Skip to content

Latest commit

 

History

History
156 lines (122 loc) · 7.86 KB

File metadata and controls

156 lines (122 loc) · 7.86 KB

WebSocket Connect

Return to main sample list

This sample makes an MQTT connection via WebSockets and then disconnects. On startup, the device connects to the server via WebSockets and then disconnects right after. This sample is for reference on connecting via WebSockets. This sample demonstrates the most straightforward way to connect via WebSockets by querying the AWS credentials for the connection from the device's environment variables or local files.

Your IoT Core Thing's Policy must provide privileges for this sample to connect. Below is a sample policy that can be used on your IoT Core Thing that will allow this sample to run as intended.

(see sample policy)
{
  "Version": "2012-10-17",
  "Statement": [
    {
      "Effect": "Allow",
      "Action": [
        "iot:Connect"
      ],
      "Resource": [
        "arn:aws:iot:region:account:client/test-*"
      ]
    }
  ]
}

Replace with the following with the data from your AWS account:

  • <region>: The AWS IoT Core region where you created your AWS IoT Core thing you wish to use with this sample. For example us-east-1.
  • <account>: Your AWS IoT Core account ID. This is the set of numbers in the top right next to your AWS account name when using the AWS IoT Core website.

Note that in a real application, you may want to avoid the use of wildcards in your ClientID or use them selectively. Please follow best practices when working with AWS on production applications using the SDK. Also, for the purposes of this sample, please make sure your policy allows a client ID of test-* to connect or use --client_id <client ID here> to send the client ID your policy supports.

For this sample, using WebSockets will attempt to fetch the AWS credentials to authorize the connection from your environment variables or local files. See the authorizing direct AWS page for documentation on how to get the AWS credentials, which then you can set to the AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS, and AWS_SESSION_TOKEN environment variables.

How to run

To run the websocket connect use the following command:

mvn compile exec:java -pl samples/WebsocketConnect -Dexec.mainClass=websocketconnect.WebsocketConnect -Dexec.args="--endpoint <endpoint> --signing_region <signing region>"

If you wish to use the latest SDK release to run the sample rather than using the version of the Java V2 SDK installed on the device, you can run the sample and change the profile to latest-release, which will download and use the latest Java V2 SDK release from Maven:

mvn -P latest-release compile exec:java -pl samples/WebsocketConnect -Dexec.mainClass=websocketconnect.WebsocketConnect -Dexec.args="--endpoint <endpoint> --signing_region <signing region>"

Alternate connection configuration methods supported by AWS IoT Core

MQTT over WebSockets with static AWS credentials

With the help of a static credentials provider your application can use a fixed set of AWS credentials. For that, you need to instantiate the StaticCredentialsProviderBuilder class and provide it with the AWS credentials. The following code snippet demonstrates how to set up an MQTT3 connection using static AWS credentials for SigV4-based authentication.

static MqttClientConnection createMqttClientConnection() {
    try (AwsIotMqttConnectionBuilder builder = AwsIotMqttConnectionBuilder.newMtlsBuilderFromPath(null, null)) {
        String clientEndpoint = "<prefix>-ats.iot.<region>.amazonaws.com";
        builder.withEndpoint(clientEndpoint);

        builder.withWebsockets(true);
        builder.withWebsocketSigningRegion("<signing region>");

        StaticCredentialsProviderBuilder providerBuilder = new StaticCredentialsProviderBuilder();
        providerBuilder.withAccessKeyId("<access key id>");
        providerBuilder.withSecretAccessKey("<secret access key>");
        providerBuilder.withSessionToken("<session>");

        CredentialsProvider credentialsProvider = providerBuilder.build();
        builder.withWebsocketCredentialsProvider(credentialsProvider);

        MqttClientConnection connection = builder.build();
        return connection;
    }
}

MQTT over WebSockets with Custom Authorizer

An MQTT3 direct connection can be made using a Custom Authorizer. When making a connection using a Custom Authorizer, the MQTT3 client can optionally passing username, password, and/or token signature arguments based on the configuration of the Custom Authorizer on AWS IoT Core.

You will need to setup your Custom Authorizer so that the lambda function returns a policy document to properly connect. See this page on the documentation for more details and example return results.

If your Custom Authorizer does not use signing, you don't specify anything related to the token signature and can use the following code:

static MqttClientConnection createMqttClientConnection() {
    try (AwsIotMqttConnectionBuilder builder = AwsIotMqttConnectionBuilder.newDefaultBuilder()) {
        String clientEndpoint = "<prefix>-ats.iot.<region>.amazonaws.com";
        builder.withEndpoint(clientEndpoint);

        String custom_auth_username = "<value of the username field that should be passed to the authorizer's lambda>";
        String custom_auth_authorizer_name = "<custom authorizer name>";
        String custom_auth_password = "<the password to use with the custom authorizer>";

        builder.withCustomAuthorizer(
            custom_auth_username
            custom_auth_authorizer_name,
            null,
            custom_auth_password,
            null,
            null);

        builder.withWebsockets(true);
        builder.withWebsocketSigningRegion("<signing region>");
        MqttClientConnection connection = builder.build();
        return connection;
    } catch (Exception ex) {
        throw new RuntimeException("Failed to create MQTT311 connection", ex);
    }
}

If your custom authorizer uses signing, you must specify the three signed token properties as well. It is your responsibility to URI-encode the username, authorizerName, and tokenKeyName parameters.

static MqttClientConnection createMqttClientConnection() {
    try (AwsIotMqttConnectionBuilder builder = AwsIotMqttConnectionBuilder.newDefaultBuilder()) {
        String clientEndpoint = "<prefix>-ats.iot.<region>.amazonaws.com";
        builder.withEndpoint(clientEndpoint);

        String custom_auth_username = "<value of the username field that should be passed to the authorizer's lambda>";
        String custom_auth_authorizer_name = "<custom authorizer name>";
        String custom_auth_authorizer_signature = "<URI-encoded base64-encoded digital signature of tokenValue>";
        String custom_auth_password = "<the password to use with the custom authorizer>";
        String custom_auth_token_key_name = "<value of the username query param that holds the token value that has been signed>";
        String custom_auth_token_value = "<name of the username query param that will contain the token value>";

        builder.withCustomAuthorizer(
            custom_auth_username
            custom_auth_authorizer_name,
            custom_auth_authorizer_signature,
            custom_auth_password,
            custom_auth_token_key_name,
            custom_auth_token_value);

        builder.withWebsockets(true);
        builder.withWebsocketSigningRegion("<signing region>");
        MqttClientConnection connection = builder.build();
        return connection;
    } catch (Exception ex) {
        throw new RuntimeException("Failed to create MQTT311 connection", ex);
    }
}