Reliable message bus is a secure communication panel that allows bots
to communicate together in a chat
like way. It makes it very easy to host a service or a set of functions to be used by anyone, even if your service is running behind NAT.
Out of the box RMB provides the following:
- Guarantee authenticity of the messages. You are always sure that the received message is from whoever is pretending to be
- End to End encryption
- Support for 3rd party hosted relays. Anyone can host a relay and people can use it safely since there is no way messages can be inspected while using e2e. That's similar to
home
servers bymatrix
RMB is developed by ThreefoldTech to create a global network of nodes that are available to host capacity. Each node will act like a single bot where you can ask to host your capacity. This enforced a unique set of requirements:
- Communication needed to be reliable
- Minimize and completely eliminate message loss
- Reduce downtime
- Node need to authenticate and authorize calls
- Guarantee identity of the other peer so only owners of data can see it
- Fast request response time
Starting from this we came up with a more detailed requirements:
- User (or rather bots) need their identity maintained by
tfchain
(a blockchain) hence each bot needs an account on tfchain to be able to usermb
- Then each message then can be signed by the
bot
keys, hence make it easy to verify the identity of the sender of a message. This is done both ways. - To support federation (using 3rd party relays) we needed to add e2e encryption to make sure messages that are surfing the public internet can't be sniffed
- e2e encryption is done by deriving an encryption key from the same identity seed, and share the public key on
tfchain
hence it's available to everyone to use
For details about protocol itself please check the docs
There are many ways to use rmb
because it was built for bots
and software to communicate. Hence, there is no mobile app for it for example, but instead a set of libraries where you can use to connect to the network, make chitchats with other bots then exit.
Or you can keep the connection forever to answer other bots requests if you are providing a service.
Then you are in luck, follow the library documentations to implement a service bot, or to make requests to other bots.
- Golang rmb-sdk-go
- Typescript rmb-sdk-ts
In that case:
- Implement a library in your preferred language
- If it's too much to do all the signing, verification, e2e in your language then use
rmb-peer
think of rmb-peer
as a gateway that stands between you and the relay
. rmb-peer
uses your mnemonics (your identity secret key) to assume your identity and it connects to the relay on your behalf, it maintains the connection forever and takes care of
- reconnecting if connection was lost
- verifying received messages
- decrypting received messages
- sending requests on your behalf, taking care of all crypto heavy lifting.
Then it provide a simple (plain-text) api over redis
. means to send messages (or handle requests) you just need to be able to push and pop messages from some redis queues. Messages are simple plain text json.
More details about the structure of the messages are also in the docs page
Please check the latest releases normally you only need the rmb-peer
binary, unless you want to host your own relay.
-
download Rustup and install Rust, run the following in your terminal, then follow the on-screen instructions:
curl --proto '=https' --tlsv1.2 -sSf https://sh.rustup.rs | sh
-
Install the standard library for the target
x86_64-unknown-linux-musl
, which is a Linux platform that uses the musllibc
implementation instead of theglibc
one. This allows you to compile Rust programs that can run on Linux systems that do not have glibc installed, or to create fully static binaries that do not depend on any shared libraries.rustup target add x86_64-unknown-linux-musl
-
To use this target, you also need to install a linker that supports musl, such as
musl-gcc
.sudo apt update sudo apt install musl-tools
You can then pass the
--target=x86_64-unknown-linux-musl
option tocargo build
orcargo run
to compile and run your program for this target. -
Install pre-compiled
protoc
binary to ensure that you’re using the latest release of protoc.PB_REL="https://github.com/protocolbuffers/protobuf/releases" curl -LO $PB_REL/download/v23.4/protoc-23.4-linux-x86_64.zip sudo unzip -d /usr/local protoc-23.4-linux-x86_64.zip protoc --version # Ensure compiler version is updated
-
Redis:
-
Install Redis server using the apt package manager:
sudo apt update sudo apt install redis-server
-
Configure Redis server by editing the
/etc/redis/redis.conf
file (optional) -
Enable Redis server to start automatically on boot:
sudo systemctl enable redis-server
-
Start Redis server using systemd:
sudo systemctl start redis-server
-
git clone [email protected]:threefoldtech/rmb-rs.git
cd rmb-rs
cargo build --release --target=x86_64-unknown-linux-musl
-
If you encounter an error like the one below, it is likely that the
protoc
version installed by your package manager is too old.--- stderr types.proto: This file contains proto3 optional fields, but --experimental_allow_proto3_optional was not set. codegen failed: parse and typecheck
Solution: The best way to ensure that you’re using the latest release of
protoc
is installing from pre-compiled binaries. See perquisites. -
A peer must use a unique
mnemonic
or keys. It's not correct if multiple peers uses the same mnemonic this will make it impossible to route messages correctly. It's possible for the same peer to make multiple connections to the samerelay
given that it uses differentsession ids
. A session id identify the connection and hence make routing messages possible. -
A single peer on the other hand can make multiple connections to multiple relays for redundancy given that his data on the tfchain must reflect that
RUNNING MULTIPLE PEERS WITH THE SAME MNEMONIC MUST BE AVOIDED UNLESS FOLLOWING THE GUIDE LINES ABOVE
While inside the repository
cargo test