diff --git a/CHANGELOG.md b/CHANGELOG.md index 0ccafaf7f76c1c43152d2b19e12e3d9500321c19..b1b26f704caef8ff06be15f0d5451822c90b0f2a 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -1,4 +1,7 @@ +January 24th, 2024 +================== + January 18th, 2024 ================== **New this release:** diff --git a/CHANGELOG.next.toml b/CHANGELOG.next.toml index 1c5a362d1d4996fe9898a6be2dc19e975588069a..fc4c4c2578b5c5f185517bd30b00e87999da307c 100644 --- a/CHANGELOG.next.toml +++ b/CHANGELOG.next.toml @@ -9,16 +9,4 @@ # message = "Fix typos in module documentation for generated crates" # references = ["smithy-rs#920"] # meta = { "breaking" = false, "tada" = false, "bug" = false, "target" = "client | server | all"} -# author = "rcoh" - -[[aws-sdk-rust]] -message = "The types in the aws-http crate were moved into aws-runtime. Deprecated type aliases were put in place to point to the new locations." -references = ["smithy-rs#3355"] -meta = { "breaking" = false, "tada" = false, "bug" = false } -author = "jdisanti" - -[[aws-sdk-rust]] -message = "Add support for `[sso-session]` in AWS config file for AWS Identity Center SSO credentials. Note that this does not include support for AWS Builder ID SSO sessions for services such as Code Catalyst (these lack the `sso_account_id` and `sso_role_name` fields in the profile config). Support for AWS Builder IDs is still being tracked in https://github.com/awslabs/aws-sdk-rust/issues/703." -references = ["aws-sdk-rust#703", "smithy-rs#3379"] -meta = { "breaking" = false, "tada" = true, "bug" = false } -author = "jdisanti" +# author = "rcoh" \ No newline at end of file diff --git a/aws/SDK_CHANGELOG.next.json b/aws/SDK_CHANGELOG.next.json index 298b0700c636ec907415596e69866e9af31b125e..6b8f55bba9d92673d4f9943ffdbf94d76b8c0e56 100644 --- a/aws/SDK_CHANGELOG.next.json +++ b/aws/SDK_CHANGELOG.next.json @@ -5,95 +5,6 @@ { "smithy-rs": [], "aws-sdk-rust": [ - { - "message": "Loading native TLS trusted certs for the default HTTP client now only occurs if the default HTTP client is not overridden in config.", - "meta": { - "bug": true, - "breaking": false, - "tada": false - }, - "author": "jdisanti", - "references": [ - "smithy-rs#3262" - ], - "since-commit": "fc335cbc87e70aa63895828fca55b51795b94a6c", - "age": 5 - }, - { - "message": "Client creation now takes microseconds instead of milliseconds.\nPreviously, it would take 2-3 milliseconds for each client instantiation due to time spent compiling regexes.\nFor applications that used several clients, this would increase start-up time in cases where it really matters,\nsuch as for AWS Lambda cold starts. This time was improved by both changing regex implementation and caching the\nresult of the compilation.", - "meta": { - "bug": false, - "breaking": false, - "tada": true - }, - "author": "jdisanti", - "references": [ - "aws-sdk-rust#975", - "smithy-rs#3269" - ], - "since-commit": "fc335cbc87e70aa63895828fca55b51795b94a6c", - "age": 5 - }, - { - "message": "Add `test_credentials` to `ConfigLoader` in `aws_config`. This allows the following pattern during tests:\n\n```rust\nasync fn main() {\n let conf = aws_config::defaults(BehaviorVersion::latest())\n .test_credentials()\n .await;\n}\n```\n\nThis is designed for unit tests and using local mocks like DynamoDB Local and LocalStack with the SDK.\n", - "meta": { - "bug": false, - "breaking": false, - "tada": true - }, - "author": "rcoh", - "references": [ - "smithy-rs#3279", - "aws-sdk-rust#971" - ], - "since-commit": "fc335cbc87e70aa63895828fca55b51795b94a6c", - "age": 5 - }, - { - "message": "Improve the error messages for when auth fails to select an auth scheme for a request.", - "meta": { - "bug": false, - "breaking": false, - "tada": false - }, - "author": "jdisanti", - "references": [ - "aws-sdk-rust#979", - "smithy-rs#3277" - ], - "since-commit": "fc335cbc87e70aa63895828fca55b51795b94a6c", - "age": 5 - }, - { - "message": "Fix documentation and examples on HyperConnector and HyperClientBuilder.", - "meta": { - "bug": false, - "breaking": false, - "tada": false - }, - "author": "jdisanti", - "references": [ - "aws-sdk-rust#986", - "smithy-rs#3282" - ], - "since-commit": "fc335cbc87e70aa63895828fca55b51795b94a6c", - "age": 5 - }, - { - "message": "All generated docs now include docsrs labels when features are required", - "meta": { - "bug": false, - "breaking": false, - "tada": true - }, - "author": "rcoh", - "references": [ - "smithy-rs#3121", - "smithy-rs#3295" - ], - "since-commit": "fc335cbc87e70aa63895828fca55b51795b94a6c", - "age": 