1
0
Fork 0
mirror of https://github.com/Luzifer/past3.git synced 2024-12-22 20:31:16 +00:00
PaS(t)3 is a S3 file editor with Google authentication using Amazon Cognito.
Find a file
Knut Ahlers 6d3cab3e05
Fix: Include the dist version of AWS SDK
Signed-off-by: Knut Ahlers <knut@ahlers.me>
2019-02-01 11:35:15 +01:00
.babelrc Port application to pure Javascript 2018-09-24 14:13:36 +02:00
.gitignore Use babel to minify and transpile 2018-09-24 13:00:18 +02:00
app.js Replace CDNJS with jsDelivr 2019-02-01 11:28:20 +01:00
cognito_auth_policy.json Document Cognito Auth-Policy 2017-01-15 03:02:34 +01:00
config.yml Allow sharing private files through pre-signed URLs 2018-09-25 12:04:26 +02:00
cors.xml Document CORS policy 2017-01-15 13:57:41 +01:00
generate.py Script can run under python3 2019-01-14 11:46:13 +01:00
History.md prepare release v0.10.0 2019-02-01 11:28:51 +01:00
index.html Fix: Include the dist version of AWS SDK 2019-02-01 11:35:15 +01:00
Makefile Port application to pure Javascript 2018-09-24 14:13:36 +02:00
package-lock.json Port application to pure Javascript 2018-09-24 14:13:36 +02:00
package.json Port application to pure Javascript 2018-09-24 14:13:36 +02:00
README.md Document CORS policy 2017-01-15 13:57:41 +01:00
requirements.txt Initial version 2017-01-15 02:13:29 +01:00
screenshot.png Add README and Screenshot 2017-01-15 13:08:43 +01:00
upload.sh Add upload-script 2019-01-14 22:10:21 +01:00

Luzifer / PaS(t)3

PaS(t)3 is a S3 file editor with Google authentication using Amazon Cognito. It does not require a server to run but can be deployed into a S3 bucket. Files edited are also stored in a (possibly the same) S3 bucket.

Screenshot of PaS(t)3 development

Setup

  1. Create a project in the Google Cloud Console
  2. Add an oAuth consent screen for your application (API Manager -> Credentials)
  3. Create credentials for a "Web application", add your URL as an "Authorized JavaScript origin"
  4. Put Client Id into the config.yml
  5. Create a S3 bucket and add the CORS policy
  6. Create an Amazon Cognito Federated Identity Pool
  7. Add the policy documented in cognito_auth_policy.json as "Authenticated Role"
  8. Set the Google Client ID in the Google+ tab in "Authentication providers"
  9. Note down the Idenitiy Pool ID in the config.yml
  10. Go through the config.yml and adjust parameters
  11. You may need to execute pip install -r requirements.txt as next step needs three python modules
  12. Execute make which will generate a public folder with all required files
  13. Upload the contents of the public folder

Used technology