Skip to content

Commit f0c9111

Browse files
Update changelog
1 parent 129b85d commit f0c9111

File tree

3 files changed

+74
-199
lines changed

3 files changed

+74
-199
lines changed

CHANGELOG.md

Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,21 @@
11
<!-- Do not manually edit this file. Use the `changelogger` tool. -->
2+
April 11th, 2024
3+
================
4+
**New this release:**
5+
- :tada: (all, [smithy-rs#3485](https://github.com/smithy-lang/smithy-rs/issues/3485)) Stalled stream protection now supports request upload streams. It is currently off by default, but will be enabled by default in a future release. To enable it now, you can do the following:
6+
7+
```rust
8+
let config = my_service::Config::builder()
9+
.stalled_stream_protection(StalledStreamProtectionConfig::enabled().build())
10+
// ...
11+
.build();
12+
```
13+
- :bug: (all, [smithy-rs#3427](https://github.com/smithy-lang/smithy-rs/issues/3427)) `SharedIdentityResolver` now respects an existing cache partition when the `ResolveIdentity` implementation
14+
provides one already.
15+
- :bug: (all, [smithy-rs#3485](https://github.com/smithy-lang/smithy-rs/issues/3485)) Stalled stream protection on downloads will now only trigger if the upstream source is too slow. Previously, stalled stream protection could be erroneously triggered if the user was slowly consuming the stream slower than the minimum speed limit.
16+
- :bug: (all, [smithy-rs#2546](https://github.com/smithy-lang/smithy-rs/issues/2546)) Unions with unit target member shape are now fully supported
17+
18+
219
April 2nd, 2024
320
===============
421
**Breaking Changes:**

CHANGELOG.next.toml

Lines changed: 1 addition & 67 deletions
Original file line numberDiff line numberDiff line change
@@ -9,70 +9,4 @@
99
# message = "Fix typos in module documentation for generated crates"
1010
# references = ["smithy-rs#920"]
1111
# meta = { "breaking" = false, "tada" = false, "bug" = false, "target" = "client | server | all"}
12-
# author = "rcoh"
13-
[[aws-sdk-rust]]
14-
message = """
15-
Fixes the identity resolver types (`credentials_provider()` and `token_provider()`) from `SdkConfig` to have
16-
a consistent identity cache partition when re-used across different clients.
17-
"""
18-
references = ["smithy-rs#3427"]
19-
meta = { "breaking" = false, "tada" = false, "bug" = true }
20-
authors = ["aajtodd"]
21-
22-
23-
[[smithy-rs]]
24-
message = """
25-
`SharedIdentityResolver` now respects an existing cache partition when the `ResolveIdentity` implementation
26-
provides one already.
27-
"""
28-
references = ["smithy-rs#3427"]
29-
meta = { "breaking" = false, "tada" = false, "bug" = true }
30-
authors = ["aajtodd"]
31-
32-
[[smithy-rs]]
33-
message = """
34-
Stalled stream protection now supports request upload streams. It is currently off by default, but will be enabled by default in a future release. To enable it now, you can do the following:
35-
36-
```rust
37-
let config = my_service::Config::builder()
38-
.stalled_stream_protection(StalledStreamProtectionConfig::enabled().build())
39-
// ...
40-
.build();
41-
```
42-
"""
43-
references = ["smithy-rs#3485"]
44-
meta = { "breaking" = false, "tada" = true, "bug" = false }
45-
authors = ["jdisanti"]
46-
47-
[[aws-sdk-rust]]
48-
message = """
49-
Stalled stream protection now supports request upload streams. It is currently off by default, but will be enabled by default in a future release. To enable it now, you can do the following:
50-
51-
```rust
52-
let config = aws_config::defaults(BehaviorVersion::latest())
53-
.stalled_stream_protection(StalledStreamProtectionConfig::enabled().build())
54-
.load()
55-
.await;
56-
```
57-
"""
58-
references = ["smithy-rs#3485"]
59-
meta = { "breaking" = false, "tada" = true, "bug" = false }
60-
author = "jdisanti"
61-
62-
[[smithy-rs]]
63-
message = "Stalled stream protection on downloads will now only trigger if the upstream source is too slow. Previously, stalled stream protection could be erroneously triggered if the user was slowly consuming the stream slower than the minimum speed limit."
64-
references = ["smithy-rs#3485"]
65-
meta = { "breaking" = false, "tada" = false, "bug" = true }
66-
authors = ["jdisanti"]
67-
68-
[[aws-sdk-rust]]
69-
message = "Stalled stream protection on downloads will now only trigger if the upstream source is too slow. Previously, stalled stream protection could be erroneously triggered if the user was slowly consuming the stream slower than the minimum speed limit."
70-
references = ["smithy-rs#3485"]
71-
meta = { "breaking" = false, "tada" = false, "bug" = true }
72-
author = "jdisanti"
73-
74-
[[smithy-rs]]
75-
message = "Unions with unit target member shape are now fully supported"
76-
references = ["smithy-rs#2546"]
77-
meta = { "breaking" = false, "tada" = false, "bug" = true, "target" = "all"}
78-
author = "drganjoo"
12+
# author = "rcoh"

