Skip to content

Commit 855a529

Browse files
committed
Replace tabs with spaces
1 parent 65e7e46 commit 855a529

File tree

7 files changed

+262
-262
lines changed

7 files changed

+262
-262
lines changed

CHANGELOG.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -42,11 +42,11 @@
4242
* Updated 'AWS SDK for Javascript' library to latest version
4343
* Plugin now shows changelog to the user after the installation of new version
4444
* Options panel has a new look to improve readability
45-
45+
4646
## 2016-jul-24 (v1.2)
4747
* Bug fix: when just 1 role in the SAML Assertion available now also works well
4848
* Now uses a regex to extract Role and Principal from SAML Assertion. This way it does not matter in what order the IDP adds the Role and Principle to the SAML Assertion.
49-
49+
5050
## 2016-apr-11 (v1.1)
5151
* Improved usability. No longer needed to manually specify PrincipalArn and RoleArn in options panel. Removed these options from the options panel. PrincipalArn and RoleArn is now parsed from the SAML Assertion itself.
5252

background/script.js

+9-9
Original file line numberDiff line numberDiff line change
@@ -24,9 +24,9 @@ chrome.storage.sync.get({
2424
// If so, show the user the changelog
2525
// var thisVersion = chrome.runtime.getManifest().version;
2626
chrome.runtime.onInstalled.addListener(function(details){
27-
if(details.reason == "install" || details.reason == "update"){
28-
// Open a new tab to show changelog html page
29-
chrome.tabs.create({url: "../options/changelog.html"});
27+
if(details.reason == "install" || details.reason == "update"){
28+
// Open a new tab to show changelog html page
29+
chrome.tabs.create({url: "../options/changelog.html"});
3030
}
3131
});
3232

@@ -299,7 +299,7 @@ async function assumeRoleWithSAML(roleClaimValue, SAMLAssertion, SessionDuration
299299
// (which where fetched using SAML) as authentication.
300300
async function assumeRole(roleArn, roleSessionName, AccessKeyId, SecretAccessKey,
301301
SessionToken, SessionDuration) {
302-
// Set the fetched STS keys from the SAML response as credentials for doing the API call
302+
// Set the fetched STS keys from the SAML response as credentials for doing the API call
303303
let clientconfig = {
304304
region: 'us-east-1', // region is mandatory to specify, but ignored when using global endpoint
305305
useGlobalEndpoint: true,
@@ -310,11 +310,11 @@ async function assumeRole(roleArn, roleSessionName, AccessKeyId, SecretAccessKey
310310
// AWS SDK is a module exorted from a webpack packaged lib
311311
// See 'library.name' in webpack.config.js
312312
const client = new webpacksts.AWSSTSClient(clientconfig);
313-
// Set the parameters for the AssumeRole API call. Meaning: What role to assume
314-
let params = {
315-
RoleArn: roleArn,
316-
RoleSessionName: roleSessionName
317-
};
313+
// Set the parameters for the AssumeRole API call. Meaning: What role to assume
314+
let params = {
315+
RoleArn: roleArn,
316+
RoleSessionName: roleSessionName
317+
};
318318
if (SessionDuration !== null) {
319319
params['DurationSeconds'] = SessionDuration;
320320
}

