How to use AWS IoT to send/receive messages to/from Web Browser

前端 未结 4 887
无人共我
无人共我 2021-01-30 13:39

We are trying to use Amazon Web Services Internet of Things (AWS IoT) to send messages from/to a Web Browser (e.g: . Given that the AWS IoT supports JavaScript we expect

相关标签:
4条回答
  • 2021-01-30 14:11

    Here's a sample that uses a cognito identity pool in JS to connect, publish and react to a subscription.

    // Configure Cognito identity pool
    AWS.config.region = 'us-east-1';
    var credentials = new AWS.CognitoIdentityCredentials({
        IdentityPoolId: 'us-east-1:your identity pool guid',
    });
    
    // Getting AWS creds from Cognito is async, so we need to drive the rest of the mqtt client initialization in a callback
    credentials.get(function(err) {
        if(err) {
            console.log(err);
            return;
        }
        var requestUrl = SigV4Utils.getSignedUrl('wss', 'data.iot.us-east-1.amazonaws.com', '/mqtt',
            'iotdevicegateway', 'us-east-1',
            credentials.accessKeyId, credentials.secretAccessKey, credentials.sessionToken);
        initClient(requestUrl);
    });
    
    function init() {
      // do setup stuff
    }
    
    // Connect the client, subscribe to the drawing topic, and publish a "hey I connected" message
    function initClient(requestUrl) {
        var clientId = String(Math.random()).replace('.', '');
        var client = new Paho.MQTT.Client(requestUrl, clientId);
        var connectOptions = {
            onSuccess: function () {
                console.log('connected');
    
                // subscribe to the drawing
                client.subscribe("your/mqtt/topic");
    
                // publish a lifecycle event
                message = new Paho.MQTT.Message('{"id":"' + credentials.identityId + '"}');
                message.destinationName = 'your/mqtt/topic';
                console.log(message);
                client.send(message);
            },
            useSSL: true,
            timeout: 3,
            mqttVersion: 4,
            onFailure: function () {
                console.error('connect failed');
            }
        };
        client.connect(connectOptions);
    
        client.onMessageArrived = function (message) {
    
            try {
                console.log("msg arrived: " +  message.payloadString);
            } catch (e) {
                console.log("error! " + e);
            }
    
        };
    }
    

    Documentation for the credentials.get call, here

    Remember to authorize your IAM role for subscribing / publishing as well. Here's a sample:

    {
        "Version": "2012-10-17",
        "Statement": [
            {
                "Effect": "Allow",
                "Action": [
                    "iot:Connect"
                ],
                "Resource": "*"
            },
            {
                "Effect": "Allow",
                "Action": "iot:Receive",
                "Resource": "*"
            },
            {
                "Effect": "Allow",
                "Action": "iot:Subscribe",
                "Resource": [
                    "arn:aws:iot:us-east-1::your/mqtt/topic"
                ]
            },
            {
                "Effect": "Allow",
                "Action": "iot:Publish",
                "Resource": [
                    "arn:aws:iot:us-east-1::your/mqtt/topic"
                ]
            }
        ]
    }
    
    0 讨论(0)
  • 2021-01-30 14:18

    In case anyone else is looking for a solution: here's a tutorial that demonstrates via a simple chat app how to get real-time updates into a ReactJS front-end using Serverless and Websockets on AWS IOT. The source code of the tutorial is available on Github.

    0 讨论(0)
  • 2021-01-30 14:22

    It's very important to understand the difference between IAM policy and AWS IOT policy here. Suppose you use cognito user pool as your identity provider.

    First you need to set up a cognito identity pool, link the identity pool to your user pool and assign a role(attach IAM policy to this role) to this identity pool.

    Second, in your app, you first login so that you get the user pool credential, then you call

        AWS.config.credentials = new AWS.CognitoIdentityCredentials({
          IdentityPoolId: 'us-west-2:b8d2b32b-cbab-4ae3-9d47-1624d09c9350',
          Logins: {
            'cognito-idp.us-west-2.amazonaws.com/${userPoolIdentity}': userPoolCredential.getIdToken().getJwtToken(),
          }
        });
    

    to exchange your user pool credential with aws temporary access credential:

        AWS.config.getCredentials(e => {
          if(e) console.log("Get credential failed", e);
          this.device = AwsIot.device({//AwsIot is the aws-iot-sdk package
            clientId: clientID,//clientId is just random string
            host: '*-ats.iot.us-west-2.amazonaws.com',//replace * with your own host
            protocol: 'wss',
            accessKeyId: AWS.config.credentials.accessKeyId,
            secretKey: AWS.config.credentials.secretAccessKey,
            sessionToken: AWS.config.credentials.sessionToken
          });
          this.device.on('connect', function() {
            console.log("DEVICE CONNECTED");
          });
          this.device.subscribe('test');
          this.device
          .on('message', function(topic, payload) {
            console.log(`TOPIC IS ${topic}\nMESSAGE IS ${payload.toString()}`);
          });
        });
    

    But the above code will not work!!! Here is the tricky part: the credentials you get by exchanging your user pool credential is just a temporary credential that represent the AWS IAM policy you just attached to your identity pool! When it requested to connect with your IOT, AWS will check if it's allowed to request and if it's allowed to do what the user requested. You already got the IAM policy so you are allowed to request, but it will check the AWS IOT policy attached to this identity. Since you haven't done this, you are not allowed to do what you really requested(namely connection). So at the first time you want to connect, you should attach a IOT policy to this identity. You can do this either by command line or

      (<AWS.CognitoIdentityCredentials>AWS.config.credentials).refresh(e => {
        if(e) console.log('error', e);
        const principal = (<AWS.CognitoIdentityCredentials>AWS.config.credentials).identityId;
        console.log(`IdentityId: ${principal}`);
        this.attachPrincipalPolicy("test-delete-after-use", principal);
      });
      attachPrincipalPolicy(policyName, principal) {
        new AWS.Iot().attachPrincipalPolicy({ 
          policyName: policyName, // you need to create policy beforehand in iot
          principal: principal 
        }, err => {
          err ? console.log('ATTACH PRINCIPAL POLICY ERROR', err) : console.log('ATTACH PRINCIPAL POLICY SUCCESS');
        });
      }
    

    Now, when the identity tries to connect with IOT, IOT will find a IOT policy attached to this identity, and approve this connection.

    Sorry about the bad wording. In summary, you need to clarify the difference between IAM policy and IOT policy. This is just what I understand, it may have incorrect places. If you find it, please leave a comment or edit my answer.

    IMPORTANT Just found the relation between these two policies from official doc: https://docs.aws.amazon.com/iot/latest/developerguide/pub-sub-policy.html Look at section Policies for HTTP and WebSocket Clients

    0 讨论(0)
  • 2021-01-30 14:25

    It is hard to find good tutorials for integrating AWS IoT in browser.

    Basically you need to have some authentication method (Facebook, Google, AWS Cognito, your own SSO service with SAML support) and then you need to do following steps:

    1. Configure Cognito User Pool or Federated Identity Pool with your authentication method.
    2. In browser you have to implement Extended Flow (https://aws.amazon.com/blogs/mobile/understanding-amazon-cognito-authentication-part-4-enhanced-flow/)
    3. You need to AttachPolicy in IoT for your user's Cognito identityId - it will be used as principal (it the same way as devices are using certificates).
    4. You need to create MQTT client using https://github.com/aws/aws-iot-device-sdk-js and providing your temporary accessKeyId, secretKey and sessionToken received from Extended Flow authentication.
    0 讨论(0)
提交回复
热议问题