diff options
author | Tim Smith <tsmith@chef.io> | 2021-04-16 14:13:57 -0700 |
---|---|---|
committer | GitHub <noreply@github.com> | 2021-04-16 14:13:57 -0700 |
commit | e5ddeb6b5b5ad03ad2a77c1391680d78eea07553 (patch) | |
tree | 05d31bca96ab36500e5a1510050ea192a42b239a | |
parent | db0a7e9dbb1731084753e0ce2b4e02c3397db92f (diff) | |
parent | 3e24727473a3b79b642e4a9eb395025f38930216 (diff) | |
download | chef-e5ddeb6b5b5ad03ad2a77c1391680d78eea07553.tar.gz |
Merge pull request #11386 from chef/last_15
Signed-off-by: Tim Smith <tsmith@chef.io>
-rw-r--r-- | RELEASE_NOTES.md | 27 |
1 files changed, 27 insertions, 0 deletions
diff --git a/RELEASE_NOTES.md b/RELEASE_NOTES.md index 66af43ed18..69aad6ee56 100644 --- a/RELEASE_NOTES.md +++ b/RELEASE_NOTES.md @@ -1618,6 +1618,33 @@ Several legacy Windows helpers have been deprecated as they will always return t - Chef::Platform.supports_powershell_execution_bypass? - Chef::Platform.windows_nano_server? +## What's new in 15.17 + +### Chef InSpec 4.32 + +Updated Chef InSpec from 4.29.3 to 4.32. + +#### New Features + +- Commands can now be set to timeout using the [command resource](https://docs.chef.io/inspec/resources/command/) or the [`--command-timeout`](https://docs.chef.io/inspec/cli/) option in the CLI. Commands timeout by default after one hour. +- Added the [`--docker-url`](https://docs.chef.io/inspec/cli/) CLI option, which can be used to specify the URI to connect to the Docker Engine. +- Added support for targeting Linux and Windows containers running on Docker for Windows. +- Added ability to pass inputs to InSpec shell using input file and cli. For more information, see [How can I set Inputs?](https://docs.chef.io/inspec/inputs/#how-can-i-set-inputs) in the InSpec documentation. + +#### Bug Fixes + +- Hash inputs will now be loaded consistently and accessed as strings or symbols. ([#5446](https://github.com/inspec/inspec/pull/5446)) + +### Security + +#### Ruby + +We updated Ruby from 2.6.6 to 2.6.7 to resolve a large number of bugs as well as the following CVEs: + +- [CVE-2021-28966](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28966) +- [CVE-2021-28965](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28965) +- [CVE-2020-25613](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25613) + ## What's new in 15.16 ### Fixes and Improvements |