diff --git a/CHANGELOG.md b/CHANGELOG.md index b1c442816dbb6c268553d051ea9f7a1aa59d6143..c7554bc3099c381720b76083a814b516726609c5 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -1,4 +1,14 @@ +March 25th, 2024 +================ +**New this release:** +- (all, [smithy-rs#3476](https://github.com/smithy-lang/smithy-rs/issues/3476), @landonxjames) Increased minimum version of wasi crate dependency in aws-smithy-wasm to 0.12.1. + +**Contributors** +Thank you for your contributions! ❤ +- @landonxjames ([smithy-rs#3476](https://github.com/smithy-lang/smithy-rs/issues/3476)) + + March 12th, 2024 ================ **New this release:** diff --git a/CHANGELOG.next.toml b/CHANGELOG.next.toml index a34e8565f0164059741939d9eb66c6bb103329c3..fc4c4c2578b5c5f185517bd30b00e87999da307c 100644 --- a/CHANGELOG.next.toml +++ b/CHANGELOG.next.toml @@ -9,43 +9,4 @@ # message = "Fix typos in module documentation for generated crates" # references = ["smithy-rs#920"] # meta = { "breaking" = false, "tada" = false, "bug" = false, "target" = "client | server | all"} -# author = "rcoh" - -[[aws-smithy-mocks-experimental]] -message = "Replace `enforce_order(bool)` with `enum RuleMode`" -references = ["smithy-rs#3502", "awsdocs/aws-doc-sdk-examples#6264"] -meta = { "breaking" = true, "tada" = false, "bug" = false } - -[[smithy-rs]] -message = "Increased minimum version of wasi crate dependency in aws-smithy-wasm to 0.12.1." -references = ["smithy-rs#3476"] -meta = { "breaking" = false, "tada" = false, "bug" = false } -authors = ["landonxjames"] - -[[aws-sdk-rust]] -message = "`DefaultS3ExpressIdentityProvider` now uses `BehaviorVersion` threaded through from the outer S3 client, instead of always creating `BehaviorVersion::latest()` on the fly." -references = ["smithy-rs#3478"] -meta = { "breaking" = false, "bug" = true, "tada" = false } -author = "ysaito1001" - -[[aws-sdk-rust]] -message = """ -Users may now set an endpoint URL from the env or profile file: - -- env: `AWS_ENDPOINT_URL="http://localhost"` -- profile: `endpoint_url = http://localhost` - -Users may also ignore endpoint URLs sourced from the env and profile files: - -- env: `AWS_IGNORE_CONFIGURED_ENDPOINT_URLS="true"` -- profile: `ignore_configured_endpoint_urls = true` -""" -references = ["smithy-rs#3488"] -meta = { "breaking" = false, "tada" = true, "bug" = false } -authors = ["Velfi"] - -[[aws-sdk-rust]] -message = "Fix a bug where a `sigv4-s3express` auth scheme was incorrectly positioned at the front of `auth_scheme_options` and was used when no auth schemes were available for an endpoint." -references = ["smithy-rs#3498"] -meta = { "breaking" = false, "bug" = true, "tada" = false } -author = "ysaito1001" +# author = "rcoh" \ No newline at end of file diff --git a/aws/SDK_CHANGELOG.next.json b/aws/SDK_CHANGELOG.next.json index 94fa0069064f0de32c3a80bf66a51c478b718b06..4a0150b8b65e476aae3a861653f57ae8846859d4 100644 --- a/aws/SDK_CHANGELOG.next.json +++ b/aws/SDK_CHANGELOG.next.json @@ -5,35 +5,6 @@ { "smithy-rs": [], "aws-sdk-rust": [ - { - "message": "The types in the aws-http crate were moved into aws-runtime. Deprecated type aliases were put in place to point to the new locations.", - "meta": { - "bug": false, - "breaking": false, - "tada": false - }, - "author": "jdisanti", - "references": [ - "smithy-rs#3355" - ], - "since-commit": "a781be3cd8d22f4ebb5c06a758ddd5f1d6824ded", - "age": 5 - }, - { - "message": "Add support for `[sso-session]` in AWS config file for AWS Identity Center SSO credentials. Note that this does not include support for AWS Builder ID SSO sessions for services such as Code Catalyst (these lack the `sso_account_id` and `sso_role_name` fields in the profile config). Support for AWS Builder IDs is still being tracked in https://github.com/awslabs/aws-sdk-rust/issues/703.", - "meta": { - "bug": false, - "breaking": false, - "tada": true - }, - "author": "jdisanti", - "references": [ - "aws-sdk-rust#703", - "smithy-rs#3379" - ], - "since-commit": "a781be3cd8d22f4ebb5c06a758ddd5f1d6824ded", - "age": 5 - }, { "message": "The types in the aws-http crate were moved into aws-runtime. Deprecated type aliases were put in place to point to the new locations.", "meta": { @@ -46,7 +17,7 @@ "smithy-rs#3355" ], "since-commit": "403580262f6089c62747b20b6ed1cfc7a09e79bc", - "age": 3 + "age": 4 }, { "message": "Add `try_into_http1x` and `try_from_http1x` to Request and Response container types.", @@ -62,7 +33,7 @@ "smithy-rs#3373" ], "since-commit": "403580262f6089c62747b20b6ed1cfc7a09e79bc", - "age": 3 + "age": 4 }, { "message": "It is now possible to send customized presigned requests. You can now call `.customize()..presigned(...).await`. Previously, only normal requests supported customization.", @@ -77,7 +48,7 @@ "aws-sdk-rust#1031" ], "since-commit": "403580262f6089c62747b20b6ed1cfc7a09e79bc", - "age": 3 + "age": 4 }, { "message": "Added impl `Display` to Enums.", @@ -92,7 +63,7 @@ "smithy-rs#3391" ], "since-commit": "403580262f6089c62747b20b6ed1cfc7a09e79bc", - "age": 3 + "age": 4 }, { "message": "Retry classifiers will now be sorted by priority. This change only affects requests\nthat are retried. Some requests that were previously been classified as transient\nerrors may now be classified as throttling errors.