All notable changes to this project will be documented in this file.
The format is based on Keep a Changelog, and this project adheres to Semantic Versioning.
-
Breaking Change: Enum variant
AgentError::ReplicaError
is now a tuple struct containingRejectResponse
. -
Handling rejected update calls where status code is 200. See IC-1462
-
Reject code type is changed from
u64
to enumRejectCode
. -
Support WASM targets in the browser via
wasm-bindgen
-
Do not send
certificate_version
on HTTP Update requests
- Fixed issue where a missing request header caused the canister to not respond with an
ic-certificate
header.
- Expose the root key to clients through
read_root_key
- Add
lookup_subtree
method to HashTree & HashTreeNode to allow for subtree lookups. - Derive
Clone
onCertificate
andDelegation
structs. - Add certificate version to http_request canister interface.
- (ic-utils) Add specified_id in provisional_create_canister_with_cycles.
- Remove
garcon
from API. Callers can remove the dependency and any usages of it; all waiting functions no longer take a waiter parameter. - Create
ic-certification
crate and move HashTree and Certificate types.
- Drop
disable_range_check
flag from certificate delegation checking.
- Update
candid
to v0.8.0. - Move
hash_tree
fromic-types
and no more re-export ic-types.
- Set
default-features = false
foric-agent
interdependencies to reduce unused nested dependencies. - Bump
candid
to0.7.18
.
- Fixed custom configured HTTP headers - no longer is the header's value wrapped with double quotes.
- Switched to
ic-verify-bls-signature
crate for verify BLS signatures - Added new
hyper
transportHyperReplicaV2Transport
- Added Agent::set_identity method (#379)
- Updated lookup_request_status method to handle proofs of absent paths in certificates.
- Make it possible to specify effective canister id in CreateCanisterBuilder
- Remove
PrincipalInner
Principal
directly holdslen
andbytes
fields
PrincipalError
enum has different set of variants reflecting changes infrom_text
logic.from_text
accepts input containing uppercase letters which results in Err before.from_text
verifies CRC32 check sequence
Added support configurable inclusion and exclusion of files and directories (including dotfiles and dot directories), done via .ic-assets.json
config file:
- example of
.ic-assets.json
file format:[ { "match": ".*", "cache": { "max_age": 20 }, "headers": { "X-Content-Type-Options": "nosniff" }, "ignore": false } ]
- see PR and tests for more examples
Added support for configuring HTTP headers for assets in asset canister (via .ic-assets.json
config file):
- example of
.ic-assets.json
file format:[ { "match": "*", "cache": { "max_age": 20 }, "headers": { "X-Content-Type-Options": "nosniff" } }, { "match": "**/*", "headers": null }, ]
headers
from multiple applicable rules are being stacked/concatenated, unlessnull
is specified, which resets/empties the headers. Both"headers": {}
and absence ofheaders
don't have any effect on end result.
Added support for asset canister config files in ic-assets
.
- reads configuration from
.ic-assets.json
config files if placed inside assets directory, multiple config files can be used (nested in subdirectories) - runs successfully only if the config file is right format (valid JSON, valid glob pattern, JSON fields in correct format)
- example of
.ic-assets.json
file format:[ { "match": "*", "cache": { "max_age": 20 } } ]
- works only during asset creation
- the config file is being taken into account only when calling
ic_asset::sync
(i.e.dfx deploy
oricx-asset sync
)
Breaking change: ic-asset::sync() now synchronizes from multiple source directories.
This is to allow for configuration files located alongside assets in asset source directories.
Also, ic-asset::sync:
- skips files and directories that begin with a ".", as dfx does when copying assets to an output directory.
- reports an error if more than one asset file would resolve to the same asset key
agent-rs/349 feat: add with_max_response_body_size to ReqwestHttpReplicaV2Transport
Updated dependencies. Some had breaking changes: k256 0.11, pkcs 0.9, and sec1 0.3.
Fixed a potential panic in secp256k1 signature generation.