options/changelog.html

+107-107
Original file line numberDiff line numberDiff line change
@@ -1,136 +1,136 @@
11
<!doctype html>
22
<html>
33
<head>
4-
<script src="../lib/jquery-3.1.1.min.js"></script>
5-
<link rel="stylesheet" type="text/css" href="options.css">
4+
<script src="../lib/jquery-3.1.1.min.js"></script>
5+
<link rel="stylesheet" type="text/css" href="options.css">
66
<title>Changelog for 'SAML to AWS STS Keys Converter'</title>
77
</head>
88
<body>
9-
<div id="divTitle">
10-
<div id="divIcon" class="inline-div"><img src="../icons/icon_128.png" alt="Icon" height="50" width="50"></div>
11-
<div id="divHeader" class="inline-div"><h2>Changelog for 'SAML to AWS STS Keys Converter'</h2></div>
12-
</div>
13-
<hr>
14-
15-
<div id="divInfo">
16-
<p>Developed by prolane.org (Gerard Laan)</p>
17-
<p>For help, please see README at the <a href="https://github.com/prolane/samltoawsstskeys/blob/master/README.md" target="_blank">project page on Github.com</a></p>
18-
<p>Click <a href="options.html" target="_blank">here</a> to open the options panel for this plugin.</p>
19-
</div>
20-
<hr>
21-
22-
<div id="divChangelog">
9+
<div id="divTitle">
10+
<div id="divIcon" class="inline-div"><img src="../icons/icon_128.png" alt="Icon" height="50" width="50"></div>
11+
<div id="divHeader" class="inline-div"><h2>Changelog for 'SAML to AWS STS Keys Converter'</h2></div>
12+
</div>
13+
<hr>
14+
15+
<div id="divInfo">
16+
<p>Developed by prolane.org (Gerard Laan)</p>
17+
<p>For help, please see README at the <a href="https://github.com/prolane/samltoawsstskeys/blob/master/README.md" target="_blank">project page on Github.com</a></p>
18+
<p>Click <a href="options.html" target="_blank">here</a> to open the options panel for this plugin.</p>
19+
</div>
20+
<hr>
21+
22+
<div id="divChangelog">
2323
<h3>2022-dec-19<br>v3.2</h3>
24-
<ul>
25-
<li>Fix <a href="https://github.com/prolane/samltoawsstskeys/issues/61" target="_blank">#61</a>. Instead of using the aws http api directly for AssumeRoleWithSAML, this version switches to using the aws sdk. This is to fix processing large SAML Assertions.</li>
24+
<ul>
25+
<li>Fix <a href="https://github.com/prolane/samltoawsstskeys/issues/61" target="_blank">#61</a>. Instead of using the aws http api directly for AssumeRoleWithSAML, this version switches to using the aws sdk. This is to fix processing large SAML Assertions.</li>
2626
<li>Fix <a href="https://github.com/prolane/samltoawsstskeys/issues/62" target="_blank">#62</a>. When the IDP does not add a Session Duration as SAML Assertion Attribute, ignore and continue.</li>
27-
</ul>
28-
<br />
29-
<br />
27+
</ul>
28+
<br />
29+
<br />
3030

3131
<h3>2022-dec-16<br>v3.1</h3>
32-
<ul>
33-
<li>Fix <a href="https://github.com/prolane/samltoawsstskeys/issues/58" target="_blank">#58</a>. Parse various SAML Assertion AttributeValue syntax in a consistent way.</li>
34-
</ul>
35-
<br />
36-
<br />
32+
<ul>
33+
<li>Fix <a href="https://github.com/prolane/samltoawsstskeys/issues/58" target="_blank">#58</a>. Parse various SAML Assertion AttributeValue syntax in a consistent way.</li>
34+
</ul>
35+
<br />
36+
<br />
3737

3838
<h3>2022-dec-15<br>v3.0</h3>
39-
<ul>
40-
<li>Code refactoring due to upgrading to Extension Manifest V3.</li>
39+
<ul>
40+
<li>Code refactoring due to upgrading to Extension Manifest V3.</li>
4141
<li>Improved popup styling.</li>
4242
<li>LCM on dependency libs.</li>
43-
</ul>
44-
<br />
45-
<br />
43+
</ul>
44+
<br />
45+
<br />
4646

47-
<h3>2022-jun-29<br>v2.8</h3>
48-
<ul>
49-
<li>At request of Google, the "tabs" permission is removed.</li>
50-
</ul>
51-
<br />
52-
<br />
47+
<h3>2022-jun-29<br>v2.8</h3>
48+
<ul>
49+
<li>At request of Google, the "tabs" permission is removed.</li>
50+
</ul>
51+
<br />
52+
<br />
5353

5454
<h3>2019-feb-8<br>v2.7</h3>
55-
<ul>
56-
<li>Changed permissions. The extension will now ask access to any requested URL. This is needed because of changed policy in Chrome 72 for the chrome.webRequest API. Read <a href="https://github.com/prolane/samltoawsstskeys/issues/28#issuecomment-461938267" target="_blank">here</a> for the rationale behind it. Fixes <a href="https://github.com/prolane/samltoawsstskeys/issues/28" target="_blank">#28</a>.</li>
57-
</ul>
58-
<br />
59-
<br />
55+
<ul>
56+
<li>Changed permissions. The extension will now ask access to any requested URL. This is needed because of changed policy in Chrome 72 for the chrome.webRequest API. Read <a href="https://github.com/prolane/samltoawsstskeys/issues/28#issuecomment-461938267" target="_blank">here</a> for the rationale behind it. Fixes <a href="https://github.com/prolane/samltoawsstskeys/issues/28" target="_blank">#28</a>.</li>
57+
</ul>
58+
<br />
59+
<br />
6060

61-
<h3>2019-feb-7<br>v2.6</h3>
62-
<ul>
63-
<li>Adds the option to enable debug logs</li>
64-
</ul>
65-
<br />
66-
<br />
61+
<h3>2019-feb-7<br>v2.6</h3>
62+
<ul>
63+
<li>Adds the option to enable debug logs</li>
64+
</ul>
65+
<br />
66+
<br />
6767

