aws-sdk-js-automation on master
Updates SDK to v2.1195.0 (compare)
aws-sdk-js-automation on v2.1195.0
aws-sdk-js-automation on master
Updates SDK to v2.1194.0 (compare)
aws-sdk-js-automation on v2.1194.0
aws-sdk-js-automation on master
Updates SDK to v2.1193.0 (compare)
Looking for some advice on accessing Cognito user details from an AccessToken in node js.
I know that I can use CognitoIdentityServiceProvider to get what I need, but this requires using a callback. My goal is to provide the user values in an Express context, so async/callbacks aren't going to work for me.
Is my only option to manually validate the JWT access token and extract values?
I can't seem to get EventBridge rules to work.
I created a hello world lambda that just logs the event.
When testing the event, the CloudWatch logs display the logged event.
When I try to putEvents()
, I get a success response with the event id.
So, the only thing that I can think of that should be broken is my rule
{ "account" : [myAccount] }
putEvents()
I am new with AWS javascript sdk and we are trying to interact with AWS IoT over websockets since normal MQTT connection to AWS IoT with TLS (with certificates) is not supported for browsers.
I have been following this guide and also this guide but i cannot understand where the credentials and sessionToken is comming from. I know where to find my credentials (access key ID and secret access key) on my AWS account but when i try to run the examples mentioned in both links i become always an error because i dont know how to get my credentials and session token. It seems like i have to use AWS cognito?? but it should be an other way without this other service or not? Has someone maybe a more complete example? Please be kind and help me :D
In the code bellow i think somewhere i should do something like this:
var con = AWS.Credentials({accessKey: 'KEY',secretAccessKey: 'SECRET_KEY'})
or like this:
var con = AWS.Config.Credentials({accessKey: 'KEY',secretAccessKey: 'SECRET_KEY'})
Because i always become an error here:
AWS.config.credentials.sessionToken
But how i have to do it exactly?? I havent been able to find a good and complete example...
The imports/sources i am using:
<script src="https://sdk.amazonaws.com/js/aws-sdk-2.653.0.min.js"></script>
<script src="https://cdnjs.cloudflare.com/ajax/libs/moment.js/2.11.2/moment.min.js" type="text/javascript"></script>
<script src="https://cdnjs.cloudflare.com/ajax/libs/crypto-js/3.1.2/components/core-min.js" type="text/javascript"></script>
<script src="https://cdnjs.cloudflare.com/ajax/libs/crypto-js/3.1.2/components/hmac-min.js" type="text/javascript"></script>
<script src="https://cdnjs.cloudflare.com/ajax/libs/crypto-js/3.1.2/components/sha256-min.js" type="text/javascript"></script>
<script src="https://cdnjs.cloudflare.com/ajax/libs/paho-mqtt/1.0.1/mqttws31.min.js" type="text/javascript"></script>
You may need an appropriate loader to handle this file type.
which complains about async/await. I see that sdk has both cjs and precompiled es exports, but somehow react-create-app picks csj version SyntaxError: Unexpected token (13:20)
@ ./~/@aws-sdk/credential-provider-cognito-identity/dist/cjs/index.js 4:21-53
Hey guys, I just released a small npm library that allows you to transform a CIDR and a list of denied sub-CIDRs into a list of allowed CIDRs:
https://github.com/Obirah/cidr-deny-allow-transformer
https://www.npmjs.com/package/cidr-deny-allow-transformer
Might come in handy for anyone who is dealing with SecurityGroups and their traffic configuration. My personal use-case is denying a set of sub-CIDRs that contain internet gateways while the rest of the larger "main" CIDR needs to be allowed. I'm using this in combination with CDK but I'm sure it might also be useful for some SDK users.
I am using node 6 and in the loop I am sending the files to s3 using aws-sdk and I get this error : buffer.js:25
const ui8 = new Uint8Array(size);
^
RangeError: Invalid array buffer length
at new ArrayBuffer (native)
at new Uint8Array (native)
at createBuffer (buffer.js:25:17)
at allocate (buffer.js:158:12)
at new Buffer (buffer.js:56:12)
at allocNewPool (fs.js:1602:10)
at ReadStream._read (fs.js:1701:5)
at ReadStream.Readable.read (_stream_readable.js:336:10)
at ManagedUpload.fillStream (/opt/ocu/node/node_modules/aws-sdk/lib/s3/managed_upload.js:422:25)
at ReadStream.<anonymous> (/opt/ocu/node/node_modules/aws-sdk/lib/s3/managed_upload.js:188:4425)