如何解决在使用 AWS SDK Javascript v3 进行 Alexa 技能构建时从哪里开始调试“ResourceNotFoundException”
我正在使用 node.js 构建 Alexa 托管技能,并且我想在我的个人 AWS 账户中包含来自 DynamoDB 表的用户特定数据。我已经设置了一个具有 DynamoDB 表访问权限的 Cognito 身份池,并设法使用适用于 Javascript 的 AWS 开发工具包 (v3) 检索凭证,但是当我尝试使用 DynamoDB 客户端访问该表时,我收到“未找到资源” " 异常。
我什至不知道如何访问请求对象来尝试诊断问题!如果成功,原始请求似乎将作为响应的一部分返回,但错误对象仅包含一个请求 ID 字符串,它不会告诉我任何信息。如果有人能告诉我我做错了什么,那就太好了,但如果我能得到一些关于如何获取更多信息以开始调试的指示,我可能会解决这个问题!由于我不在北美,因此本地调试工具包似乎对我不可用,因此我所要做的就是使用带有 lambda CloudLogs 的 Alexa 开发人员控制台代码编辑器/模拟器。
非常感谢所有想法,谢谢!
Alexa 技能代码
const NewSessionRequestInterceptor = {
async process(handlerInput) {
if(isNewSession(handlerInput.requestEnvelope)){
const cognitoIdentityClient = new CognitoIdentityClient({region: "eu-west-1"});
const amazonAccesstoken = getAccountLinkingAccesstoken(handlerInput.requestEnvelope);
const cgGetIdCommand = new GetIdCommand({
IdentityPoolId: 'eu-west-1:xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx',Logins:{'www.amazon.com':amazonAccesstoken}
});
const cgIdStr = await cognitoIdentityClient.send(cgGetIdCommand);
const cgGetCredentialsCommand = new GetCredentialsForIdentityCommand({
IdentityId:cgIdStr.IdentityId,Logins:{'www.amazon.com':amazonAccesstoken}
});
const cgCredentials = await cognitoIdentityClient.send(cgGetCredentialsCommand);
const DynamoDBClientConfig = Object.assign(
{identityId:cgIdStr.IdentityId,region:"eu-west-1"},cgCredentials.Credentials
);
const ddbClient = new DynamoDBClient(DynamoDBClientConfig);
const ddbDocclient = DynamoDBDocumentClient.from(ddbClient);
const command = new GetCommand({
TableName:"MySkillData",Key:{'UserId':cgIdStr.IdentityId,'ItemKey':"Settings"},ConsistentRead:true
})
var Response;
try{
Response = await ddbDocclient.send(command);
}catch(err){Response = err}
handlerInput.attributesManager.setSessionAttributes({cgCredentials,Response});
}}}
"sessionAttributes": {
"Response": {
"name": "ResourceNotFoundException","$fault": "client","$Metadata": {
"httpStatusCode": 400,"requestId": "xxxxxxxxxxxxxxx","attempts": 1,"totalRetryDelay": 0
}
},"cgCredentials": {
"$Metadata": {
"httpStatusCode": 200,"requestId": "xxxxxxxxxxxxxxxx","totalRetryDelay": 0
},"Credentials": {
"AccessKeyId": "xxxxxxxxx","Expiration": "2021-04-20T14:20:04.000Z","SecretKey": "xxxxxxxxxx","SessionToken": "xxxxxxxxxxxxx"
},"IdentityId": "eu-west-1:xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx"
}}
Cognito 身份池授权角色权限政策
{ "Version": "2012-10-17","Statement": [
{
"Effect": "Allow","Action": [
"dynamodb:BatchGetItem","dynamodb:BatchWriteItem","dynamodb:DeleteItem","dynamodb:GetItem","dynamodb:PutItem","dynamodb:Query","dynamodb:UpdateItem"
],"Resource": [
"arn:aws:dynamodb:eu-west-1:xxxxxxxxxxxx:table/"MySkillData"
],"Condition": {
"ForAllValues:StringEquals": {
"dynamodb:LeadingKeys": [
"${cognito-identity.amazonaws.com:sub}"]}}}]}
Cognito 身份池授权角色信任关系政策
{ "Version": "2012-10-17","Statement": [
{
"Effect": "Allow","Principal": {
"Federated": "cognito-identity.amazonaws.com"
},"Action": "sts:AssumeRoleWithWebIdentity","Condition": {
"StringEquals": {
"cognito-identity.amazonaws.com:aud": "eu-west-1:xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx'"
},"ForAnyValue:StringLike": {
"cognito-identity.amazonaws.com:amr": "authenticated"}}}]}
版权声明:本文内容由互联网用户自发贡献,该文观点与技术仅代表作者本人。本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如发现本站有涉嫌侵权/违法违规的内容, 请发送邮件至 dio@foxmail.com 举报,一经查实,本站将立刻删除。