You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: CHANGELOG.md
+2-2
Original file line number
Diff line number
Diff line change
@@ -42,11 +42,11 @@
42
42
* Updated 'AWS SDK for Javascript' library to latest version
43
43
* Plugin now shows changelog to the user after the installation of new version
44
44
* Options panel has a new look to improve readability
45
-
45
+
46
46
## 2016-jul-24 (v1.2)
47
47
* Bug fix: when just 1 role in the SAML Assertion available now also works well
48
48
* Now uses a regex to extract Role and Principal from SAML Assertion. This way it does not matter in what order the IDP adds the Role and Principle to the SAML Assertion.
49
-
49
+
50
50
## 2016-apr-11 (v1.1)
51
51
* Improved usability. No longer needed to manually specify PrincipalArn and RoleArn in options panel. Removed these options from the options panel. PrincipalArn and RoleArn is now parsed from the SAML Assertion itself.
<divid="divHeader" class="inline-div"><h2>Changelog for 'SAML to AWS STS Keys Converter'</h2></div>
12
-
</div>
13
-
<hr>
14
-
15
-
<divid="divInfo">
16
-
<p>Developed by prolane.org (Gerard Laan)</p>
17
-
<p>For help, please see README at the <ahref="https://github.com/prolane/samltoawsstskeys/blob/master/README.md" target="_blank">project page on Github.com</a></p>
18
-
<p>Click <ahref="options.html" target="_blank">here</a> to open the options panel for this plugin.</p>
<divid="divHeader" class="inline-div"><h2>Changelog for 'SAML to AWS STS Keys Converter'</h2></div>
12
+
</div>
13
+
<hr>
14
+
15
+
<divid="divInfo">
16
+
<p>Developed by prolane.org (Gerard Laan)</p>
17
+
<p>For help, please see README at the <ahref="https://github.com/prolane/samltoawsstskeys/blob/master/README.md" target="_blank">project page on Github.com</a></p>
18
+
<p>Click <ahref="options.html" target="_blank">here</a> to open the options panel for this plugin.</p>
19
+
</div>
20
+
<hr>
21
+
22
+
<divid="divChangelog">
23
23
<h3>2022-dec-19<br>v3.2</h3>
24
-
<ul>
25
-
<li>Fix <ahref="https://github.com/prolane/samltoawsstskeys/issues/61" target="_blank">#61</a>. Instead of using the aws http api directly for AssumeRoleWithSAML, this version switches to using the aws sdk. This is to fix processing large SAML Assertions.</li>
24
+
<ul>
25
+
<li>Fix <ahref="https://github.com/prolane/samltoawsstskeys/issues/61" target="_blank">#61</a>. Instead of using the aws http api directly for AssumeRoleWithSAML, this version switches to using the aws sdk. This is to fix processing large SAML Assertions.</li>
26
26
<li>Fix <ahref="https://github.com/prolane/samltoawsstskeys/issues/62" target="_blank">#62</a>. When the IDP does not add a Session Duration as SAML Assertion Attribute, ignore and continue.</li>
27
-
</ul>
28
-
<br/>
29
-
<br/>
27
+
</ul>
28
+
<br/>
29
+
<br/>
30
30
31
31
<h3>2022-dec-16<br>v3.1</h3>
32
-
<ul>
33
-
<li>Fix <ahref="https://github.com/prolane/samltoawsstskeys/issues/58" target="_blank">#58</a>. Parse various SAML Assertion AttributeValue syntax in a consistent way.</li>
34
-
</ul>
35
-
<br/>
36
-
<br/>
32
+
<ul>
33
+
<li>Fix <ahref="https://github.com/prolane/samltoawsstskeys/issues/58" target="_blank">#58</a>. Parse various SAML Assertion AttributeValue syntax in a consistent way.</li>
34
+
</ul>
35
+
<br/>
36
+
<br/>
37
37
38
38
<h3>2022-dec-15<br>v3.0</h3>
39
-
<ul>
40
-
<li>Code refactoring due to upgrading to Extension Manifest V3.</li>
39
+
<ul>
40
+
<li>Code refactoring due to upgrading to Extension Manifest V3.</li>
41
41
<li>Improved popup styling.</li>
42
42
<li>LCM on dependency libs.</li>
43
-
</ul>
44
-
<br/>
45
-
<br/>
43
+
</ul>
44
+
<br/>
45
+
<br/>
46
46
47
-
<h3>2022-jun-29<br>v2.8</h3>
48
-
<ul>
49
-
<li>At request of Google, the "tabs" permission is removed.</li>
