AWS Cognito和RDS PostgreSQL之间的行级安全可以通过使用AWS Identity and Access Management(IAM)策略和RDS PostgreSQL的访问控制列表(ACL)来实现。下面是一个解决方案的示例代码:
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "AllowCognitoAccess",
"Effect": "Allow",
"Action": [
"rds-db:connect"
],
"Resource": [
"arn:aws:rds-db:region:account-id:dbuser:db-instance-id/db-username"
],
"Condition": {
"StringLike": {
"aws:userid": "arn:aws:cognito-idp:region:account-id:userpool/user-id"
}
}
}
]
}
REVOKE ALL ON TABLE my_table FROM PUBLIC;
GRANT SELECT, INSERT, UPDATE, DELETE ON my_table TO my_user;
import psycopg2
import boto3
def get_connection():
client = boto3.client('rds')
response = client.generate_db_auth_token(
DBHostname='my-rds-instance-endpoint',
Port=5432,
DBUsername='my-rds-username'
)
conn = psycopg2.connect(
host='my-rds-instance-endpoint',
port=5432,
dbname='my-db-name',
user='my-rds-username',
password=response
)
return conn
def query_data():
conn = get_connection()
cursor = conn.cursor()
cursor.execute("SELECT * FROM my_table")
rows = cursor.fetchall()
cursor.close()
conn.close()
return rows
以上代码示例了如何使用Cognito用户的身份池凭证来初始化RDS数据库连接,并查询具有适当行级安全设置的表。请注意,上述代码仅为示例目的,实际应用程序中的实现可能会有所不同,具体取决于您的需求和架构。