From 5e3494e4b16645bc10278423b9ab20c1c8ede342 Mon Sep 17 00:00:00 2001 From: Jean de K Date: Tue, 5 Oct 2021 17:14:32 +0200 Subject: [PATCH] Release 1.1.0 (#14) --- .github_changelog_generator | 6 ++++++ CHANGELOG.md | 33 +++++++++++++++++++++++++++++++++ README.md | 4 +++- package.json | 2 +- 4 files changed, 43 insertions(+), 2 deletions(-) create mode 100644 .github_changelog_generator create mode 100644 CHANGELOG.md diff --git a/.github_changelog_generator b/.github_changelog_generator new file mode 100644 index 0000000..3d07271 --- /dev/null +++ b/.github_changelog_generator @@ -0,0 +1,6 @@ +unreleased=true +future-release=1.1.0 +issues-wo-labels=false +enhancement-label=**Added:** +enhancement-labels=added-feature +bugs-label=**Fixed:** \ No newline at end of file diff --git a/CHANGELOG.md b/CHANGELOG.md new file mode 100644 index 0000000..767fc15 --- /dev/null +++ b/CHANGELOG.md @@ -0,0 +1,33 @@ +# Changelog + +## [1.1.0](https://github.com/awslabs/cognito-at-edge/tree/1.1.0) (2021-10-05) + +[Full Changelog](https://github.com/awslabs/cognito-at-edge/compare/1.0.0...1.1.0) + +Merge PRs by external contributors to add support for new use cases + +**Added:** + +- added optional disableCookieDomain parameter \(\#10\) [\#11](https://github.com/awslabs/cognito-at-edge/pull/11) ([jwwheeleriv](https://github.com/jwwheeleriv)) +- add authentication to the fetch tokens from code [\#9](https://github.com/awslabs/cognito-at-edge/pull/9) ([yoavya](https://github.com/yoavya)) + +**Closed issues:** + +- Cookie domain attribute should optionally be disabled [\#10](https://github.com/awslabs/cognito-at-edge/issues/10) +- Cognito client Id with secret [\#7](https://github.com/awslabs/cognito-at-edge/issues/7) + +## [1.0.0](https://github.com/awslabs/cognito-at-edge/tree/1.0.0) (2021-06-28) + +[Full Changelog](https://github.com/awslabs/cognito-at-edge/compare/9ad4d41623deafb8c217b9071fe2e63a4d4f30c7...1.0.0) + +Initial open-source release of `cognito-at-edge`. + +**Merged pull requests:** + +- Update README and package.json and add a PR template [\#3](https://github.com/awslabs/cognito-at-edge/pull/3) ([jeandek](https://github.com/jeandek)) +- Add unit test cases to achieve full coverage [\#2](https://github.com/awslabs/cognito-at-edge/pull/2) ([jeandek](https://github.com/jeandek)) +- Readme updates [\#1](https://github.com/awslabs/cognito-at-edge/pull/1) ([jenirain](https://github.com/jenirain)) + + + +\* *This Changelog was automatically generated by [github_changelog_generator](https://github.com/github-changelog-generator/github-changelog-generator)* diff --git a/README.md b/README.md index e4c9c37..72d704f 100644 --- a/README.md +++ b/README.md @@ -10,7 +10,9 @@ This Node.js package helps you verify that users making requests to a CloudFront This package allows you to easily parse and verify Cognito cookies in a Lambda@Edge function. If you want full control over the configuration of AWS resources (CloudFront, Cognito, Lambda@Edge...), this is the solution for you. -If you want to deploy all the required AWS resources in a few clicks, you may want to use [this Serverless Application Repository application](https://console.aws.amazon.com/lambda/home?region=us-east-1#/create/app?applicationId=arn:aws:serverlessrepo:us-east-1:520945424137:applications/cloudfront-authorization-at-edge) ([GitHub](https://github.com/aws-samples/cloudfront-authorization-at-edge)) which provides a complete Auth@Edge solution. Its CloudFormation template has various parameters to support multiple use cases (e.g. bring your own user pool or CloudFront distribution). +If you want to try it out easily or to quickstart a new project, we recommend having a look at the [cognito-at-edge-federated-ui-sample](https://github.com/aws-samples/cognito-at-edge-federated-ui-sample) repository. It allows you to configure and deploy a sample application which uses Cognito@Edge in a few CLI commands. + +If you need more configuration options (e.g. bring your own user pool or CloudFront distribution), you may want to use [this Serverless Application Repository application](https://console.aws.amazon.com/lambda/home?region=us-east-1#/create/app?applicationId=arn:aws:serverlessrepo:us-east-1:520945424137:applications/cloudfront-authorization-at-edge) ([GitHub](https://github.com/aws-samples/cloudfront-authorization-at-edge)) which provides a complete Auth@Edge solution. It does not use Cognito@Edge, but provides similar functionality. ## Getting started diff --git a/package.json b/package.json index 91bc58f..a1207ff 100644 --- a/package.json +++ b/package.json @@ -1,6 +1,6 @@ { "name": "cognito-at-edge", - "version": "1.0.0", + "version": "1.1.0", "repository": { "type": "git", "url": "https://github.com/awslabs/cognito-at-edge"