68-
<h3>2018-nov-15<br>v2.5</h3>
69-
<ul>
70-
<li>Implements CRLF as newlines in the credentials file when the client is on Windows. Fixes <a href="https://github.com/prolane/samltoawsstskeys/issues/21" target="_blank">#21</a></li>
71-
<li>Removes unnecessary spaces prior the newlines in credentials file. Fixes <a href="https://github.com/prolane/samltoawsstskeys/issues/14" target="_blank">#14</a></li>
72-
</ul>
73-
<br />
74-
<br />
68+
<h3>2018-nov-15<br>v2.5</h3>
69+
<ul>
70+
<li>Implements CRLF as newlines in the credentials file when the client is on Windows. Fixes <a href="https://github.com/prolane/samltoawsstskeys/issues/21" target="_blank">#21</a></li>
71+
<li>Removes unnecessary spaces prior the newlines in credentials file. Fixes <a href="https://github.com/prolane/samltoawsstskeys/issues/14" target="_blank">#14</a></li>
72+
</ul>
73+
<br />
74+
<br />
7575

76-
<h3>2018-aug-2<br>v2.4</h3>
77-
<ul>
78-
<li>Bug fix for users with one IAM role in the SAML claim. Bug was introduced with release 2.1, but according to user reports only results in an error starting with Chrome release 68.</li>
79-
</ul>
80-
<br />
81-
<br />
76+
<h3>2018-aug-2<br>v2.4</h3>
77+
<ul>
78+
<li>Bug fix for users with one IAM role in the SAML claim. Bug was introduced with release 2.1, but according to user reports only results in an error starting with Chrome release 68.</li>
79+
</ul>
80+
<br />
81+
<br />
8282

83-
<h3>2018-may-14<br>v2.3</h3>
84-
<ul>
85-
<li>Release 2.2 revealed many users have their SAML provider requesting a SessionDuration which is higher than the maximum session duration configured at the IAM Role. Release 2.3 now supports manually enabling or disabling this SessionDuration feature. The feature is enabled by default, but can be disabled in the options.</li>
86-
</ul>
87-
<br />
88-
<br />
83+
<h3>2018-may-14<br>v2.3</h3>
84+
<ul>
85+
<li>Release 2.2 revealed many users have their SAML provider requesting a SessionDuration which is higher than the maximum session duration configured at the IAM Role. Release 2.3 now supports manually enabling or disabling this SessionDuration feature. The feature is enabled by default, but can be disabled in the options.</li>
86+
</ul>
87+
<br />
88+
<br />
8989

90-
<h3>2018-may-12<br>v2.2</h3>
91-
<ul>
92-
<li>Now supports the SessionDuration SAML attribute which can be set by your IDP administrator. This can keep your credentials valid longer than the default 1 hour. Thanks to <a href="https://github.com/ashemedai" target="_blank">Jeroen</a> for his contribution!</li>
93-
</ul>
94-
<br />
95-
<br />
90+
<h3>2018-may-12<br>v2.2</h3>
91+
<ul>
92+
<li>Now supports the SessionDuration SAML attribute which can be set by your IDP administrator. This can keep your credentials valid longer than the default 1 hour. Thanks to <a href="https://github.com/ashemedai" target="_blank">Jeroen</a> for his contribution!</li>
93+
</ul>
94+
<br />
95+
<br />
9696

97-
<h3>2017-nov-01<br>v2.1</h3>
98-
<ul>
99-
<li>Bug fix: Chrome 62 broke the extension. Special thanks for <a href="https://github.com/bdruth" target="_blank">Brice</a> for contributing. Thanks to <a href="https://gitlab.com/gbvanrenswoude" target="_blank">Gijs</a> for helping out with testing.</li>
100-
</ul>
101-
<br />
102-
<br />
97+
<h3>2017-nov-01<br>v2.1</h3>
98+
<ul>
99+
<li>Bug fix: Chrome 62 broke the extension. Special thanks for <a href="https://github.com/bdruth" target="_blank">Brice</a> for contributing. Thanks to <a href="https://gitlab.com/gbvanrenswoude" target="_blank">Gijs</a> for helping out with testing.</li>
100+
</ul>
101+
<br />
102+
<br />
103103

