diff --git a/CHANGELOG.md b/CHANGELOG.md index 2268033abe38d9905b174a63688e106f5190db81..693654672f58e3602e07937f56ff9eb1c58fbf02 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -1,4 +1,21 @@ +April 11th, 2024 +================ +**New this release:** +- :tada: (all, [smithy-rs#3485](https://github.com/smithy-lang/smithy-rs/issues/3485)) Stalled stream protection now supports request upload streams. It is currently off by default, but will be enabled by default in a future release. To enable it now, you can do the following: + + ```rust + let config = my_service::Config::builder() + .stalled_stream_protection(StalledStreamProtectionConfig::enabled().build()) + // ... + .build(); + ``` +- :bug: (all, [smithy-rs#3427](https://github.com/smithy-lang/smithy-rs/issues/3427)) `SharedIdentityResolver` now respects an existing cache partition when the `ResolveIdentity` implementation + provides one already. +- :bug: (all, [smithy-rs#3485](https://github.com/smithy-lang/smithy-rs/issues/3485)) Stalled stream protection on downloads will now only trigger if the upstream source is too slow. Previously, stalled stream protection could be erroneously triggered if the user was slowly consuming the stream slower than the minimum speed limit. +- :bug: (all, [smithy-rs#2546](https://github.com/smithy-lang/smithy-rs/issues/2546)) Unions with unit target member shape are now fully supported + + April 2nd, 2024 =============== **Breaking Changes:** diff --git a/CHANGELOG.next.toml b/CHANGELOG.next.toml index 3329c03d2745b98b02f3bb8da73705353483c213..fc4c4c2578b5c5f185517bd30b00e87999da307c 100644 --- a/CHANGELOG.next.toml +++ b/CHANGELOG.next.toml @@ -9,70 +9,4 @@ # message = "Fix typos in module documentation for generated crates" # references = ["smithy-rs#920"] # meta = { "breaking" = false, "tada" = false, "bug" = false, "target" = "client | server | all"} -# author = "rcoh" -[[aws-sdk-rust]] -message = """ -Fixes the identity resolver types (`credentials_provider()` and `token_provider()`) from `SdkConfig` to have -a consistent identity cache partition when re-used across different clients. -""" -references = ["smithy-rs#3427"] -meta = { "breaking" = false, "tada" = false, "bug" = true } -authors = ["aajtodd"] - - -[[smithy-rs]] -message = """ -`SharedIdentityResolver` now respects an existing cache partition when the `ResolveIdentity` implementation -provides one already. -""" -references = ["smithy-rs#3427"] -meta = { "breaking" = false, "tada" = false, "bug" = true } -authors = ["aajtodd"] - -[[smithy-rs]] -message = """ -Stalled stream protection now supports request upload streams. It is currently off by default, but will be enabled by default in a future release. To enable it now, you can do the following: - -```rust -let config = my_service::Config::builder() - .stalled_stream_protection(StalledStreamProtectionConfig::enabled().build()) - // ... - .build(); -``` -""" -references = ["smithy-rs#3485"] -meta = { "breaking" = false, "tada" = true, "bug" = false } -authors = ["jdisanti"] - -[[aws-sdk-rust]] -message = """ -Stalled stream protection now supports request upload streams. It is currently off by default, but will be enabled by default in a future release. To enable it now, you can do the following: - -```rust -let config = aws_config::defaults(BehaviorVersion::latest()) - .stalled_stream_protection(StalledStreamProtectionConfig::enabled().build()) - .load() - .await; -``` -""" -references = ["smithy-rs#3485"] -meta = { "breaking" = false, "tada" = true, "bug" = false } -author = "jdisanti" - -[[smithy-rs]] -message = "Stalled stream protection on downloads will now only trigger if the upstream source is too slow. Previously, stalled stream protection could be erroneously triggered if the user was slowly consuming the stream slower than the minimum speed limit." -references = ["smithy-rs#3485"] -meta = { "breaking" = false, "tada" = false, "bug" = true } -authors = ["jdisanti"] - -[[aws-sdk-rust]] -message = "Stalled stream protection on downloads will now only trigger if the upstream source is too slow. Previously, stalled stream protection could be erroneously triggered if the user was slowly consuming the stream slower than the minimum speed limit." -references = ["smithy-rs#3485"] -meta = { "breaking" = false, "tada" = false, "bug" = true } -author = "jdisanti" - -[[smithy-rs]] -message = "Unions with unit target member shape are now fully supported" -references = ["smithy-rs#2546"] -meta = { "breaking" = false, "tada" = false, "bug" = true, "target" = "all"} -author = "drganjoo" +# author = "rcoh" \ No newline at end of file diff --git a/aws/SDK_CHANGELOG.next.json b/aws/SDK_CHANGELOG.next.json index 69a1e9e1e0bbf8de1cce2f018d16c9f85b368253..d397840248def90eac4a1f3220d3483b9a6ddfb0 100644 --- a/aws/SDK_CHANGELOG.next.json +++ b/aws/SDK_CHANGELOG.next.json @@ -5,124 +5,6 @@ { "smithy-rs": [], "aws-sdk-rust": [ - { - "message": "The types in the aws-http crate were moved into aws-runtime. Deprecated type aliases were put in place to point to the new locations.", - "meta": { - "bug": false, - "breaking": false, - "tada": false - }, - "author": "jdisanti", - "references": [ - "smithy-rs#3355" - ], - "since-commit": "403580262f6089c62747b20b6ed1cfc7a09e79bc", - "age": 5 - }, - { - "message": "Add `try_into_http1x` and `try_from_http1x` to Request and Response container types.", - "meta": { - "bug": false, - "breaking": false, - "tada": false - }, - "author": "rcoh", - "references": [ - "aws-sdk-rust#977", - "smithy-rs#3365", - "smithy-rs#3373" - ], - "since-commit": "403580262f6089c62747b20b6ed1cfc7a09e79bc", - "age": 5 - }, - { - "message": "It is now possible to send customized presigned requests. You can now call `.customize()..presigned(...).await`. Previously, only normal requests supported customization.", - "meta": { - "bug": false, - "breaking": false, - "tada": true - }, - "author": "rcoh", - "references": [ - "smithy-rs#3385", - "aws-sdk-rust#1031" - ], - "since-commit": "403580262f6089c62747b20b6ed1cfc7a09e79bc", - "age": 5 - }, - { - "message": "Added impl `Display` to Enums.", - "meta": { - "bug": false, - "breaking": false, - "tada": false - }, - "author": "iampkmone", - "references": [ - "smithy-rs#3336", - "smithy-rs#3391" - ], - "since-commit": "403580262f6089c62747b20b6ed1cfc7a09e79bc", - "age": 5 - }, - { - "message": "Retry classifiers will now be sorted by priority. This change only affects requests\nthat are retried. Some requests that were previously been classified as transient\nerrors may now be classified as throttling errors.\n\nIf you were\n\n- configuring multiple custom retry classifiers\n- that would disagree on how to classify a response\n- that have differing priorities\n\nyou may see a behavior change in that classification for the same response is now\ndependent on the classifier priority instead of the order in which the classifier\nwas added.