Skip to content

Commit 0d959f4

Browse files
Merge smithy-rs-release-1.x.y into main (#3943)
2 parents 89881ab + d1734ec commit 0d959f4

File tree

4 files changed

+126
-152
lines changed

4 files changed

+126
-152
lines changed

.changelog/1732034799.md

Lines changed: 0 additions & 28 deletions
This file was deleted.

CHANGELOG.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,7 @@
11
<!-- Do not manually edit this file. Use the `changelogger` tool. -->
2+
December 16th, 2024
3+
===================
4+
25
December 3rd, 2024
36
==================
47
**Breaking Changes:**

aws/SDK_CHANGELOG.next.json

Lines changed: 16 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -5,21 +5,6 @@
55
{
66
"smithy-rs": [],
77
"aws-sdk-rust": [
8-
{
9-
"message": "Fix minimum throughput detection for downloads to avoid incorrectly raising an error while the user is consuming data at a slow but steady pace.\n",
10-
"meta": {
11-
"bug": true,
12-
"breaking": false,
13-
"tada": false
14-
},
15-
"author": "ysaito1001",
16-
"references": [
17-
"smithy-rs#3871",
18-
"aws-sdk-rust#1202"
19-
],
20-
"since-commit": "1e803494dc1c9f1d8290cf9317ed39b026a603a2",
21-
"age": 5
22-
},
238
{
249
"message": "Client SDKs built with the `awsQueryCompatible` trait now include the `x-amzn-query-mode` header. This header signals the service that the clients are operating in compatible mode.\n",
2510
"meta": {
@@ -32,7 +17,7 @@
3217
"smithy-rs#3883"
3318
],
3419
"since-commit": "c606065c0e2e97d3cecb6a675ffc226dc488d674",
35-
"age": 4
20+
"age": 5
3621
},
3722
{
3823
"message": "Fix default credential provider chain not respecting endpoint URL overrides from environment\n",
@@ -46,7 +31,7 @@
4631
"aws-sdk-rust#1193"
4732
],
4833
"since-commit": "c606065c0e2e97d3cecb6a675ffc226dc488d674",
49-
"age": 4
34+
"age": 5
5035
},
5136
{
5237
"message": "Add auth token generator for Amazon Aurora DSQL.\n\n```rust\nuse aws_sdk_dsql::auth_token::{AuthTokenGenerator, Config};\n\n#[tokio::main]\nasync fn main() {\n let cfg = aws_config::load_defaults(BehaviorVersion::latest()).await;\n let generator = AuthTokenGenerator::new(\n Config::builder()\n .hostname(\"peccy.dsql.us-east-1.on.aws\")\n .build()\n .expect(\"cfg is valid\"),\n );\n let token = generator.auth_token(&cfg).await.unwrap();\n println!(\"{token}\");\n}\n```\n\nThe resulting token can then be used as a password when connecting to the\ndatabase server.\n",
@@ -58,6 +43,20 @@
5843
"author": "Velfi",
5944
"references": [],
6045
"since-commit": "039177d0ee6dd288ad57de2230a1110bbe7ff7d5",
46+
"age": 2
47+
},
48+
{
49+
"message": "It is now possible to disable payload signing through an operation customization.\n\n```rust\nasync fn put_example_object(client: &aws_sdk_s3::Client) {\n let res = client\n .put_object()\n .bucket(\"test-bucket\")\n .key(\"test-key\")\n .body(ByteStream::from_static(b\"Hello, world!\"))\n .customize()\n // Setting this will disable payload signing.\n .disable_payload_signing()\n .send()\n .await;\n}\n```\n\nDisabling payload signing will result in a small speedup at the cost of removing a data integrity check.\nHowever, this is an advanced feature and **may not be supported by all services/operations**.\n",
50+
"meta": {
51+
"bug": false,
52+
"breaking": false,
53+
"tada": true
54+
},
55+
"author": "Velfi",
56+
"references": [
57+
"smithy-rs#3583"
58+
],
59+
"since-commit": "89881abd3df80e9b6fd59790d7c02e2b9a6dd45c",
6160
"age": 1
6261
}
6362
],

0 commit comments

Comments
 (0)