Skip to content

Commit

Permalink
Merge pull request #275 from tilfinltd/release/2-3-2
Browse files Browse the repository at this point in the history
Release 2.3.2
  • Loading branch information
tilfin authored Nov 20, 2022
2 parents bcb959f + ed02e62 commit 0ad2b8e
Show file tree
Hide file tree
Showing 5 changed files with 40 additions and 5 deletions.
8 changes: 8 additions & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -1,6 +1,14 @@
Changelog
=========

## 2.3.2 (2022/11/20)

- Truncate the display name when the length exceeds the limit (thanks to @samhpickering)
- Fix the browser console error when the popup menu is closed
- Updating the target AWS console URLs, support new health dashboard and LightSail
- Support 'aws_account_alias' parameter on base account
- Suppress outputing an error in a browser dev tool when the option page is opened

## 2.3.1 (2022/01/30)

- Fix that 'Sign-in endpoint in current region' breaks a switch role on some page like Chatbot
Expand Down
2 changes: 1 addition & 1 deletion manifest.json
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
{
"version": "2.3.1",
"version": "2.3.2",
"name": "AWS Extend Switch Roles",
"description": "Extend your AWS IAM switching roles. You can set the configuration like aws config format",
"short_name": "Extend SwitchRole",
Expand Down
5 changes: 3 additions & 2 deletions options.html
Original file line number Diff line number Diff line change
Expand Up @@ -162,7 +162,7 @@ <h3>Complex Configuration</h3>
<p>More complex configurations involve multiple AWS accounts and/or organizations.</p>
<ul>
<li>A profile specified by the <code>source_profile</code> of the others is defined as <b>base account</b></li>
<li><b>If your account is aliased, the alias will be shown in the role dropdown after 'Account:'. You MUST use that alias as the aws_account_id for the base account instead of the numerical account id or your configuration won't work as expected.</b></li>
<li>If your account is aliased, you specify <code>aws_account_alias</code> in <b>base account</b>.</li>
<li>If an <code>role_name</code> is specified in a <b>base account</b> it will also check for the role that is used to login to AWS.
This can be used to select a subset of accounts when you are using an SSO IdP to login to AWS. If a role name starts with <i>AWSReservedSSO_</i>, the value should be only the <b>permission set</b>>** name.
</li>
Expand All @@ -173,7 +173,8 @@ <h3>Complex Configuration</h3>
</ul>
<pre>
[organization1]
aws_account_id = your-account-alias
aws_account_id = 000011112222
aws_account_alias = your-account-alias

[Org1-Account1-Role1]
role_arn = arn:aws:iam::123456789012:role/Role1
Expand Down
2 changes: 1 addition & 1 deletion package.json
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
{
"name": "aws-extend-switch-roles",
"version": "2.3.1",
"version": "2.3.2",
"description": "Extend your AWS IAM switching roles by Chrome extension",
"main": "index.js",
"directories": {
Expand Down
28 changes: 27 additions & 1 deletion updated.html
Original file line number Diff line number Diff line change
Expand Up @@ -25,13 +25,31 @@
section p { text-indent: .25em }
ul > li { padding-left: .25em; }
ol > li { padding-left: .5em }
blockquote {
border: 1px solid #666;
white-space: pre-line;
width: 22em;
padding: .4em .7em;
margin: 1em 4em;
}
</style>
</head>
<body>
<h1 style="margin:0">AWS Extend Switch Roles - Update Notice</h1>

<section>
<h2 style="color:#0099f2">Recent main updates</h2>
<h3>'aws_account_alias' parameter</h3>
<p>
Previously, when you logged in your account alias, you had to set the alias to 'aws_account_id',
but now you can specify both the account ID and the alias with <b>'aws_account_alias'</b>.
This will ensure that the target profiles are displayed regardless of whether you log in the account ID or the alias.
</p>
<blockquote>[organization1]
aws_account_id = 000011112222
aws_account_alias = your-account-alias
</blockquote>

<h3>'Sign-in endpoint in current region' setting (Experimental, Supporters only)</h3>
<p>
The 'Switch role' requests to the sign-in endpoint in the current region instead of <i>signin.aws.amazon.com</i> when you browse a non-global page in AWS Management Console.
Expand All @@ -40,7 +58,15 @@ <h3>'Sign-in endpoint in current region' setting (Experimental, Supporters only)

<hr style="margin:18px 0">

<h2>2.3.1 <span style="margin-left:0.75em; color:rgb(221, 63, 0)">New version!</span></h2>
<h2>2.3.2 <span style="margin-left:0.75em; color:rgb(221, 63, 0)">New version!</span></h2>
<ul>
<li>Truncate the display name when the length exceeds the limit</li>
<li>Fix the browser console error when the popup menu is closed</li>
<li>Updating the target AWS console URLs, support new health dashboard and LightSail</li>
<li>Support 'aws_account_alias' parameter on base account</li>
</ul>

<h2>2.3.1</h2>
<ul>
<li>Fix that 'Sign-in endpoint in current region' breaks a switch role on some page like Chatbot</li>
<li>Fix that the icon's background becomes gray if it is transparent</li>
Expand Down

0 comments on commit 0ad2b8e

Please sign in to comment.