1
0
mirror of https://github.com/Luzifer/past3.git synced 2024-09-16 15:38:29 +00:00
PaS(t)3 is a S3 file editor with Google authentication using Amazon Cognito.
Go to file
Knut Ahlers a006752c1e
npm audit fix
Signed-off-by: Knut Ahlers <knut@ahlers.me>
2019-08-28 13:53:44 +02:00
.babelrc Port application to pure Javascript 2018-09-24 14:13:36 +02:00
.gitignore Use babel to minify and transpile 2018-09-24 13:00:18 +02:00
app.js Replace CDNJS with jsDelivr 2019-02-01 11:28:20 +01:00
cognito_auth_policy.json Document Cognito Auth-Policy 2017-01-15 03:02:34 +01:00
config.yml Allow sharing private files through pre-signed URLs 2018-09-25 12:04:26 +02:00
cors.xml Document CORS policy 2017-01-15 13:57:41 +01:00
generate.py Fix: Vulnerabilities in Jinja2 <2.8.1 and PyYAML <4.2b1 2019-04-10 20:22:24 +02:00
History.md prepare release v0.10.1 2019-02-01 11:35:29 +01:00
index.html Fix: Include the dist version of AWS SDK 2019-02-01 11:35:15 +01:00
Makefile Port application to pure Javascript 2018-09-24 14:13:36 +02:00
package-lock.json npm audit fix 2019-08-28 13:53:44 +02:00
package.json Port application to pure Javascript 2018-09-24 14:13:36 +02:00
README.md Document CORS policy 2017-01-15 13:57:41 +01:00
requirements.txt Fix: Vulnerabilities in Jinja2 <2.8.1 and PyYAML <4.2b1 2019-04-10 20:22:24 +02:00
screenshot.png Add README and Screenshot 2017-01-15 13:08:43 +01:00
upload.sh Add upload-script 2019-01-14 22:10:21 +01:00

Luzifer / PaS(t)3

PaS(t)3 is a S3 file editor with Google authentication using Amazon Cognito. It does not require a server to run but can be deployed into a S3 bucket. Files edited are also stored in a (possibly the same) S3 bucket.

Screenshot of PaS(t)3 development

Setup

  1. Create a project in the Google Cloud Console
  2. Add an oAuth consent screen for your application (API Manager -> Credentials)
  3. Create credentials for a "Web application", add your URL as an "Authorized JavaScript origin"
  4. Put Client Id into the config.yml
  5. Create a S3 bucket and add the CORS policy
  6. Create an Amazon Cognito Federated Identity Pool
  7. Add the policy documented in cognito_auth_policy.json as "Authenticated Role"
  8. Set the Google Client ID in the Google+ tab in "Authentication providers"
  9. Note down the Idenitiy Pool ID in the config.yml
  10. Go through the config.yml and adjust parameters
  11. You may need to execute pip install -r requirements.txt as next step needs three python modules
  12. Execute make which will generate a public folder with all required files
  13. Upload the contents of the public folder

Used technology