This sample demonstrates use of the AWS IoT APIs to publish to and subscribe from MQTT topics with a WebSocket. Authentication of the WebSocket connection is done with Amazon Cognito. Once a connection to the AWS IoT platform has been established, the application presents a simple UI to publish and subscribe over MQTT.
- AndroidStudio 3.4+
- Android API 15+
-
Import the AndroidPubSubWebSocket project into your IDE.
- From the Welcome screen, click on "Import project".
- Browse to the AndroidPubSubWebSocket directory and press OK.
- Accept the messages about adding Gradle to the project.
- If the SDK reports some missing Android SDK packages (like Build Tools or the Android API package), follow the instructions to install them.
-
Import the libraries :
- Gradle will take care of downloading these dependencies for you.
-
This sample requires Cognito to authorize to AWS IoT and establish a WebSocket connection. Use Amazon Cognito to create a new identity pool:
-
In the Amazon Cognito Console, press the
Manage Federated Identities
button and on the resulting page press theCreate new identity pool
button. -
Give your identity pool a name and ensure that
Enable access to unauthenticated identities
under theUnauthenticated identities
section is checked. This allows the sample application to assume the unauthenticated role associated with this identity pool. Press theCreate Pool
button to create your identity pool.Important: See the note below on unauthenticated user access.
-
As part of creating the identity pool, Cognito will setup two roles in Identity and Access Management (IAM). These will be named something similar to:
Cognito_IoTSampleAuth_Role
andCognito_IoTSampleUnauth_Role
. You can view them by pressing theView Details
button. Now press theAllow
button to create the roles. -
Save the
Identity pool ID
value that shows up in red in the "Getting started with Amazon Cognito" page, it should look similar to: `us-east-1:xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx" and note the region that is being used. These will be used in the application code later. -
Now we will attach a policy to the unauthenticated role which has permissions to access the required AWS IoT APIs. This is done by attaching an IAM Policy to the unauthenticated role in the IAM Console. First, search for the unauth role that you created in step 3 above (named something similar to
Cognito_IoTSampleUnauth_Role
) and select its hyperlink. In the resulting "Summary" page press theAttach Policy
button in the "Permissions" tab. -
Search for "iot" and check the box next to the policy named
AWSIoTFullAccess
and then press theAttach Policy
button. This policy allows the application to perform all operations on the Amazon IoT service.More information on AWS IAM roles and policies can be found here. More information on AWS IoT policies can be found here.
Note: To keep this example simple it makes use of unauthenticated users in the identity pool. This can be used for getting started and prototypes but unauthenticated users should typically only be given read-only permissions if used in production applications. More information on Cognito identity pools including the Cognito developer guide can be found here.
-
-
Open the AndroidPubSubWebSocket project.
-
Open
awsconfiguration.json
and update the following constants with the appropriate values:"CredentialsProvider": { "CognitoIdentity": { "Default": { "PoolId": "REPLACE_ME", "Region": "REPLACE_ME" } } }
-
Open
PubSubActivity.java
and update the following constants with the appropriate values:// customer specific endpoint can be found under the settings tab on the left-hand panel CUSTOMER_SPECIFIC_ENDPOINT = "CHANGE_ME";
-
Build and run the sample app.
-
The sample application will allow you to connect to the AWS IoT platform, and then publish or subscribe to a topic using MQTT.