50
-
</ul>
51
-
<br/>
52
-
<br/>
47
+
<h3>2022-jun-29<br>v2.8</h3>
48
+
<ul>
49
+
<li>At request of Google, the "tabs" permission is removed.</li>
50
+
</ul>
51
+
<br/>
52
+
<br/>
53
53
54
54
<h3>2019-feb-8<br>v2.7</h3>
55
-
<ul>
56
-
<li>Changed permissions. The extension will now ask access to any requested URL. This is needed because of changed policy in Chrome 72 for the chrome.webRequest API. Read <ahref="https://github.com/prolane/samltoawsstskeys/issues/28#issuecomment-461938267" target="_blank">here</a> for the rationale behind it. Fixes <ahref="https://github.com/prolane/samltoawsstskeys/issues/28" target="_blank">#28</a>.</li>
57
-
</ul>
58
-
<br/>
59
-
<br/>
55
+
<ul>
56
+
<li>Changed permissions. The extension will now ask access to any requested URL. This is needed because of changed policy in Chrome 72 for the chrome.webRequest API. Read <ahref="https://github.com/prolane/samltoawsstskeys/issues/28#issuecomment-461938267" target="_blank">here</a> for the rationale behind it. Fixes <ahref="https://github.com/prolane/samltoawsstskeys/issues/28" target="_blank">#28</a>.</li>
57
+
</ul>
58
+
<br/>
59
+
<br/>
60
60
61
-
<h3>2019-feb-7<br>v2.6</h3>
62
-
<ul>
63
-
<li>Adds the option to enable debug logs</li>
64
-
</ul>
65
-
<br/>
66
-
<br/>
61
+
<h3>2019-feb-7<br>v2.6</h3>
62
+
<ul>
63
+
<li>Adds the option to enable debug logs</li>
64
+
</ul>
65
+
<br/>
66
+
<br/>
67
67
68
-
<h3>2018-nov-15<br>v2.5</h3>
69
-
<ul>
70
-
<li>Implements CRLF as newlines in the credentials file when the client is on Windows. Fixes <ahref="https://github.com/prolane/samltoawsstskeys/issues/21" target="_blank">#21</a></li>
71
-
<li>Removes unnecessary spaces prior the newlines in credentials file. Fixes <ahref="https://github.com/prolane/samltoawsstskeys/issues/14" target="_blank">#14</a></li>
72
-
</ul>
73
-
<br/>
74
-
<br/>
68
+
<h3>2018-nov-15<br>v2.5</h3>
69
+
<ul>
70
+
<li>Implements CRLF as newlines in the credentials file when the client is on Windows. Fixes <ahref="https://github.com/prolane/samltoawsstskeys/issues/21" target="_blank">#21</a></li>
71
+
<li>Removes unnecessary spaces prior the newlines in credentials file. Fixes <ahref="https://github.com/prolane/samltoawsstskeys/issues/14" target="_blank">#14</a></li>
72
+
</ul>
73
+
<br/>
74
+
<br/>
75
75
76
-
<h3>2018-aug-2<br>v2.4</h3>
77
-
<ul>
78
-
<li>Bug fix for users with one IAM role in the SAML claim. Bug was introduced with release 2.1, but according to user reports only results in an error starting with Chrome release 68.</li>
79
-
</ul>
80
-
<br/>
81
-
<br/>
76
+
<h3>2018-aug-2<br>v2.4</h3>
77
+
<ul>
78
+
<li>Bug fix for users with one IAM role in the SAML claim. Bug was introduced with release 2.1, but according to user reports only results in an error starting with Chrome release 68.</li>
79
+
</ul>
80
+
<br/>
81
+
<br/>
82
82
83
-
<h3>2018-may-14<br>v2.3</h3>
84
-
<ul>
85
-
<li>Release 2.2 revealed many users have their SAML provider requesting a SessionDuration which is higher than the maximum session duration configured at the IAM Role. Release 2.3 now supports manually enabling or disabling this SessionDuration feature. The feature is enabled by default, but can be disabled in the options.</li>
86
-
</ul>
87
-
<br/>
88
-
<br/>
83
+
<h3>2018-may-14<br>v2.3</h3>
84
+
<ul>
85
+
<li>Release 2.2 revealed many users have their SAML provider requesting a SessionDuration which is higher than the maximum session duration configured at the IAM Role. Release 2.3 now supports manually enabling or disabling this SessionDuration feature. The feature is enabled by default, but can be disabled in the options.</li>
86
+
</ul>
87
+
<br/>
88
+
<br/>
89
89
90
-
<h3>2018-may-12<br>v2.2</h3>
91
-
<ul>
92
-
