Skip to content

Commit

Permalink
[2.2.0] Mitigation for JWT Verifier timeouts, update dependencies
Browse files Browse the repository at this point in the history
  • Loading branch information
KenFigueiredo committed Oct 7, 2024
1 parent 4086d30 commit 023963d
Show file tree
Hide file tree
Showing 4 changed files with 1,274 additions and 1,226 deletions.
10 changes: 10 additions & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,6 +4,16 @@ All notable changes to this project will be documented in this file.
The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/),
and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html).

## [2.2.0] - 2024-10-07

### Changed

- Update runtime dependency `cognito-at-edge` to `v1.5.3` (was `v1.5.2`).
- Update `pino` to `v9.4.0` (was `v9.3.1`)

### Fixed
- Add mitigation for [ISSUE-86](https://github.com/awslabs/cognito-at-edge/issues/86).

## [2.1.0] - 2024-07-22

### Changed
Expand Down
5 changes: 5 additions & 0 deletions files/deployable/index.js
Original file line number Diff line number Diff line change
@@ -1,3 +1,8 @@
// Mitigation for https://github.com/awslabs/cognito-at-edge/issues/86
// This won't fix all situations but this does seem to help reduce the total amount of 503 errors
// that occur from cognito-at-edge due to timeouts.
process.env['AWS_NODEJS_CONNECTION_REUSE_ENABLED'] = '1';

const { IAMClient, GetRolePolicyCommand } = require('@aws-sdk/client-iam');
const { SSMClient, GetParameterCommand } = require('@aws-sdk/client-ssm');
const { STSClient, GetCallerIdentityCommand } = require('@aws-sdk/client-sts');
Expand Down
Loading

0 comments on commit 023963d

Please sign in to comment.