Home

Awesome

Microsoft Azure IoTCentral SDK for Python

Join the chat at https://gitter.im/iotdisc/community Licensed under the MIT License PyPI version

An Azure IoT Central device client library written in Python.

This repository contains code for the Azure IoT Central SDK for Python. This enables python developers to easily create device solutions that semealessly connect to Azure IoT Central applications. It hides some of the complexities of the official Azure IoT SDK and uses IoT Central naming conventions.

Disclaimer

This library is experimental and has the purpose of providing an easy to use solution for prototyping and small projects. Its use in production is discouraged. The library is going to be archived soon so we suggest new developments to start using official Azure IoT SDK.

Please refer to Azure IoT Python SDK when building production products.

If you're looking for the v0.x.x client library, it is now preserved here. Latest version on pypi is 0.3.9

Prerequisites

Installing iotc

pip install iotc

These clients are available with an asynchronous API, as well as a blocking synchronous API for compatibility scenarios. We recommend you use Python 3.7+ and the asynchronous API.

Python VersionAsynchronous APISynchronous API
Python 3.5.3+YESYES
Python 2.7NOYES

Samples

Check out the sample repository for example code showing how the SDK can be used in the various scenarios:

The following samples are legacy samples, they work with the sycnhronous API intended for use with Python 2.7, or in compatibility scenarios with later versions. We recommend you use the asynchronous API and Python3 samples above instead.

Samples by default parse a configuration file including required credentials. Just create a file called samples.ini inside the samples folder with a content like this:

[DEVICE_A]
ScopeId = scopeid
DeviceId = deviceid
; either one or the other or nothing if running with certificates
DeviceKey = device_key
GroupKey = group_key
; none if running with keys
CertFilePath = path_to_cert_file
KeyFilePath = path_to_key_file
CertPassphrase = optional password

The configuration file can include one or more sections representing device connection details. Section names must match references in the sample file.

Run samples with local changes

It is possible to run samples against the local copy of the device client. This is particularly useful when testing patches not yet published upstream. Just add an entry to samples.ini in the DEFAULT section:

[DEFAULT]
Local = yes

Importing the module

Sync client (Python 2.7+ and 3.7+) can be imported in this way:

from iotc import IoTCClient

Async client (with asyncio for Python 3.7+ only) can be imported like this:

from iotc.aio import IoTCClient

Connecting

X509

scope_id = 'scope_id';
device_id = 'device_id';
key = {'certFile':'<CERT_CHAIN_FILE_PATH>','keyFile':'<CERT_KEY_FILE_PATH>','certPhrase':'<CERT_PASSWORD>'}

iotc = IoTCClient(device_id, scope_id,
                  IOTCConnectType.IOTC_CONNECT_X509_CERT, key)

IOTCConnectType enum can be imported from the same module of IoTCClient

'certPhrase' is optional and represents the password for the certificate if any

A handy tool to generate self-signed certificates in order to test x509 authentication can be found in the IoTCentral Node.JS SDK here.

SAS

scopeId = 'scopeID'
device_id = 'device_id'
sasKey = 'masterKey' # or use device key directly

iotc = IoTCClient(device_id, scopeId,
                  IOTCConnectType.IOTC_CONNECT_SYMM_KEY, sas_key)

IOTCConnectType enum can be imported from the same module of IoTCClient

Connect

Sync

iotc.connect()

Async

await iotc.connect()

After successfull connection, IOTC context is available for further commands.

Reconnection

The device client automatically handle reconnection in case of network failures or disconnections. However if process runs for long time (e.g. unmonitored devices) a reconnection might fail because of credentials expiration.

To control reconnection and reset credentials the function is_connected() is available and can be used to test connection status inside a loop or before running operations.

e.g.

retry = 0 # stop reconnection attempts
while true:
    if iotc.is_connected():
        # do something
    else
        if retry == 10:
            sys.exit("error")
        retry += 1
        iotc.connect()

Cache Credentials

The IoT Central device client accepts a storage manager to cache connection credentials. This allows to skip unnecessary device re-provisioning and requests to provisioning service. When valid credentials are present, device connects directly to IoT Central, otherwise it asks provisioning service for new credentials and eventually cache them.

Provided class must extend Storage abstract class.

class FileStorage(Storage):
    def __init__(self):
        # initialize file read
        ...
    def retrieve(self):
        # read from file
        ...
        return CredentialsCache(
            hub_name,
            device_id,
            key,
        )
    def persist(self, credentials):
        # write to file
        ...

Operations

Send telemetry

e.g. Send telemetry every 3 seconds

while iotc.is_connected():
        await iotc.send_telemetry({
            'accelerometerX': str(randint(20, 45)),
            'accelerometerY': str(randint(20, 45)),
            "accelerometerZ": str(randint(20, 45))
        })
        time.sleep(3)

An optional properties object can be included in the send methods, to specify additional properties for the message (e.g. timestamp,etc... ). Properties can be custom or part of the reserved ones (see list here).

Payload content type and encoding are set by default to 'application/json' and 'utf-8'. Alternative values can be set using these functions:<br/> iotc.set_content_type(content_type) # .e.g 'text/plain' iotc.set_content_encoding(content_encoding) # .e.g 'ascii'

Send property update

iotc.send_property({'fieldName':'fieldValue'})

Listen to properties update

iotc.on(IOTCEvents.IOTC_PROPERTIES, callback)

To provide setting sync aknowledgement, the callback must reply True if the new value has been applied or False otherwise

async def on_props(prop_name, prop_value):
    print(prop_value)
    return True

iotc.on(IOTCEvents.IOTC_PROPERTIES, on_props)

Listen to commands

iotc.on(IOTCEvents.IOTC_COMMAND, callback)

To provide feedbacks for the command like execution result or progress, the client can call the ack function available in the callback.

The function accepts 3 arguments: command name, a custom response message and the request id for which the ack applies.

async def on_commands(command, ack):
    print(command.name)
    await ack(command.name, 'Command received', command.request_id)

Logging

The default log prints to console operations status and errors. This is the IOTC_LOGGING_API_ONLY logging level. The function set_log_level() can be used to change options or disable logs. It accepts a IOTCLogLevel value among the following:

The device client also accepts an optional Logger instance to redirect logs to other targets than console. The custom class must implement three methods:

One-touch device provisioning and approval

A device can send custom data during provision process: if a device is aware of its IoT Central template Id, then it can be automatically provisioned.

How to set IoTC template ID in your device

Template Id can be found in the device explorer page of IoTCentral Img

Then call this method before connect():

iotc.set_model_id('<modelId>')

Manual approval (default)

By default device auto-approval in IoT Central is disabled, which means that administrator needs to approve the device registration to complete the provisioning process. This can be done from explorer page after selecting the device Img

Automatic approval

To change default behavior, administrator can enable device auto-approval from Device Connection page under the Administration section. With automatic approval a device can be provisioned without any manual action and can start sending/receiving data after status changes to "Provisioned"

Img

License

This samples is licensed with the MIT license. For more information, see LICENSE