Skip to content

Latest commit

 

History

History
87 lines (62 loc) · 3.04 KB

CHANGELOG.md

File metadata and controls

87 lines (62 loc) · 3.04 KB

Changelog (aws-requests-auth)

0.4.3

  • Also publish the package as a wheel

0.4.2

  • Add x-amz-content-sha256 header to request

0.4.1

  • Allow utf-8 encoding failures for python2 on the request body for hashing

0.4.0

  • Add BotoAWSRequestsAuth convenience class which automatically gathers (and refreshes) AWS credentials using botocore

0.3.3

  • Add classifiers to the pypi distribution

0.3.2

  • Add convenience methods for dynamically pulling AWS credentials via boto3

0.3.1

0.3.0

  • Add python3 support -- thanks to @jlaine, and @anantasty

0.2.5

  • Stop urlencoding query params in get_canonical_querystring(). The urlencoding in get_canonical_querystring() was causing "double encoding issues" because elasticsearch-py already apperas to urlencode query params
    • If you are using a client other than elasticsearch-py, you will need to be sure that your client urlecondes your query params before they are passed to the AWSRequests auth class
    • See DavidMuller#13 for more details

0.2.4

  • Add support for AWS STS using the aws_token keyword argument to AWSRequestsAuth

0.2.3

  • Fix handling of multiple query parameters
    • For example, the two pretty=True query paramaters in the following url http://search-service-foobar.us-east-1.es.amazonaws.com?pretty=True&pretty=True are now handled properly
    • see DavidMuller#7

0.2.2

  • Update url quoting for canonical uri and canonical query string

0.2.1

  • Fix bug where cannonical uri and query string was not url encoded appropriately for the signing process

0.2.0

  • Fix typos of aws_secret_access_key : DavidMuller#1
    • This is a breaking change. The AWSRequestsAuth constructor now expects the kwarg aws_secret_access_key (instead of the incorrectly spelled aws_secret_acces_key).

0.1.0

Initial release