\n\nIf you were\n\n- configuring multiple custom retry classifiers\n- that would disagree on how to classify a response\n- that have differing priorities\n\nyou may see a behavior change in that classification for the same response is now\ndependent on the classifier priority instead of the order in which the classifier\nwas added.\n", @@ -106,7 +77,7 @@ "smithy-rs#3322" ], "since-commit": "403580262f6089c62747b20b6ed1cfc7a09e79bc", - "age": 3 + "age": 4 }, { "message": "Cap the maximum jitter fraction for credentials cache refresh buffer time to 0.5. It was previously 1.0, and if the fraction was randomly set to 1.0, it was equivalent to disregarding the buffer time for cache refresh.", @@ -120,7 +91,7 @@ "smithy-rs#3402" ], "since-commit": "403580262f6089c62747b20b6ed1cfc7a09e79bc", - "age": 3 + "age": 4 }, { "message": "Retain the SSO token cache between calls to `provide_credentials` when using IAM Identity Center SSO via the AWS config file.", @@ -134,7 +105,7 @@ "smithy-rs#3387" ], "since-commit": "403580262f6089c62747b20b6ed1cfc7a09e79bc", - "age": 3 + "age": 4 }, { "message": "Fix bug where timeout settings where not merged properly. This will add a default connect timeout of 3.1s seconds for most clients.\n\n[**For more details see the long-form changelog discussion**](https://github.com/smithy-lang/smithy-rs/discussions/3408).", @@ -150,7 +121,7 @@ "smithy-rs#3258" ], "since-commit": "403580262f6089c62747b20b6ed1cfc7a09e79bc", - "age": 3 + "age": 4 }, { "message": "The MSRV has been increase to 1.74.1", @@ -164,7 +135,7 @@ "smithy-rs#3410" ], "since-commit": "bc1e019e9a9aba438d855e660d18b6ab7d8a903c", - "age": 2 + "age": 3 }, { "message": "EKS Pod Identity is now supported as part of the default ECS credential provider.", @@ -178,7 +149,7 @@ "smithy-rs#3416" ], "since-commit": "c9786d6f56357348714e6c85f3f345a30d8674d8", - "age": 1 + "age": 2 }, { "message": "Add support for Lambda's `InvokeWithResponseStreaming` and Bedrock Agent Runtime's `InvokeAgent` operations.", @@ -194,7 +165,7 @@ "smithy-rs#3451" ], "since-commit": "c9786d6f56357348714e6c85f3f345a30d8674d8", - "age": 1 + "age": 2 }, { "message": "Added support for SSO bearer token authentication. The aws-sdk-codecatalyst crate can now send requests without erroring.", @@ -209,7 +180,7 @@ "smithy-rs#3453" ], "since-commit": "c9786d6f56357348714e6c85f3f345a30d8674d8", - "age": 1 + "age": 2 }, { "message": "Add support for S3 Express One Zone. See [the user guide](https://github.com/awslabs/aws-sdk-rust/discussions/1091) for more details.", @@ -224,7 +195,7 @@ "smithy-rs#3465" ], "since-commit": "c9786d6f56357348714e6c85f3f345a30d8674d8", - "age": 1 + "age": 2 }, { "message": "`aws_sigv4::http_request::settigns::SigningSettings` adds a new setting `session_token_name_override` to allow for an alternative session token name for SigV4 signing.", @@ -239,6 +210,48 @@ "smithy-rs#3477" ], "since-commit": "c9786d6f56357348714e6c85f3f345a30d8674d8", + "age": 2 + }, + { + "message": "`DefaultS3ExpressIdentityProvider` now uses `BehaviorVersion` threaded through from the outer S3 client, instead of always creating `BehaviorVersion::latest()` on the fly.", + "meta": { + "bug": true, + "breaking": false, + "tada": false + }, + "author": "ysaito1001", + "references": [ + "smithy-rs#3478" + ], + "since-commit": "2561e01afca63a28b5034a99c610373f84545721", + "age": 1 + }, + { + "message": "Users may now set an endpoint URL from the env or profile file:\n\n- env: `AWS_ENDPOINT_URL=\"http://localhost\"`\n- profile: `endpoint_url = http://localhost`\n\nUsers may also ignore endpoint URLs sourced from the env and profile files:\n\n- env: `AWS_IGNORE_CONFIGURED_ENDPOINT_URLS=\"true\"`\n- profile: `ignore_configured_endpoint_urls = true`\n", + "meta": { + "bug": false, + "breaking": false, + "tada": true + }, + "author": "Velfi", + "references": [ + "smithy-rs#3488" + ], + "since-commit": "2561e01afca63a28b5034a99c610373f84545721", + "age": 1 + }, + { + "message": "Fix a bug where a `sigv4-s3express` auth scheme was incorrectly positioned at the front of `auth_scheme_options` and was used when no auth schemes were available for an endpoint.", + "meta": { + "bug": true, + "breaking": false, + "tada": false + }, + "author": "ysaito1001", + "references": [ + "smithy-rs#3498" + ], + "since-commit": "2561e01afca63a28b5034a99c610373f84545721", "age": 1 } ],