3 releases (breaking)

0.3.0 Apr 29, 2024
0.2.0 Jan 14, 2024
0.1.0 Dec 30, 2023

#116 in WebSocket

Download history 29/week @ 2024-07-29 23/week @ 2024-09-23 75/week @ 2024-09-30 119/week @ 2024-10-07 63/week @ 2024-10-14 119/week @ 2024-10-21 26/week @ 2024-10-28 35/week @ 2024-11-04

243 downloads per month
Used in gneiss-mqtt-aws

Apache-2.0

1MB
17K SLoC

gneiss-mqtt

Rust MQTT5 client implementation.

This project is currently in pre-dev-preview. You can use it, but there's a lot of friction and missing documentation/examples.

Feedback is always welcome. Interested contributors are also welcome.

Spec Compliance Notes

Gneiss-mqtt supports all aspects of the MQTT5 specification with the following exceptions:

  • Extended Utf-8 Validation - No client-side utf-8 validation is done beyond what the Rust standard library does for strings. The MQTT5 specification imposes additional constraints that the Rust standard library does not check.
  • Authentication - There is no API for MQTT5 authentication exchanges. Auth packet encode/decode/validation is implemented, but currently, authentication is assumed to be accomplished via lower-level or custom protocol details (mTLS, websocket upgrade signing, username/password schemes, etc...). Crates for specific authentication styles are coming soon. Authentication exchanges are a long-term roadmap item.
  • Client Queue Receive Maximum Blocking - The MQTT5 spec requires clients to not block non-publish packets when the receive maximum threshold is met by the current session. It is the opinion of the author that this is an unnecessary restriction that wants to express "don't delay acks or pings for receive maximum" but uses something coarser/clumsier because that notion is difficult to express in formal specification language. In gneiss-mqtt, Subscribes and Unsubscribes are also blocked by the receive maximum state. Contrary feedback is welcome here.
  • Broker Forgiveness - The client is not 100% strict on broker behavior validation. While many protocol violations will result in the client closing the connection, not all will. In particular, violations that don't disrupt critical invariants or implementation configurations tend to be allowed. For example, if the broker sends a larger packet size than what the client says was allowed, we do not disconnect. On the other hand, if the broker sends a publish packet with an unknown alias and without a topic, then we do disconnect because we can't handle it. We might revisit this forgiveness in the future and allow for a strict compliance mode, but it is the opinion of the author that rigid/uncompromising compliance validation leads to brittle applications.

Roadmap

See Gneiss MQTT Roadmap

License

This library is licensed under the Apache 2.0 License.

Dependencies

~1–13MB
~179K SLoC