5 - }, { "message": "`crate::event_receiver::EventReceiver` is now re-exported as `crate::primitives::event_stream::EventReceiver` when a service supports event stream operations.", "meta": { @@ -106,7 +17,7 @@ "smithy-rs#3305" ], "since-commit": "9f0ba850e03241f657e2e40ca185780e0a5878cb", - "age": 4 + "age": 5 }, { "message": "Add support for constructing [`SdkBody`] and [`ByteStream`] from `http-body` 1.0 bodies. Note that this is initial support and works via a backwards compatibility shim to http-body 0.4. Hyper 1.0 is not supported.", @@ -121,7 +32,7 @@ "aws-sdk-rust#977" ], "since-commit": "e235a2fd9ec45335a3b2018028c2d3a2ac13ffdf", - "age": 2 + "age": 3 }, { "message": " Add `PaginationStreamExt` extension trait to `aws-smithy-types-convert` behind the `convert-streams` feature. This makes it possible to treat a paginator as a [`futures_core::Stream`](https://docs.rs/futures-core/latest/futures_core/stream/trait.Stream.html), allowing customers to use stream combinators like [`map`](https://docs.rs/tokio-stream/latest/tokio_stream/trait.StreamExt.html#method.map) and [`filter`](https://docs.rs/tokio-stream/latest/tokio_stream/trait.StreamExt.html#method.filter).\n\nExample:\n\n```rust\nuse aws_smithy_types_convert::stream::PaginationStreamExt\nlet stream = s3_client.list_objects_v2().bucket(\"...\").into_paginator().send().into_stream_03x();\n```\n", @@ -135,7 +46,7 @@ "smithy-rs#3299" ], "since-commit": "e235a2fd9ec45335a3b2018028c2d3a2ac13ffdf", - "age": 2 + "age": 3 }, { "message": "Serialize 0/false in query parameters, and ignore actual default value during serialization instead of just 0/false. See [changelog discussion](https://github.com/smithy-lang/smithy-rs/discussions/3312) for details.", @@ -150,7 +61,7 @@ "smithy-rs#3312" ], "since-commit": "e235a2fd9ec45335a3b2018028c2d3a2ac13ffdf", - "age": 2 + "age": 3 }, { "message": "Add `as_service_err()` to `SdkError` to allow checking the type of an error is without taking ownership.", @@ -166,7 +77,7 @@ "aws-sdk-rust#1010" ], "since-commit": "e235a2fd9ec45335a3b2018028c2d3a2ac13ffdf", - "age": 2 + "age": 3 }, { "message": "Fix bug in `CredentialsProcess` provider where `expiry` was incorrectly treated as a required field.", @@ -181,7 +92,7 @@ "aws-sdk-rust#1021" ], "since-commit": "e235a2fd9ec45335a3b2018028c2d3a2ac13ffdf", - "age": 2 + "age": 3 }, { "message": "~/.aws/config and ~/.aws/credentials now parse keys in a case-insensitive way. This means the `AWS_SECRET_ACCESS_KEY` is supported in addition to `aws_secret_access_key`.", @@ -197,7 +108,7 @@ "smithy-rs#3344" ], "since-commit": "e235a2fd9ec45335a3b2018028c2d3a2ac13ffdf", - "age": 2 + "age": 3 }, { "message": "`EndpointPrefix` and `apply_endpoint` moved from aws-smithy-http to aws-smithy-runtime-api so that is in a stable (1.x) crate. A deprecated type alias was left in place with a note showing the new location.", @@ -211,7 +122,7 @@ "smithy-rs#3318" ], "since-commit": "edf6e77bfa991aef9afa5acf293a911f7982511a", - "age": 1 + "age": 2 }, { "message": "Fix bug where overriding the credentials at the operation level failed if credentials were already set.", @@ -226,7 +137,7 @@ "smithy-rs#3363" ], "since-commit": "edf6e77bfa991aef9afa5acf293a911f7982511a", - "age": 1 + "age": 2 }, { "message": "Add `apply_to_request_http1x` to `aws-sigv4` to enable signing http = 1.0 requests.", @@ -241,6 +152,35 @@ "smithy-rs#3366" ], "since-commit": "edf6e77bfa991aef9afa5acf293a911f7982511a", + "age": 2 + }, + { + "message": "The types in the aws-http crate were moved into aws-runtime. Deprecated type aliases were put in place to point to the new locations.", + "meta": { + "bug": false, + "breaking": false, + "tada": false + }, + "author": "jdisanti", + "references": [ + "smithy-rs#3355" + ], + "since-commit": "a781be3cd8d22f4ebb5c06a758ddd5f1d6824ded", + "age": 1 + }, + { + "message": "Add support for `[sso-session]` in AWS config file for AWS Identity Center SSO credentials. Note that this does not include support for AWS Builder ID SSO sessions for services such as Code Catalyst (these lack the `sso_account_id` and `sso_role_name` fields in the profile config). Support for AWS Builder IDs is still being tracked in https://github.com/awslabs/aws-sdk-rust/issues/703.", + "meta": { + "bug": false, + "breaking": false, + "tada": true + }, + "author": "jdisanti", + "references": [ + "aws-sdk-rust#703", + "smithy-rs#3379" + ], + "since-commit": "a781be3cd8d22f4ebb5c06a758ddd5f1d6824ded", "age": 1 } ],