<li>Now supports the SessionDuration SAML attribute which can be set by your IDP administrator. This can keep your credentials valid longer than the default 1 hour. Thanks to <ahref="https://github.com/ashemedai" target="_blank">Jeroen</a> for his contribution!</li>
93
-
</ul>
94
-
<br/>
95
-
<br/>
90
+
<h3>2018-may-12<br>v2.2</h3>
91
+
<ul>
92
+
<li>Now supports the SessionDuration SAML attribute which can be set by your IDP administrator. This can keep your credentials valid longer than the default 1 hour. Thanks to <ahref="https://github.com/ashemedai" target="_blank">Jeroen</a> for his contribution!</li>
93
+
</ul>
94
+
<br/>
95
+
<br/>
96
96
97
-
<h3>2017-nov-01<br>v2.1</h3>
98
-
<ul>
99
-
<li>Bug fix: Chrome 62 broke the extension. Special thanks for <ahref="https://github.com/bdruth" target="_blank">Brice</a> for contributing. Thanks to <ahref="https://gitlab.com/gbvanrenswoude" target="_blank">Gijs</a> for helping out with testing.</li>
100
-
</ul>
101
-
<br/>
102
-
<br/>
97
+
<h3>2017-nov-01<br>v2.1</h3>
98
+
<ul>
99
+
<li>Bug fix: Chrome 62 broke the extension. Special thanks for <ahref="https://github.com/bdruth" target="_blank">Brice</a> for contributing. Thanks to <ahref="https://gitlab.com/gbvanrenswoude" target="_blank">Gijs</a> for helping out with testing.</li>
100
+
</ul>
101
+
<br/>
102
+
<br/>
103
103
104
-
<h3>2016-nov-21<br>v2.0</h3>
105
-
<ul>
106
-
<li>Added functionality to specify Role ARN's in the options panel. This is meant for cross-account assume-role API calls. For each specified role temporary credentials will be fetched and added to the credentials file.</li>
107
-
<li>Updated 'AWS SDK for Javascript' library to latest version</li>
108
-
<li>Plugin now shows changelog to the user after the installation of new version</li>
109
-
<li>Options panel has a new look to improve readability</li>
110
-
</ul>
111
-
<br/>
112
-
<br/>
104
+
<h3>2016-nov-21<br>v2.0</h3>
105
+
<ul>
106
+
<li>Added functionality to specify Role ARN's in the options panel. This is meant for cross-account assume-role API calls. For each specified role temporary credentials will be fetched and added to the credentials file.</li>
107
+
<li>Updated 'AWS SDK for Javascript' library to latest version</li>
108
+
<li>Plugin now shows changelog to the user after the installation of new version</li>
109
+
<li>Options panel has a new look to improve readability</li>
110
+
</ul>
111
+
<br/>
112
+
<br/>
113
113
114
-
<h3>2016-jul-24<br>v1.2</h3>
115
-
<ul>
116
-
<li>Bug fix: when just 1 role in the SAML Assertion available now also works well</li>
117
-
<li>Now uses a regex to extract Role and Principal from SAML Assertion. This way it does not matter in what order the IDP adds the Role and Principle to the SAML Assertion.</li>
118
-
</ul>
119
-
<br/>
120
-
<br/>
114
+
<h3>2016-jul-24<br>v1.2</h3>
115
+
<ul>
116
+
<li>Bug fix: when just 1 role in the SAML Assertion available now also works well</li>
117
+
<li>Now uses a regex to extract Role and Principal from SAML Assertion. This way it does not matter in what order the IDP adds the Role and Principle to the SAML Assertion.</li>
118
+
</ul>
119
+
<br/>
120
+
<br/>
121
121
122
-
<h3>2016-apr-11<br>v1.1</h3>
123
-
<ul>
124
-
<li>Improved usability. No longer needed to manually specify PrincipalArn and RoleArn in options panel. Removed these options from the options panel. PrincipalArn and RoleArn is now parsed from the SAML Assertion itself.</li>
125
-
</ul>
126
-
<br/>
127
-
<br/>
122
+
<h3>2016-apr-11<br>v1.1</h3>
123
+
<ul>
124
+
<li>Improved usability. No longer needed to manually specify PrincipalArn and RoleArn in options panel. Removed these options from the options panel. PrincipalArn and RoleArn is now parsed from the SAML Assertion itself.</li>
0 commit comments