aws/SDK_CHANGELOG.next.json

Lines changed: 56 additions & 132 deletions
Original file line numberDiff line numberDiff line change
@@ -5,124 +5,6 @@
55
{
66
"smithy-rs": [],
77
"aws-sdk-rust": [
8-
{
9-
"message": "The types in the aws-http crate were moved into aws-runtime. Deprecated type aliases were put in place to point to the new locations.",
10-
"meta": {
11-
"bug": false,
12-
"breaking": false,
13-
"tada": false
14-
},
15-
"author": "jdisanti",
16-
"references": [
17-
"smithy-rs#3355"
18-
],
19-
"since-commit": "403580262f6089c62747b20b6ed1cfc7a09e79bc",
20-
"age": 5
21-
},
22-
{
23-
"message": "Add `try_into_http1x` and `try_from_http1x` to Request and Response container types.",
24-
"meta": {
25-
"bug": false,
26-
"breaking": false,
27-
"tada": false
28-
},
29-
"author": "rcoh",
30-
"references": [
31-
"aws-sdk-rust#977",
32-
"smithy-rs#3365",
33-
"smithy-rs#3373"
34-
],
35-
"since-commit": "403580262f6089c62747b20b6ed1cfc7a09e79bc",
36-
"age": 5
37-
},
38-
{
39-
"message": "It is now possible to send customized presigned requests. You can now call `.customize().<customizations>.presigned(...).await`. Previously, only normal requests supported customization.",
40-
"meta": {
41-
"bug": false,
42-
"breaking": false,
43-
"tada": true
44-
},
45-
"author": "rcoh",
46-
"references": [
47-
"smithy-rs#3385",
48-
"aws-sdk-rust#1031"
49-
],
50-
"since-commit": "403580262f6089c62747b20b6ed1cfc7a09e79bc",
51-
"age": 5
52-
},
53-
{
54-
"message": "Added impl `Display` to Enums.",
55-
"meta": {
56-
"bug": false,
57-
"breaking": false,
58-
"tada": false
59-
},
60-
"author": "iampkmone",
61-
"references": [
62-
"smithy-rs#3336",
63-
"smithy-rs#3391"
64-
],
65-
"since-commit": "403580262f6089c62747b20b6ed1cfc7a09e79bc",
66-
"age": 5
67-
},
68-
{
69-
"message": "Retry classifiers will now be sorted by priority. This change only affects requests\nthat are retried. Some requests that were previously been classified as transient\nerrors may now be classified as throttling errors.\n\nIf you were\n\n- configuring multiple custom retry classifiers\n- that would disagree on how to classify a response\n- that have differing priorities\n\nyou may see a behavior change in that classification for the same response is now\ndependent on the classifier priority instead of the order in which the classifier\nwas added.\n",
70-
"meta": {
71-
"bug": true,
72-
"breaking": false,
73-
"tada": false
74-
},
75-
"author": "Velfi",
76-
"references": [
77-
"smithy-rs#3322"
78-
],
79-
"since-commit": "403580262f6089c62747b20b6ed1cfc7a09e79bc",
80-
"age": 5
81-
},
82-
{
83-
"message": "Cap the maximum jitter fraction for credentials cache refresh buffer time to 0.5. It was previously 1.0, and if the fraction was randomly set to 1.0, it was equivalent to disregarding the buffer time for cache refresh.",
84-
"meta": {
85-
"bug": true,
86-
"breaking": false,
87-
"tada": false
88-
},
89-
"author": "ysaito1001",
90-
"references": [
91-
"smithy-rs#3402"
92-
],
93-
"since-commit": "403580262f6089c62747b20b6ed1cfc7a09e79bc",
94-
"age": 5
95-
},
96-
{
97-
"message": "Retain the SSO token cache between calls to `provide_credentials` when using IAM Identity Center SSO via the AWS config file.",
98-
"meta": {
99-
"bug": true,
100-
"breaking": false,
101-
"tada": false
102-
},
103-
"author": "jdisanti",
104-
"references": [
105-
"smithy-rs#3387"
106-
],
107-
"since-commit": "403580262f6089c62747b20b6ed1cfc7a09e79bc",
108-
"age": 5
109-
},
110-
{
111-
