Skip to content

Commit

Permalink
Merge smithy-rs-release-1.x.y into main (#3974)
Browse files Browse the repository at this point in the history
  • Loading branch information
aws-sdk-rust-ci authored Jan 17, 2025
2 parents 733eab7 + 81ecb70 commit e41f7d7
Show file tree
Hide file tree
Showing 3 changed files with 19 additions and 24 deletions.
10 changes: 0 additions & 10 deletions .changelog/presigning-bugfix.md

This file was deleted.

3 changes: 3 additions & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -1,4 +1,7 @@
<!-- Do not manually edit this file. Use the `changelogger` tool. -->
January 17th, 2025
==================

January 14th, 2025
==================
**New this release:**
Expand Down
30 changes: 16 additions & 14 deletions aws/SDK_CHANGELOG.next.json
Original file line number Diff line number Diff line change
Expand Up @@ -5,18 +5,6 @@
{
"smithy-rs": [],
"aws-sdk-rust": [
{
"message": "Add auth token generator for Amazon Aurora DSQL.\n\n```rust\nuse aws_sdk_dsql::auth_token::{AuthTokenGenerator, Config};\n\n#[tokio::main]\nasync fn main() {\n let cfg = aws_config::load_defaults(BehaviorVersion::latest()).await;\n let generator = AuthTokenGenerator::new(\n Config::builder()\n .hostname(\"peccy.dsql.us-east-1.on.aws\")\n .build()\n .expect(\"cfg is valid\"),\n );\n let token = generator.auth_token(&cfg).await.unwrap();\n println!(\"{token}\");\n}\n```\n\nThe resulting token can then be used as a password when connecting to the\ndatabase server.\n",
"meta": {
"bug": false,
"breaking": false,
"tada": true
},
"author": "Velfi",
"references": [],
"since-commit": "039177d0ee6dd288ad57de2230a1110bbe7ff7d5",
"age": 5
},
{
"message": "It is now possible to disable payload signing through an operation customization.\n\n```rust\nasync fn put_example_object(client: &aws_sdk_s3::Client) {\n let res = client\n .put_object()\n .bucket(\"test-bucket\")\n .key(\"test-key\")\n .body(ByteStream::from_static(b\"Hello, world!\"))\n .customize()\n // Setting this will disable payload signing.\n .disable_payload_signing()\n .send()\n .await;\n}\n```\n\nDisabling payload signing will result in a small speedup at the cost of removing a data integrity check.\nHowever, this is an advanced feature and **may not be supported by all services/operations**.\n",
"meta": {
Expand All @@ -29,7 +17,7 @@
"smithy-rs#3583"
],
"since-commit": "89881abd3df80e9b6fd59790d7c02e2b9a6dd45c",
"age": 4
"age": 5
},
{
"message": "Fix token bucket not being set for standard and adaptive retry modes\n",
Expand All @@ -43,7 +31,7 @@
"aws-sdk-rust#1234"
],
"since-commit": "f7f037d3fda2d02b6a2ad1bce40dd84c787c6c35",
"age": 1
"age": 2
},
{
"message": "S3 client behavior is updated to always calculate a checksum by default for operations that support it (such as PutObject or UploadPart), or require it (such as DeleteObjects). The default checksum algorithm is CRC32. Checksum behavior can be configured using `when_supported` and `when_required` options - in shared config using request_checksum_calculation, or as env variable using AWS_REQUEST_CHECKSUM_CALCULATION.\n\nThe S3 client attempts to validate response checksums for all S3 API operations that support checksums. However, if the SDK has not implemented the specified checksum algorithm then this validation is skipped. Checksum validation behavior can be configured using `when_supported` and `when_required` options - in shared config using response_checksum_validation, or as env variable using AWS_RESPONSE_CHECKSUM_VALIDATION.\n",
Expand All @@ -57,6 +45,20 @@
"smithy-rs#3845"
],
"since-commit": "f7f037d3fda2d02b6a2ad1bce40dd84c787c6c35",
"age": 2
},
{
"message": "Fix bug with presigned requests introduced by new flexibile checksums functionality\n",
"meta": {
"bug": true,
"breaking": false,
"tada": false
},
"author": "landonxjames",
"references": [
"aws-sdk-rust#1240"
],
"since-commit": "733eab7e1a3678971ffa6bf9fb99826e17e99481",
"age": 1
}
],
Expand Down

0 comments on commit e41f7d7

Please sign in to comment.