1
0
mirror of https://github.com/Luzifer/past3.git synced 2024-09-19 17:02:59 +00:00
PaS(t)3 is a S3 file editor with Google authentication using Amazon Cognito.
Go to file
2018-09-24 15:24:44 +02:00
.babelrc Port application to pure Javascript 2018-09-24 14:13:36 +02:00
.gitignore Use babel to minify and transpile 2018-09-24 13:00:18 +02:00
app.js Store changed documents locally to prevent data loss on reload 2018-09-24 15:23:15 +02:00
cognito_auth_policy.json Document Cognito Auth-Policy 2017-01-15 03:02:34 +01:00
config.yml Document CORS policy 2017-01-15 13:57:41 +01:00
cors.xml Document CORS policy 2017-01-15 13:57:41 +01:00
generate.py Initial version 2017-01-15 02:13:29 +01:00
History.md prepare release v0.6.0 2018-09-24 15:24:44 +02:00
index.html Store changed documents locally to prevent data loss on reload 2018-09-24 15:23:15 +02:00
Makefile Port application to pure Javascript 2018-09-24 14:13:36 +02:00
package-lock.json Port application to pure Javascript 2018-09-24 14:13:36 +02:00
package.json Port application to pure Javascript 2018-09-24 14:13:36 +02:00
README.md Document CORS policy 2017-01-15 13:57:41 +01:00
requirements.txt Initial version 2017-01-15 02:13:29 +01:00
screenshot.png Add README and Screenshot 2017-01-15 13:08:43 +01:00

Luzifer / PaS(t)3

PaS(t)3 is a S3 file editor with Google authentication using Amazon Cognito. It does not require a server to run but can be deployed into a S3 bucket. Files edited are also stored in a (possibly the same) S3 bucket.

Screenshot of PaS(t)3 development

Setup

  1. Create a project in the Google Cloud Console
  2. Add an oAuth consent screen for your application (API Manager -> Credentials)
  3. Create credentials for a "Web application", add your URL as an "Authorized JavaScript origin"
  4. Put Client Id into the config.yml
  5. Create a S3 bucket and add the CORS policy
  6. Create an Amazon Cognito Federated Identity Pool
  7. Add the policy documented in cognito_auth_policy.json as "Authenticated Role"
  8. Set the Google Client ID in the Google+ tab in "Authentication providers"
  9. Note down the Idenitiy Pool ID in the config.yml
  10. Go through the config.yml and adjust parameters
  11. You may need to execute pip install -r requirements.txt as next step needs three python modules
  12. Execute make which will generate a public folder with all required files
  13. Upload the contents of the public folder

Used technology