"message": "Fix bug where timeout settings where not merged properly. This will add a default connect timeout of 3.1s seconds for most clients.\n\n[**For more details see the long-form changelog discussion**](https://github.com/smithy-lang/smithy-rs/discussions/3408).",
112-
"meta": {
113-
"bug": true,
114-
"breaking": true,
115-
"tada": false
116-
},
117-
"author": "rcoh",
118-
"references": [
119-
"smithy-rs#3405",
120-
"smithy-rs#3400",
121-
"smithy-rs#3258"
122-
],
123-
"since-commit": "403580262f6089c62747b20b6ed1cfc7a09e79bc",
124-
"age": 5
125-
},
1268
{
1279
"message": "The MSRV has been increase to 1.74.1",
12810
"meta": {
@@ -135,7 +17,7 @@
13517
"smithy-rs#3410"
13618
],
13719
"since-commit": "bc1e019e9a9aba438d855e660d18b6ab7d8a903c",
138-
"age": 4
20+
"age": 5
13921
},
14022
{
14123
"message": "EKS Pod Identity is now supported as part of the default ECS credential provider.",
@@ -149,7 +31,7 @@
14931
"smithy-rs#3416"
15032
],
15133
"since-commit": "c9786d6f56357348714e6c85f3f345a30d8674d8",
152-
"age": 3
34+
"age": 4
15335
},
15436
{
15537
"message": "Add support for Lambda's `InvokeWithResponseStreaming` and Bedrock Agent Runtime's `InvokeAgent` operations.",
@@ -165,7 +47,7 @@
16547
"smithy-rs#3451"
16648
],
16749
"since-commit": "c9786d6f56357348714e6c85f3f345a30d8674d8",
168-
"age": 3
50+
"age": 4
16951
},
17052
{
17153
"message": "Added support for SSO bearer token authentication. The aws-sdk-codecatalyst crate can now send requests without erroring.",
@@ -180,7 +62,7 @@
18062
"smithy-rs#3453"
18163
],
18264
"since-commit": "c9786d6f56357348714e6c85f3f345a30d8674d8",
183-
"age": 3
65+
"age": 4
18466
},
18567
{
18668
"message": "Add support for S3 Express One Zone. See [the user guide](https://github.com/awslabs/aws-sdk-rust/discussions/1091) for more details.",
@@ -195,7 +77,7 @@
19577
"smithy-rs#3465"
19678
],
19779
"since-commit": "c9786d6f56357348714e6c85f3f345a30d8674d8",
198-
"age": 3
80+
"age": 4
19981
},
20082
{
20183
"message": "`aws_sigv4::http_request::settigns::SigningSettings` adds a new setting `session_token_name_override` to allow for an alternative session token name for SigV4 signing.",
@@ -210,7 +92,7 @@
21092
"smithy-rs#3477"
21193
],
21294
"since-commit": "c9786d6f56357348714e6c85f3f345a30d8674d8",
213-
"age": 3
95+
"age": 4
21496
},
21597
{
21698
"message": "`DefaultS3ExpressIdentityProvider` now uses `BehaviorVersion` threaded through from the outer S3 client, instead of always creating `BehaviorVersion::latest()` on the fly.",
@@ -224,7 +106,7 @@
224106
"smithy-rs#3478"
225107
],
226108
"since-commit": "2561e01afca63a28b5034a99c610373f84545721",
227-
"age": 2
109+
"age": 3
228110
},
229111
{
230112
"message": "Users may now set an endpoint URL from the env or profile file:\n\n- env: `AWS_ENDPOINT_URL=\"http://localhost\"`\n- profile: `endpoint_url = http://localhost`\n\nUsers may also ignore endpoint URLs sourced from the env and profile files:\n\n- env: `AWS_IGNORE_CONFIGURED_ENDPOINT_URLS=\"true\"`\n- profile: `ignore_configured_endpoint_urls = true`\n",
@@ -238,7 +120,7 @@
238120
"smithy-rs#3488"
239121
],
240122
"since-commit": "2561e01afca63a28b5034a99c610373f84545721",
241-
"age": 2
123+
"age": 3
242124
},
243125
{
244126
"message": "Fix a bug where a `sigv4-s3express` auth scheme was incorrectly positioned at the front of `auth_scheme_options` and was used when no auth schemes were available for an endpoint.",
@@ -252,7 +134,7 @@
252134
"smithy-rs#3498"
253135
],
254136
"since-commit": "2561e01afca63a28b5034a99c610373f84545721",
255-
"age": 2
137+
"age": 3
256138
},