Added ReqwestHttpReplicaV2Transport::create_with_client
.
Remove openssl
in favor of pure rust libraries.
Updated minimum version of reqwest to 0.11.7. This is to avoid the following error, seen with reqwest 0.11.6:
Unknown TLS backend passed to use_preconfigured_tls
Updated wallet interface for 128-bit API.
Remove parameterized canister pattern. Use WalletCanister::create
rather than Wallet::create
.
wallet_send takes Principal instead of &Canister.
Updated ic_utils::interfaces::http_request
structures to use &str
to reduce copying.
Removed Deserialize
from HttpRequest
.
Changed HttpResponse
to be generic over entire callback instead of just ArgToken
.
Added HttpRequestStreamingCallbackAny
to deserialize any callback, regardless of signature.
Added conversion helpers for HttpResponse
, StreamingStrategy
and CallbackStrategy
across generics.
Changes to Canister<HttpRequestCanister>
interface.
- Made
http_request
,http_request_update
, andhttp_request_stream_callback
more generic and require fewer string copies. - Added
_custom
variants to enable customtoken
deserialization.
Introduced HttpRequestStreamingCallback to work around dfinity/candid#273.
Response certificate verification will check that the canister id falls within the range of valid canister ids for the subnet.
Secp256k1 identity now checks if a curve actually uses the secp256k1 parameters. It cannot be used to load non-secp256k1 identities anymore.
Data type of cycles
changed to u128
(was u64
).
fetch_root_key() only fetches on the first call.
Re-genericized Token to allow use of an arbitrary Token type with StreamingStrategy.
Renamed BatchOperationKind._Clear to Clear for compatibility with the certified assets canister. This avoids decode errors, even though the type isn't referenced here.
Changed the 'HttpRequest.upgrade' field to 'Option' from 'bool'.
The lookup_value
function now takes generics which can be iterated over (IntoIterator<Item = &'p Label>
) and transformed into a Vec<Label>
, rather than just a Vec<Label>
.
The lookup_path
method now takes an Iterator<Label>
rather than an AsRef<[Label]>
Added support for upgrading HTTP requests (http_request_update method)
Updated crate dependencies, most notably updating rustls, removing the direct dependency on webpki-roots, and allowing consumers of ic-agent to update to reqwest 0.11.7.
Implements https://github.com/dfinity-lab/ic-ref/pull/371
Fixed a defect in asset synchronization where no retries would be attempted after the first 30 seconds overall.
Unified all version numbers and removed the zzz-release tool.
It's now possible to specify which encodings will be accepted. The default (and previous) behavior is to accept only the identity encoding. Specifying encodings that browsers more commonly accept demonstrates the difference in the returned data and certificate.
For example, here is the data and certificate returned when only accepting the identity encoding.
$ cargo run -p icx-cert -- print 'http://localhost:8000/index.js?canisterId=ryjl3-tyaaa-aaaaa-aaaba-cai'
DATA HASH: 1495cd574831c23b4db97bc3860666ea495386f0ef0dab73c23ef31db5aa2765
Label("/index.js", Leaf(0x1495cd574831c23b4db97bc3860666ea495386f0ef0dab73c23ef31db5aa2765)),
Here is an example accepting the gzip encoding (as most browsers do), showing that the canister responded with different data having a different data hash.
$ cargo run -p icx-cert -- print --accept-encoding gzip 'http://localhost:8000/index.js?canisterId=ryjl3-tyaaa-aaaaa-aaaba-cai'
DATA HASH: 1770e76af0816ba951320c03eab1263c43de7ac4b0558dd9049cc532b7d6cd01
Label("/index.js", Leaf(0x1495cd574831c23b4db97bc3860666ea495386f0ef0dab73c23ef31db5aa2765)),
This project moved to https://github.com/dfinity/icx-proxy.
- Added field
replica_health_status
toStatus
.- typical values
healthy
waiting_for_certified_state
- typical values