Menu
AWS Mobile SDK
Xamarin Developer Guide

Troubleshooting

This topic describes some ideas for troubleshooting problems you might encounter when using the AWS Mobile SDK for .NET and Xamarin.

Ensure IAM Role Has Required Permissions

When calling AWS services, your app should be using an identity from a Cognito identity pool. Each identity in the pool is associated with an IAM (Identity and Access Management) role.

A role has one or more policy files associated with it that specify what AWS resources the users assigned to the role have access to. By default, two roles are created per identity pool: one for authenticated users and one for unauthenticated users.

You will need to either modify the existing policy file or associate a new policy file with the permisssions required by your app. If your app allows both authenticated and unauthenticated users, both roles must be granted permissions for accessing the AWS resources your app needs.

The following policy file shows how to grant access to an S3 bucket:

Copy
{ "Statement":[ { "Action":[ "s3:AbortMultipartUpload", "s3:DeleteObject", "s3:GetObject", "s3:PutObject" ], "Effect":"Allow", "Resource":"arn:aws:s3:::MYBUCKETNAME/*", "Principal":"*" } ] }

The following policy file shows how to grant access to a DynamoDB database:

Copy
{ "Statement":[ { "Effect":"Allow", "Action":[ "dynamodb:DeleteItem", "dynamodb:GetItem", "dynamodb:PutItem", "dynamodb:Scan", "dynamodb:UpdateItem" ], "Resource":"arn:aws:dynamodb:us-west-2:123456789012:table/MyTable" } ] }

For more information about specifying policies, see IAM Policies.

Using a HTTP Proxy Debugger

If the AWS service your app is calling has an HTTP or HTTPS endpoint, you can use an HTTP/HTTPS proxy debugger to view the requests and responsese to gain more insight into what is occuring. There are a number of HTTP proxy debuggers available such as:

  • Charles - a web debugging proxy for Windows and OSX

  • Fiddler - a web debugging proxyfidd for Windows

Both Charles and Fiddler require some configuration to be able to view SSL encrypted traffic, please read the documentation for these tools for further information. If you are using a web debugging proxy that cannot be configured to display encrypted traffic, open the aws_endpoints_json file and set the HTTP tag for the AWS service you need to debug to true.