Index of /docs/2.4.0/celix/bundles/pubsub

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[DIR]pubsub_admin_udp_mc/2024-05-01 04:32 -  
[DIR]examples/2023-10-07 11:38 -  

Publisher / subscriber implementation / Apache Celix Fork me on GitHub
Edit on GitHub << back to documentation

Publisher / subscriber implementation

This subdirectory contains an implementation for a publish-subscribe remote services system, that use dfi library for message serialization. For low-level communication, TCP, UDP and ZMQ is used.

Description

This publisher / subscriber implementation is based on the concepts of the remote service admin (i.e. rsa / topology / discovery pattern).

Publishers are senders of data, subscribers can receive data. Publishers can publish/send data to certain channels (called ’topics’ further on), subscribers can subscribe to these topics. For every topic a publisher service is created by the pubsub admin. This publisher is announced through etcd. So etcd is used for discovery of the publishers. Subscribers are also registered as a service by the pubsub admin and will watch etcd for changes and when a new publisher is announced, the subscriber will check if the topic matches its interests. If the subscriber is interested in/subscribed to a certain topic, a connection between publisher and subscriber will be instantiated by the pubsub admin.

The dfi library is used for message serialization. The publisher / subscriber implementation will arrange that every message which will be send gets an unique id.

For communication between publishers and subscribers TCP, UDP and ZeroMQ can be used. When using ZeroMQ it’s also possible to setup a secure connection to encrypt the traffic being send between publishers and subscribers. This connection can be secured with ZeroMQ by using a curve25519 key pair per topic.

The publisher/subscriber implementation supports sending of a single message and sending of multipart messages.

Getting started

The publisher/subscriber implementation contains 3 different PubSubAdmins for managing connections:

  • PubsubAdminUDP: This pubsub admin is using udp (multicast) linux sockets to setup a connection.
  • PubsubAdminTCP: This pubsub admin is using tcp linux sockets to setup a connection.
  • PubsubAdminZMQ (LGPL License): This pubsub admin is using ZeroMQ and is disabled as default. This is a because the pubsub admin is using ZeroMQ which is licensed as LGPL (View ZeroMQ License).

The ZeroMQ pubsub admin can be enabled by specifying the build flag BUILD_PUBSUB_PSA_ZMQ=ON. To get the ZeroMQ pubsub admin running, ZeroMQ and CZMQ need to be installed. Also, to make use of encrypted traffic, OpenSSL is required.

Running instructions

Running PSA UDP-Multicast

  1. Open a terminal
  2. Run etcd
  3. Open second terminal on project build location
  4. Run cd deploy/pubsub/pubsub_publisher_udp_mc
  5. Run sh run.sh
  6. Open third terminal on project build location
  7. Run cd deploy/pubsub/pubsub_subscriber_udp_mc
  8. Run sh run.sh

Design information can be found at pubsub_admin_udp_mc/README.md

Running PSA TCP

  1. Open a terminal
  2. Run cd runtimes/pubsub/tcp
  3. Run sh start.sh

Properties PSA TCP

Some properties can be set to configure the PSA-TCP. If not configured defaults will be used. These properties can be set in the config.properties file (= format)

PSA_IP                              The url address to be used by the TCP admin to publish its data. Default the first IP not on localhost
                                    This can be hostname / IP address / IP address with postfix, e.g. 192.168.1.0/24

Running PSA ZMQ

For ZeroMQ without encryption, skip the steps 1-12 below

  1. Run touch ~/pubsub.keys
  2. Run echo "aes_key:{AES_KEY here}" >> ~/pubsub.keys. Note that AES_KEY is just a sequence of random bytes. To generate such a key, you can use the command cat /dev/urandom | hexdump -v -e '/1 "%02X"' | head -c 32 (this will take out of /dev/urandom 16 bytes, thus a 128bit key)
  3. Run echo "aes_iv:{AES_IV here}" >> ~/pubsub.keys. Note that AES_IV is just a sequence of random bytes. To generate such an initial vector , you can use the command cat /dev/urandom | hexdump -v -e '/1 "%02X"' | head -c 16 (this will take out of /dev/urandom 8 bytes, thus a 64bit initial vector)
  4. Run touch ~/pubsub.conf
  5. Run echo "keys.file.path=$HOME" >> ~/pubsub.conf
  6. Run echo "keys.file.name=pubsub.keys" >> ~/pubsub.conf
  7. Generate ZMQ keypairs by running pubsub/keygen/makecert pub_<topic_name>.pub pub_<topic_name>.key
  8. Encrypt the private key file using pubsub/keygen/ed_file ~/pubsub.keys pub_<topic_name>.key pub_<topic>.key.enc
  9. Store the keys in the pubsub/examples/keys/ directory, as described in the pubsub/examples/keys/README.
  10. Build project to include these keys (check the CMakeLists.txt files to be sure that the keys are included in the bundles)
  11. Add to the config.properties the property SECURE_TOPICS=<list_of_secure_topics>

For ZeroMQ without encryption, start here

  1. Run etcd
  2. Open second terminal on pubsub root
  3. Run cd deploy/pubsub/pubsub_publisher_zmq
  4. Run cat ~/pubsub.conf >> config.properties (only for ZeroMQ with encryption)
  5. Run sh run.sh
  6. Open third terminal on pubsub root
  7. Run cd deploy/pubsub/pubsub_subscriber_zmq
  8. Run cat ~/pubsub.conf >> config.properties (only for ZeroMQ with encryption)
  9. Run sh run.sh

Properties PSA ZMQ

Some properties can be set to configure the PSA-ZMQ. If not configured defaults will be used. These properties can be set in the config.properties file (= format)

PSA_IP                              The local IP address to be used by the ZMQ admin to publish its data. Default the first IP not on localhost
PSA_INTERFACE                       The local ethernet interface to be used by the ZMQ admin to publish its data (ie eth0). Default the first non localhost interface
PSA_ZMQ_RECEIVE_TIMEOUT_MICROSEC    Set the polling interval of the ZMQ receive thread. Default 1ms