You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Jan 14, 2025. It is now read-only.
Copy file name to clipboardExpand all lines: Auth/3_IAMAuthorization/README.md
+15-9Lines changed: 15 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -35,7 +35,7 @@ Browse to your CloudFormation stack created in the earlier modules and find the
35
35
36
36
1. Next, return to your Cloud9 IDE and open the file */website/src/amplify-config.js*.
37
37
38
-
1. Fill in values for both the bucket name, which you just copied, as well as the region where the CloudFormation template was launched
38
+
1. Fill in values for both the bucket name, which you just copied, as well as the region where your CloudFormation template was launched
39
39
40
40
1. Your final structure for the storage configuration of *amplify-config.js* should look like the following.
41
41
@@ -65,12 +65,18 @@ Browse to the IAM console and find your Cognito Identity Pool's authenticated us
65
65
66
66
1. Search for *WildRydes* to find the two roles which were created by Cognito Identity Pools when you created the Identity Pool in module one. Should you not be able to find the roles here, you can alternatively go to the **Cognito Federated Identities** console, find the correct identity pool, then click **Edit Identity Pool** in the top-right corner to see the roles listed. Each identity pool has both an Unauthenticated user role and an Authenticated user role.
67
67
68
-
1. Once you have found the names of the roles, go back to the IAM console and select the *Auth* role for your authenticated users.
69
-
70
-
1. We want to grant permissions to this role which are only applicable to this role so we will use an inline policy, which would be deleted if this role were ever deleted.
68
+
1. Once you have found the names of the roles, go back to the IAM console and **select the *Auth* role** for your authenticated users.
69
+
70
+
> If the full name of the role is hidden from view due to column width, you can hover over the partially visible name of the role to see the full name of the role as a tool tip.
71
+
72
+

73
+
74
+
1. We want to grant permissions to this role explicitly so we will use an inline policy, which would be deleted with this role if it were ever to be deleted.
71
75
72
76
1. Choose **Add inline policy** on the right-hand side to create a new inline policy associated to this IAM role.
73
77
78
+

79
+
74
80
1. Choose the **JSON** tab to allow you to free-form edit the new policy.
75
81
76
82
1. Paste the following IAM policy statements for S3 access. After pasting, you will need to go **replace the bucket name** listed in all caps with your bucket name (a total of 4 times).
@@ -90,15 +96,15 @@ Browse to the IAM console and find your Cognito Identity Pool's authenticated us
@@ -156,7 +162,7 @@ Authenticate in the Wild Rydes app if you're not already logged in, then browse
156
162
157
163
### 4. Store profile picture links in Cognito User Pools profile
158
164
159
-
With our image uploads now working, all will work as expected until you close your browser, but at that point the reference between your profile and your profile picture will be lost. To fix this, you will leverage a Cognito User Pools user attribute called *picture* to persist the S3 object key so the same image can be loaded upon each login or to the unicorns when you request a ride.
165
+
With our image uploads now working, all will work as expected until you close your browser, but at that point the reference between your user profile and your profile picture will be lost. To fix this, you will leverage a Cognito User Pools user attribute called *picture* to persist the S3 object key so the same image can be loaded upon each login and persisted to be shown to the unicorns when you request a ride.
0 commit comments