257139
{
258140
"message": "Ability to add an inline policy or a list of policy ARNs to the `WebIdentityTokenCredentialsProvider` builder.",
@@ -266,7 +148,7 @@
266148
"smithy-rs#3506"
267149
],
268150
"since-commit": "f19a9da9b8f79a7c448246475539c03e1bb58d7e",
269-
"age": 1
151+
"age": 2
270152
},
271153
{
272154
"message": "Make `BehaviorVersion` be future-proof by disallowing it to be constructed via the `BehaviorVersion {}` syntax.",
@@ -281,7 +163,7 @@
281163
"smithy-rs#3513"
282164
],
283165
"since-commit": "f19a9da9b8f79a7c448246475539c03e1bb58d7e",
284-
"age": 1
166+
"age": 2
285167
},
286168
{
287169
"message": "Users may now set service-specific configuration in the environment. For more information, see [this discussion topic](https://github.com/smithy-lang/smithy-rs/discussions/3537).",
@@ -295,7 +177,7 @@
295177
"smithy-rs#3493"
296178
],
297179
"since-commit": "f19a9da9b8f79a7c448246475539c03e1bb58d7e",
298-
"age": 1
180+
"age": 2
299181
},
300182
{
301183
"message": "All requests are now retryable, even if they are deserialized successfully. Previously, this was not allowed.",
@@ -309,7 +191,7 @@
309191
"smithy-rs#3389"
310192
],
311193
"since-commit": "f19a9da9b8f79a7c448246475539c03e1bb58d7e",
312-
"age": 1
194+
"age": 2
313195
},
314196
{
315197
"message": "Add FIPS support to our Hyper 1.0-based client. Customers can enable this mode by enabling the `crypto-aws-lc-fips` on `aws-smithy-experimental`. To construct a client using the new client, consult this [example](https://github.com/awslabs/aws-sdk-rust/blob/release-2024-03-29/sdk/s3/tests/hyper-10.rs).\n\nPlease note that support for Hyper 1.0 remains experimental.",
@@ -323,8 +205,50 @@
323205
"smithy-rs#3539"
324206
],
325207
"since-commit": "f19a9da9b8f79a7c448246475539c03e1bb58d7e",
208+
"age": 2
209+
},
210+
{
211+
"message": "Fixes the identity resolver types (`credentials_provider()` and `token_provider()`) from `SdkConfig` to have\na consistent identity cache partition when re-used across different clients.\n",
212+
"meta": {
213+
"bug": true,
214+
"breaking": false,
215+
"tada": false
216+
},
217+
"author": "aajtodd",
218+
"references": [
219+
"smithy-rs#3427"
220+
],
221+
"since-commit": "129b85d3187d61dbe4bac2a105ebc3411516a271",
222+
"age": 1
223+
},
224+
{
225+
"message": "Stalled stream protection now supports request upload streams. It is currently off by default, but will be enabled by default in a future release. To enable it now, you can do the following:\n\n```rust\nlet config = aws_config::defaults(BehaviorVersion::latest())\n .stalled_stream_protection(StalledStreamProtectionConfig::enabled().build())\n .load()\n .await;\n```\n",
226+
"meta": {
227+
"bug": false,
228+
"breaking": false,
229+
"tada": true
230+
},
231+
"author": "jdisanti",
232+
"references": [
233+
"smithy-rs#3485"
234+
],
235+
"since-commit": "129b85d3187d61dbe4bac2a105ebc3411516a271",
236+
"age": 1
237+
},
238+
{
239+
"message": "Stalled stream protection on downloads will now only trigger if the upstream source is too slow. Previously, stalled stream protection could be erroneously triggered if the user was slowly consuming the stream slower than the minimum speed limit.",
240+
"meta": {
241+
"bug": true,
242+
"breaking": false,
243+
"tada": false
244+
},
245+
"author": "jdisanti",
246+
"references": [
247+
"smithy-rs#3485"
248+
],
249+
"since-commit": "129b85d3187d61dbe4bac2a105ebc3411516a271",
326250
"age": 1
327251
}
328252
],
329253
"aws-sdk-model": []
330-
}
254+
}

0 commit comments

Comments
 (0)