Closed jtstrohl closed 3 years ago
I pre-released AESR V2, you can get zip files of it in #157 (comment)
Does it work with both simple and complex mode? It's not working for me on complex mode?
I pre-released AESR V2, you can get zip files of it in #157 (comment)
Does it work with both simple and complex mode? It's not working for me on complex mode?
I didn't realize at first that now you need to click the extension icon rather than the dropdown in the console. Works great for me in complex mode. Maybe that's the issue @jolcese?
I pre-released AESR V2, you can get zip files of it in #157 (comment)
Does it work with both simple and complex mode? It's not working for me on complex mode?
I didn't realize at first that now you need to click the extension icon rather than the dropdown in the console. Works great for me in complex mode. Maybe that's the issue @jolcese?
Thanks. Not sure why but now it's working on both Simple and Complex modes.
Please comment the feedback about V2 to #157 after this.
Im still having no luck on getting this plugin to work. Could it have anything todo with my config? I have divided it like this:
[master-account-1] aws_account_id = master-account-1 [profile master1-child1] role_arn = arn:aws:iam::00000000000:role/My-Role region = eu-west-1 source_profile = master-account-1 color=ff9300 [profile master1-child2] role_arn = arn:aws:iam::0000000000:role/My-Role region = eu-west-1 source_profile = master-account-1 color=ff9300 [master-account-2] aws_account_id = master-account-2 [profile im-agp] role_arn = arn:aws:iam::000000000000:role/My-Role region = eu-north-1 source_profile = master-account-2 color=ff9300
Temporarily remark ; the source_profile lines until the fix is released.
Im still having no luck on getting this plugin to work. Could it have anything todo with my config? I have divided it like this:
[master-account-1] aws_account_id = master-account-1 [profile master1-child1] role_arn = arn:aws:iam::00000000000:role/My-Role region = eu-west-1 source_profile = master-account-1 color=ff9300 [profile master1-child2] role_arn = arn:aws:iam::0000000000:role/My-Role region = eu-west-1 source_profile = master-account-1 color=ff9300 [master-account-2] aws_account_id = master-account-2 [profile im-agp] role_arn = arn:aws:iam::000000000000:role/My-Role region = eu-north-1 source_profile = master-account-2 color=ff9300
Temporarily remark ; the source_profile lines until the fix is released.
Thank you, this resolved the issue where I could jump from master account to one account but not assume a role on another account from any other account then our master. Remarking the source_profile now let me assume a role and jumping around like Im used to do. Only thing is that my color matching doesn't work in the config now. A small price to pay I guess.
I pre-released AESR V2.0.1 (rev updated), you can get zip files of it in https://github.com/tilfin/aws-extend-switch-roles/pull/157#issuecomment-694912913, and I also explained the issue about the Complex configuration and the alias account in it.
Hi I’m with the AWS Console team and we’d like to help make it easier for this third-party extension to onboard with new navigation. We’ve sent an email to the author but if there’s a different method of contact or PoC please let me know. Thanks
@kareemdarkazanli great that you're reaching out! I suspect a lot of customers having more than 5 accounts (every enterprise out there?) uses this plugin. Instead of an external plugin, it would be even better if this can be integrated natively into the AWS console. Is there an easy way for the community to raise a request and upvote this feature?
I pre-released AESR V2.0.2 (rev updated), you can get zip files of it in https://github.com/tilfin/aws-extend-switch-roles/pull/157#issuecomment-694912913,
@kareemdarkazanli One point to note as to why this plugin is so useful is that it enables orgs/teams to provide a pre-populated file to hit the ground running. If this plugin was native to the console, it would:
@tilfin thanks for your continued work, since i have used AWS, i have used this plugin/extension
What appeared to work for me is switching the role manually once by clicking on switch role and type AccountID, ROLE_ARN, and DisplayName. Logout and login and All the accounts switch roles seemed to work.
I pre-released AESR V2.0.2 (rev updated), you can get zip files of it in #157 (comment),
Do you know when you will push this into the official Chrome and Firefox extension stores? My company blocks me from using anything outside of the store and I really need this extension. We have over 150 accounts and some of us have to switch constantly between them.
I've only recently found the "Automatically assume last assumed role (Experimental)" option. That's now also broken - it keeps switching to the last role continuously.
I haven't settled on a clean situation, but the barriers are gone for now and I've released AESR V2.0.3 to the store.
Now available in Chrome Web Store https://chrome.google.com/webstore/detail/aws-extend-switch-roles/jpmkfafbacpgapdghgdpembnojdlgkdl
Now available in Firefox Browser ADD-ONS https://addons.mozilla.org/ja/firefox/addon/aws-extend-switch-roles3/
I was informed after this releases that these regions are still the old UI.
I'm releasing AESR v0.15.0 as another plugin v1 for them because I don't have an environment to test the old UI anymore. https://chrome.google.com/webstore/detail/aws-extend-switch-roles-v/mnlhnejefaknddcbndkdpnhcdbmnnmlo
All versions of Firefox ADD-ONS are available in https://addons.mozilla.org/firefox/addon/aws-extend-switch-roles3/versions/
@tilfin Many thanks for the new version! It's working nicely for us :)
If you have a GitHub account, you can star this repository. This action will contribute to the standing as my engineer. Thank you.
@tilfin the irony in this breaking is that you have gained a few stars and exposure to this repo: http://www.gitstarhistory.com/#tilfin/aws-extend-switch-roles
Is there a way to downgrade back to the prior version? I'm sure they will eventually roll out the UI changes to GovCloud, but for now that's all I work in and the update definitely doesn't work in GovCloud. Thanks again for creating this - it's a huge time saver!
@askaem See the above https://github.com/tilfin/aws-extend-switch-roles/issues/156#issuecomment-698073728
Hi,
At my company we're still having issues. When I use my normal Chrome I see my roles and things work, it just looks funky still, which is nbd.
But when I create a new Chrome profile, install the plugin, and copy the config from my first profile, it doesn't seem to work:
Ok, I found that my new profile's plugin works after I manually switch roles one time.
Feel free to issue new one with V2 label.
This AWS Extend Switch Roles plugin, my most beloved Chrome plugin of all time, appears to be broken after an update was released to the AWS Console -- literally minutes ago. All of the sudden, the username dropdown menu (top right) only displays the last 5 roles in my history and no longer displays my entire list of account/roles configured for the plugin, even though I have configured it to hide original role history.
I hope this is a simple fix!