我不确定您的问题可能出在哪里,但是当我第一次开始使用 Amplify PubSub 时,我遇到了同样的问题。对我来说,这是一个政策问题。因此,其中一件事可能会有所帮助:
将您的事物策略文档连接到联合池的用户身份(而不是来自用户池的身份)。我的政策文件如下所示:
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"iot:Connect",
"iot:AttachPrincipalPolicy",
"iot:Publish",
"iot:Subscribe",
"iot:Receive",
"iot:GetThingShadow",
"iot:UpdateThingShadow",
"iot:DeleteThingShadow"
],
"Resource": [
"*"
]
}
]
}
要为我的所有用户(不是很多)附加/更新策略,我使用 Lambda 函数来执行此操作:
var AWS = require("aws-sdk");
const cognito = new AWS.CognitoIdentityServiceProvider({apiVersion: '2016-04-18'});
var cognitoidentity = new AWS.CognitoIdentity();
var iot = new AWS.Iot({apiVersion: '2015-05-28'});
exports.handler = (event, context, callback) => {
var params = {
IdentityPoolId: 'eu-central-1:xxxxxxxx-xxxx-xxxx-xxx-xxxxxxxx', /* change this */
MaxResults: 50,
};
cognitoidentity.listIdentities(params, function(err, data) {
if (err) console.log(err, err.stack);
else {
addPolicies(data.Identities);
}
});
function addPolicies(users) {
for (let i = 0; i<users.length;i++) {
var params2 = {
policyName: 'myIOTPolicy',
principal: users[i].IdentityId
};
iot.attachPrincipalPolicy(params2, function(err, data) {
if (err) console.log(err, err.stack);
else console.log(data);
});
}
}
callback(null, event);
};
对于身份池中经过身份验证的角色,我将以下策略附加到该角色:
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"iot:AttachPrincipalPolicy",
"iot:Connect",
"iot:Publish",
"iot:Subscribe",
"iot:Receive",
"iot:GetThingShadow",
"iot:UpdateThingShadow",
"iot:DeleteThingShadow"
],
"Resource": [
"*"
]
}
]
}
希望这可以帮助