104-
<h3>2016-nov-21<br>v2.0</h3>
105-
<ul>
106-
<li>Added functionality to specify Role ARN's in the options panel. This is meant for cross-account assume-role API calls. For each specified role temporary credentials will be fetched and added to the credentials file.</li>
107-
<li>Updated 'AWS SDK for Javascript' library to latest version</li>
108-
<li>Plugin now shows changelog to the user after the installation of new version</li>
109-
<li>Options panel has a new look to improve readability</li>
110-
</ul>
111-
<br />
112-
<br />
104+
<h3>2016-nov-21<br>v2.0</h3>
105+
<ul>
106+
<li>Added functionality to specify Role ARN's in the options panel. This is meant for cross-account assume-role API calls. For each specified role temporary credentials will be fetched and added to the credentials file.</li>
107+
<li>Updated 'AWS SDK for Javascript' library to latest version</li>
108+
<li>Plugin now shows changelog to the user after the installation of new version</li>
109+
<li>Options panel has a new look to improve readability</li>
110+
</ul>
111+
<br />
112+
<br />
113113

114-
<h3>2016-jul-24<br>v1.2</h3>
115-
<ul>
116-
<li>Bug fix: when just 1 role in the SAML Assertion available now also works well</li>
117-
<li>Now uses a regex to extract Role and Principal from SAML Assertion. This way it does not matter in what order the IDP adds the Role and Principle to the SAML Assertion.</li>
118-
</ul>
119-
<br />
120-
<br />
114+
<h3>2016-jul-24<br>v1.2</h3>
115+
<ul>
116+
<li>Bug fix: when just 1 role in the SAML Assertion available now also works well</li>
117+
<li>Now uses a regex to extract Role and Principal from SAML Assertion. This way it does not matter in what order the IDP adds the Role and Principle to the SAML Assertion.</li>
118+
</ul>
119+
<br />
120+
<br />
121121

122-
<h3>2016-apr-11<br>v1.1</h3>
123-
<ul>
124-
<li>Improved usability. No longer needed to manually specify PrincipalArn and RoleArn in options panel. Removed these options from the options panel. PrincipalArn and RoleArn is now parsed from the SAML Assertion itself.</li>
125-
</ul>
126-
<br />
127-
<br />
122+
<h3>2016-apr-11<br>v1.1</h3>
123+
<ul>
124+
<li>Improved usability. No longer needed to manually specify PrincipalArn and RoleArn in options panel. Removed these options from the options panel. PrincipalArn and RoleArn is now parsed from the SAML Assertion itself.</li>
125+
</ul>
126+
<br />
127+
<br />
128128

129-
<h3>2016-apr-04<br>v1.0</h3>
130-
<ul>
131-
<li>Initial release</li>
132-
</ul>
133-
134-
</div>
129+
<h3>2016-apr-04<br>v1.0</h3>
130+
<ul>
131+
<li>Initial release</li>
132+
</ul>
133+
134+
</div>
135135
</body>
136136
</html>

options/options.css

+19-19
Original file line numberDiff line numberDiff line change
@@ -1,54 +1,54 @@
11
div {
2-
padding: 1em;
2+
padding: 1em;
33
}
44

55
.inline-div {
6-
padding: 0em;
6+
padding: 0em;
77
}
88

99
#divTitle {
1010
display: flex;
1111
}
1212

1313
#divHeader {
14-
margin-left: 10px;
14+
margin-left: 10px;
1515
}
1616

1717
#divSettings {
18-
width: 900px;
19-
border-style: solid;
18+
width: 900px;
19+
border-style: solid;
2020
border-radius: 10px;
21-
background-color: #fef6e0;
21+
background-color: #fef6e0;
2222
}
2323

2424
.setting-part {
25-
width: 876px;
26-
border-radius: 10px;
27-
background-color: #f1c47b;
28-
margin-bottom: 14px;
25+
width: 876px;
26+
border-radius: 10px;
27+
background-color: #f1c47b;
28+
margin-bottom: 14px;
2929
}
3030

3131
label {
32-
font-weight: bold;
33-
font-family: "Segoe UI", Tahoma, sans-serif;
32+
font-weight: bold;
33+
font-family: "Segoe UI", Tahoma, sans-serif;
3434
font-size: 100%;
35-
display:inline-block;
36-
margin-bottom: 5px;
35+
display:inline-block;
36+
margin-bottom: 5px;
3737
}
3838

3939
#role_arns {
40-
margin-top: 14px;
40+
margin-top: 14px;
4141
}
4242

4343
#status {
44-
height: 15px;
45-
margin-bottom: 5px;
44+
height: 15px;
45+
margin-bottom: 5px;
4646
}
4747

4848
#divSave {
49-
padding-top: 0em;
49+
padding-top: 0em;
5050
}
5151

5252
#divChangelog {
53-
width: 600px;
53+
width: 600px;
5454
}

0 commit comments

Comments
 (0)