\n", - "meta": { - "bug": true, - "breaking": false, - "tada": false - }, - "author": "Velfi", - "references": [ - "smithy-rs#3322" - ], - "since-commit": "403580262f6089c62747b20b6ed1cfc7a09e79bc", - "age": 5 - }, - { - "message": "Cap the maximum jitter fraction for credentials cache refresh buffer time to 0.5. It was previously 1.0, and if the fraction was randomly set to 1.0, it was equivalent to disregarding the buffer time for cache refresh.", - "meta": { - "bug": true, - "breaking": false, - "tada": false - }, - "author": "ysaito1001", - "references": [ - "smithy-rs#3402" - ], - "since-commit": "403580262f6089c62747b20b6ed1cfc7a09e79bc", - "age": 5 - }, - { - "message": "Retain the SSO token cache between calls to `provide_credentials` when using IAM Identity Center SSO via the AWS config file.", - "meta": { - "bug": true, - "breaking": false, - "tada": false - }, - "author": "jdisanti", - "references": [ - "smithy-rs#3387" - ], - "since-commit": "403580262f6089c62747b20b6ed1cfc7a09e79bc", - "age": 5 - }, - { - "message": "Fix bug where timeout settings where not merged properly. This will add a default connect timeout of 3.1s seconds for most clients.\n\n[**For more details see the long-form changelog discussion**](https://github.com/smithy-lang/smithy-rs/discussions/3408).", - "meta": { - "bug": true, - "breaking": true, - "tada": false - }, - "author": "rcoh", - "references": [ - "smithy-rs#3405", - "smithy-rs#3400", - "smithy-rs#3258" - ], - "since-commit": "403580262f6089c62747b20b6ed1cfc7a09e79bc", - "age": 5 - }, { "message": "The MSRV has been increase to 1.74.1", "meta": { @@ -135,7 +17,7 @@ "smithy-rs#3410" ], "since-commit": "bc1e019e9a9aba438d855e660d18b6ab7d8a903c", - "age": 4 + "age": 5 }, { "message": "EKS Pod Identity is now supported as part of the default ECS credential provider.", @@ -149,7 +31,7 @@ "smithy-rs#3416" ], "since-commit": "c9786d6f56357348714e6c85f3f345a30d8674d8", - "age": 3 + "age": 4 }, { "message": "Add support for Lambda's `InvokeWithResponseStreaming` and Bedrock Agent Runtime's `InvokeAgent` operations.", @@ -165,7 +47,7 @@ "smithy-rs#3451" ], "since-commit": "c9786d6f56357348714e6c85f3f345a30d8674d8", - "age": 3 + "age": 4 }, { "message": "Added support for SSO bearer token authentication. The aws-sdk-codecatalyst crate can now send requests without erroring.", @@ -180,7 +62,7 @@ "smithy-rs#3453" ], "since-commit": "c9786d6f56357348714e6c85f3f345a30d8674d8", - "age": 3 + "age": 4 }, { "message": "Add support for S3 Express One Zone. See [the user guide](https://github.com/awslabs/aws-sdk-rust/discussions/1091) for more details.", @@ -195,7 +77,7 @@ "smithy-rs#3465" ], "since-commit": "c9786d6f56357348714e6c85f3f345a30d8674d8", - "age": 3 + "age": 4 }, { "message": "`aws_sigv4::http_request::settigns::SigningSettings` adds a new setting `session_token_name_override` to allow for an alternative session token name for SigV4 signing.", @@ -210,7 +92,7 @@ "smithy-rs#3477" ], "since-commit": "c9786d6f56357348714e6c85f3f345a30d8674d8", - "age": 3 + "age": 4 }, { "message": "`DefaultS3ExpressIdentityProvider` now uses `BehaviorVersion` threaded through from the outer S3 client, instead of always creating `BehaviorVersion::latest()` on the fly.", @@ -224,7 +106,7 @@ "smithy-rs#3478" ], "since-commit": "2561e01afca63a28b5034a99c610373f84545721", - "age": 2 + "age": 3 }, { "message": "Users may now set an endpoint URL from the env or profile file:\n\n- env: `AWS_ENDPOINT_URL=\"http://localhost\"`\n- profile: `endpoint_url = http://localhost`\n\nUsers may also ignore endpoint URLs sourced from the env and profile files:\n\n- env: `AWS_IGNORE_CONFIGURED_ENDPOINT_URLS=\"true\"`\n- profile: `ignore_configured_endpoint_urls = true`\n", @@ -238,7 +120,7 @@ "smithy-rs#3488" ], "since-commit": "2561e01afca63a28b5034a99c610373f84545721", - "age": 2 + "age": 3 }, { "message": "Fix a bug where a `sigv4-s3express` auth scheme was incorrectly positioned at the front of `auth_scheme_options` and was used when no auth schemes were available for an endpoint.", @@ -252,7 +134,7 @@ "smithy-rs#3498" ], "since-commit": "2561e01afca63a28b5034a99c610373f84545721", - "age": 2 + "age": 3 }, { "message": "Ability to add an inline policy or a list of policy ARNs to the `WebIdentityTokenCredentialsProvider` builder.", @@ -266,7 +148,7 @@ "smithy-rs#3506" ], "since-commit": "f19a9da9b8f79a7c448246475539c03e1bb58d7e", - "age": 1 + "age": 2 }, { "message": "Make `BehaviorVersion` be future-proof by disallowing it to be constructed via the `BehaviorVersion {}` syntax.", @@ -281,7 +163,7 @@ "smithy-rs#3513" ], "since-commit": "f19a9da9b8f79a7c448246475539c03e1bb58d7e", - "age": 1 + "age": 2 }, { "message": "Users may now set service-specific configuration in the environment. For more information, see [this discussion topic](https://github.com/smithy-lang/smithy-rs/discussions/3537).", @@ -295,7 +177,7 @@ "smithy-rs#3493" ], "since-commit": "f19a9da9b8f79a7c448246475539c03e1bb58d7e", - "age": 1 + "age": 2 }, { "message": "All requests are now retryable, even if they are deserialized successfully. Previously, this was not allowed.", @@ -309,7 +191,7 @@ "smithy-rs#3389" ], "since-commit": "f19a9da9b8f79a7c448246475539c03e1bb58d7e", - "age": 1 + "age": 2 }, { "message": "Add FIPS support to our Hyper 1.0-based client. Customers can enable this mode by enabling the `crypto-aws-lc-fips` on `aws-smithy-experimental`. To construct a client using the new client, consult this [example](https://github.com/awslabs/aws-sdk-rust/blob/release-2024-03-29/sdk/s3/tests/hyper-10.rs).\n\nPlease note that support for Hyper 1.0 remains experimental.", @@ -323,8 +205,50 @@ "smithy-rs#3539" ], "since-commit": "f19a9da9b8f79a7c448246475539c03e1bb58d7e", + "age": 2 + }, + { + "message": "Fixes the identity resolver types (`credentials_provider()` and `token_provider()`) from `SdkConfig` to have\na consistent identity cache partition when re-used across different clients.\n", + "meta": { + "bug": true, + "breaking": false, + "tada": false + }, + "author": "aajtodd", + "references": [ + "smithy-rs#3427" + ], + "since-commit": "129b85d3187d61dbe4bac2a105ebc3411516a271", + "age": 1 + }, + { + "message": "Stalled stream protection now supports request upload streams. It is currently off by default, but will be enabled by default in a future release. To enable it now, you can do the following:\n\n```rust\nlet config = aws_config::defaults(BehaviorVersion::latest())\n .stalled_stream_protection(StalledStreamProtectionConfig::enabled().build())\n .load()\n .await;\n```\n", + "meta": { + "bug": false, + "breaking": false, + "tada": true + }, + "author": "jdisanti", + "references": [ + "smithy-rs#3485" + ], + "since-commit": "129b85d3187d61dbe4bac2a105ebc3411516a271", + "age": 1 + }, + { + "message": "Stalled stream protection on downloads will now only trigger if the upstream source is too slow. Previously, stalled stream protection could be erroneously triggered if the user was slowly consuming the stream slower than the minimum speed limit.", + "meta": { + "bug": true, + "breaking": false, + "tada": false + }, + "author": "jdisanti", + "references": [ + "smithy-rs#3485" + ], + "since-commit": "129b85d3187d61dbe4bac2a105ebc3411516a271", "age": 1 } ], "aws-sdk-model": [] -} +} \ No newline at end of file