a KeyStore object directly from JKS-based keystore files.
You will first need to import X.509 certificate and the private key into the keystore
You will first need to import X.509 certificate and the private key into the keystore
file like so:

```sh
$ openssl pkcs12 -export -in <certificate-file> -inkey <private-key-file> -out p12.keystore -name alias
(type in the export password)

$ keytool -importkeystore -srckeystore p12.keystore -srcstoretype PKCS12 -srcstorepass <export-password> -alias alias -deststorepass <keystore-password> -destkeypass <key-password> -destkeystore my.keystore
$ keytool -importkeystore -srckeystore p12.keystore -srcstoretype PKCS12 -srcstorepass <export-password> -alias alias -deststorepass <keystore-password> -destkeypass <key-password> -destkeystore my.keystore
```

After the keystore file ***my.keystore*** is created, you can use it to
After the keystore file ***my.keystore*** is created, you can use it to
initialize the client like so:

```java
Expand Down Expand Up @@ -400,53 +408,93 @@ with just this one change.
KeyStorePasswordPair pair = SampleUtil.getKeyStorePasswordPair(certificateFile, privateKeyFile, "EC");
```

#### Increase in-flight publish limit (`too many publishes in Progress` error)

If you are getting a `too many publishes in Progress` error this means that your application
has more operations in-flight (meaning they have not succeeded or failed, but they are waiting
for a response from the server) than Paho supports by default.
By default, the Paho client supports a maximum of `10` in-flight operations.

The recommended way to resolve this issue is to track how many QoS1 operations you
have sent that are in-flight and when you reach
the limit of `10`, you add any further operations into a queue. Then as the QoS1 operations
are no longer in-flight you grab QoS1 operations from the queue until it is empty or until you
have hit the maximum of `10` in-flight operations. You then repeat this process until all the operations
are sent. This will prevent your application from ever trying to send too many operations at once and
exceeding the maximum in-flight limit of the Paho client.

Another way to help reduce this issue is to increase the maximum number of in-flight operations
that the Paho client can process. To do this, you will need to modify the source code to increase
this limit. Download the source code from GitHub, navigate to the `AwsIotMqttConnection.java`
file, and add the following line of code in the `buildMqttConnectOptions` function just under
the line `options.setKeepAliveInterval(client.getKeepAliveInterval() / 1000);` (around line `151`):

~~~
options.setMaxInflight(100);
~~~

Then compile the source code and use the compiled Jar in your application.

This will increase Paho's in-flight limit to 100 and allow you to have more in-flight
at the same time, giving additional room for sending larger volumes of QoS1 operations.
Note that these in-flight operations still need to be acknowledged by the server or timeout
before they are no longer in-flight, you can just have up to `100` in-flight rather than
the default of `10`.

For AWS IoT Core, you can only send a maximum of **`100` QoS1 operations per second**.
Any operations sent after the first 100 per second will be
ignored by AWS IoT Core. For this reason, it is **highly** recommended you perform
all operations with a timeout if you increase the maximum in-flight limit, to prevent a situation
where you send more than 100 QoS1 operations per second and are waiting on an operation to get
an acknowledgement from the sever that will never come.

## Sample Applications
There are three samples applications included with the SDK. The easiest way to
run these samples is through Maven, which will take care of getting the
There are three samples applications included with the SDK. The easiest way to
run these samples is through Maven, which will take care of getting the
dependencies.

* Publish/Subscribe sample:
This sample consists of two publishers publishing one message per second to a
topic. One subscriber subscribing to the same topic receives and prints the
messages.
This sample consists of two publishers publishing one message per second to a
topic. One subscriber subscribing to the same topic receives and prints the
messages.

* Shadow sample:
This sample consists of a simple demo of the simplified shadow access
model. The device contains two attributes: window state and room temperature.
Window state can be modified (therefore, controlled) remotely through
***desired*** state. To demonstrate this control function, you can use the AWS
This sample consists of a simple demo of the simplified shadow access
model. The device contains two attributes: window state and room temperature.
Window state can be modified (therefore, controlled) remotely through
***desired*** state. To demonstrate this control function, you can use the AWS
IoT console to modify the desired window state, and then see its change from the
sample output.

* Shadow echo sample:
This sample consists of a simple demo that uses Shadow methods to send a shadow
* Shadow echo sample:
This sample consists of a simple demo that uses Shadow methods to send a shadow
update and then retrieve it back every second.

### Arguments for the Sample Applications
To run the samples, you will also need to provide the following arguments
To run the samples, you will also need to provide the following arguments
through the command line:

* clientEndpoint: client endpoint, obtained via calling describe-endpoint
* clientId: client ID
* thingName: AWS IoT thing name (not required for the Publish/Subscribe sample)

You will also need to provide either set of the following arguments for authentication.
For an MQTT connection, provide these arguments:
For an MQTT connection, provide these arguments:

* certificateFile: X.509 based certificate file (For Just-in-time registration, this
is the concatenated file from both the device certificate and CA certificate. For more information
about Just-in-Time Registration, please see [this blog][Just-in-Time-Registration].
* privateKeyFile: private key file
* keyAlgorithm: (optional) RSA or EC. If not specified, RSA is used.

For an MQTT over WebSocket connection, provide these arguments:
For an MQTT over WebSocket connection, provide these arguments:

* awsAccessKeyId: IAM access key ID
* awsSecretAccessKey: IAM secret access key
* sessionToken: (optional) if temporary credentials are used

### Run the Sample Applications
You can use the following commands to execute the sample applications (assuming
You can use the following commands to execute the sample applications (assuming
TLS mutual authentication is used).

* To run the Publish/Subscribe sample, use the following command:
Expand All @@ -459,20 +507,20 @@ $ mvn exec:java -pl aws-iot-device-sdk-java-samples -Dexec.mainClass="com.amazon
$ mvn exec:java -pl aws-iot-device-sdk-java-samples -Dexec.mainClass="com.amazonaws.services.iot.client.sample.shadow.ShadowSample" -Dexec.args="-clientEndpoint <prefix>-ats.iot.<region>.amazonaws.com -clientId <unique client id> -thingName <thing name> -certificateFile <certificate file> -privateKeyFile <private key file>"
```

* To run the Shadow echo sample, use the following command:
* To run the Shadow echo sample, use the following command:
```sh
$ mvn exec:java -pl aws-iot-device-sdk-java-samples -Dexec.mainClass="com.amazonaws.services.iot.client.sample.shadowEcho.ShadowEchoSample" -Dexec.args="-clientEndpoint <prefix>-ats.iot.<region>.amazonaws.com -clientId <unique client id> -thingName <thing name> -certificateFile <certificate file> -privateKeyFile <private key file>"
```

### Sample Source Code
You can get the sample source code either from the GitHub repository as described
You can get the sample source code either from the GitHub repository as described
[here](#build-the-sdk-from-the-github-source) or from [the latest SDK binary][latest-jar].
They both provide you with Maven project files that you can use to build and run the samples
from the command line or import them into an IDE, such as Eclipse.

The sample source code included with the latest SDK binary is shipped with a modified Maven
project file (pom.xml) that allows you to build the sample source indepedently, without the
need to reference the parent POM file as with the GitHub source tree.
need to reference the parent POM file as with the GitHub source tree.

## API Documentation
You'll find the API documentation for the SDK [here][api-docs].
Expand Down
Loading

0 comments on commit 57ee0c9

Please sign in to comment.