Google Cloud IoT JWT
This is an example of how to generate JSON Web Token (JWT) credentials for connecting to Google Cloud IoT Core.
This contains two parts: a library to make a JWT (json web token) which is used to authenticate with Google Cloud IoT, and Arduino sketches that demonstrate how to connect to Google Cloud IoT using the available MQTT bridge.
This example is not an officially supported Google product, does not have a SLA/SLO, and should not be used in production.
Supported hardware targets
Currently, we support the following hardware targets:
- Genuino MKR1000 and WiFi1010
- Espressif ESP32
- Espressif ESP8266
Dependencies
Some examples use specific dependencies that need to be installed via the Arduino Library manager.
Quickstart
First, install the library using the Arduino Library Manager.
- Open Arduino and select the Sketch > Include Library > Library Manager menu item.
- In the filter box, search for "Google Cloud IoT JWT".
- Install the library
Next, enable the Cloud IoT Core API by opening the Google Cloud IoT Core console.
Next, create your device registry as described in the Quickstart or by using the Google Cloud SDK.
If you're using the SDK, the following commands will setup PubSub and Cloud IoT Core for testing on your Arduino device:
Create the PubSub topic and subscription:
gcloud pubsub topics create atest-pub --project=YOUR_PROJECT_ID
gcloud pubsub subscriptions create atest-sub --topic=atest-pub
Create the Cloud IoT Core registry:
gcloud iot registries create atest-registry \
--region=us-central1 --event-notification-config=topic=atest-pub
Generate an Eliptic Curve (EC) private / public key pair:
openssl ecparam -genkey -name prime256v1 -noout -out ec_private.pem
openssl ec -in ec_private.pem -pubout -out ec_public.pem
Register the device using the keys you generated:
gcloud iot devices create atest-dev --region=us-central1 \
--registry=atest-registry \
--public-key path=ec_public.pem,type=es256
At this point, your registry is created and your device has been added to the registry so you're ready to connect it.
Select one of the available samples from the File > Examples > Google Cloud IoT Core JWT menu and find the configuration section (ciotc_config.h in newer examples).
Find and replace the following values first:
- Project ID (get from console or
gcloud config list
) - Location (default is
us-central1
) - Registry ID (created in previous steps, e.g.
atest-reg
) - Device ID (created in previous steps, e.g.
atest-device
)
You will also need to extract your private key using the following command:
openssl ec -in ec_private.pem -noout -text
... and will need to copy the output for the private key bytes into the private key string in your Arduino project.
When you run the sample, the device will connect and receive configuration from Cloud IoT Core. When you change the configuration in the Cloud IoT Core console, that configuration will be reflrected on the device.
Before the examples will work, you will also need to configure the root certificate as described in the configuration headers.
After you have published telemetry data, you can read it from the PubSub topic using the Google Cloud SDK. With the SDK installed, run the following command to create a :
gcloud pubsub subscriptions create <your-subscription-name> --topic=<your-iot-pubsub-topic>
Then read the telemetry messages:
gcloud pubsub subscriptions pull --limit 500 --auto-ack <your-subscription-name>
Notes on the certificate
The root certificate from Google is used to verify communication to Google. Although unlikely, it's possible for the certificate to expire or rotate, requiring you to update it.
If you're using the ESP8266 project, you need to either install the Certificate to SPIFFS
using the SPIFFS upload utility or
will need to uncomment the certificate bytes in the sample. Note that the SPIFFS utility simply
uploads the files stored in the data subfolder. The sample assumes the file is called ca.crt
:
βββ Esp8266...
βΒ Β βββ data
βΒ Β βΒ Β βββ ca.crt
To convert the certificate to the DER format, the following command shuold be used:
wget pki.goog/roots.pem
openssl x509 -outform der -in roots.pem -out ca.crt
If you're using the ESP32, you can paste the certificate bytes (don't forget the \n characters) into the sample. You can use any of the root certificate bytes for the certificates with Google Trust Services (GTS) as the certificate authority (CA). This is easy to get using curl, e.g.
curl pki.goog/roots.pem
If you're using Genuino boards like the MKR1000, you will need to add SSL certificates to your
board as described on Hackster.io.
The MQTT server address is mqtt.googleapis.com
and the port is either 8883
for most cases or 443
in
case your device is running in an environment where port 8883 is blocked. For long-term support,
the server is mqtt.2030.ltsapis.goog
.
In future versions of this library, the MQTT domain and certificates will be changed for long term support (LTS) to:
- MQTT LTS Domain - mqtt.2030.ltsapis.goog
- Primary cert - https://pki.goog/gtsltsr/gtsltsr.crt
- Backup cert - https://pki.goog/gsr4/GSR4.crt
The following examples show how to regenerate the certificates:
Create Registry keys
openssl genpkey -algorithm RSA -out ca_private_registry.pem -pkeyopt rsa_keygen_bits:2048
sudo openssl req -x509 -new -nodes -key ca_private_registry.pem -sha256 -out ca_cert_registry.pem -subj "/CN=unused"
gcloud iot registries credentials create --path=ca_cert_registry.pem --project=secret --registry=secret --region=us-central1
Create Elipitic device keys
openssl ecparam -genkey -name prime256v1 -noout -out ec_private_device1.pem
sudo openssl req -new -sha256 -key ec_private_device1.pem -out ec_cert_device1.csr -subj "/CN=unused-device"
sudo openssl x509 -req -in ec_cert_device1.csr -CA ca_cert_registry.pem -CAkey ca_private_registry.pem -CAcreateserial -sha256 -out ec_cert_device1.pem
gcloud iot devices create device1 --region=us-central1 --registry=secret --public-key path=ec_cert_device1.pem,type=es256-x509-pem
Print info to copy to code
openssl ec -in ec_private_device1.pem -noout -text
echo "Copy private part of above to esp8266 code"
For more information
- Access Google Cloud IoT Core from Arduino
- Building Google Cloud-Connected Sensors
- Arduino and Google Cloud IoT
- Experimenting with Robots and Cloud IoT Core
- Arduino Hexspider Revisited
- TBD FAQ
- As featured in Google Cloud I/O 2018
Demos
You can see the Arduino client library in action in the Cloud IoT Demo from Google I/O 2018
Error codes, Debugging, and Troubleshooting
The error codes for the lwMQTT library are listed in this header file.
If you're having trouble determining what's wrong, it may be helpful to enable more verbose debugging in Arduino by setting the debug level in the IDE under Tools > Core Debug Level > Verbose.
If you are using newer versions of the ESP8266 SDK, you need to set SSL support to "All SSL Cyphers" and you may need to modify the memory settings in BearSSL by modifying Arduino/cores/esp8266/StackThunk.cpp.
A few things worth checking while troubleshooting:
- Is billing enabled for your project?
- Is the PubSub topic configured with your device registry valid?
- Is the JWT valid?
- Are the values setup in
ciotc_config.h
appearing correctly in*_mqtt.h
?
Known issues
Some private keys do not correctly encode to the Base64 format that required for the device bridge. If you've tried everything else, try regenerating your device credentials and registering your device again with
gcloud iot devices create ...
Some users have encountered issues with certain versions of the Community SDK for Espressif, if you've tried everything else, try using the SDK 2.4.2.
License
Apache 2.0; see LICENSE for details.
Disclaimer
This project is not an official Google project. It is not supported by Google and Google specifically disclaims all warranties as to its quality, merchantability, or fitness for a particular purpose.