summaryrefslogtreecommitdiff
path: root/RELEASE_NOTES.md
diff options
context:
space:
mode:
authorTim Smith <tsmith@chef.io>2019-05-13 20:40:07 -0700
committerTim Smith <tsmith@chef.io>2019-05-13 20:40:07 -0700
commit940149778cf930aac824a77eea6fe3cb4ddd3ba0 (patch)
treec47cdb3efc28efdd3f609428ccb5cf56373a9494 /RELEASE_NOTES.md
parent49fefbf88cd9aee278dc01331628998588b93187 (diff)
downloadchef-940149778cf930aac824a77eea6fe3cb4ddd3ba0.tar.gz
Backfill the changelog and release notes
Add missing items from the chef-14 branch Signed-off-by: Tim Smith <tsmith@chef.io>
Diffstat (limited to 'RELEASE_NOTES.md')
-rw-r--r--RELEASE_NOTES.md21
1 files changed, 21 insertions, 0 deletions
diff --git a/RELEASE_NOTES.md b/RELEASE_NOTES.md
index 5cffe4e9a0..e251c5f195 100644
--- a/RELEASE_NOTES.md
+++ b/RELEASE_NOTES.md
@@ -410,6 +410,25 @@ The `refresh_plugins` method in the `Ohai::System` class has been removed as it
The Virtualization plugin will no longer detect systems running on the circa ~2005 VirtualPC or VirtualServer hypervisors. These hypervisors were long ago deprecated by Microsoft and support can no longer be tested.
+# Chef Infra Client Release Notes 14.12:
+
+## Updated Resources
+
+### windows_service
+
+The windows_service resource no longer resets credentials on a service when using the :start action without the :configure action. Thanks [@jasonwbarnett](https://github.com/jasonwbarnett) for fixing this.
+
+### windows_certificate
+
+The windows_certificate resource now imports nested certificates while importing P7B certs.
+
+## Updated Components
+
+- nokogiri 1.10.1 -> 1.10.2
+- ruby 2.5.3 -> 2.5.5
+- InSpec 3.7.1 -> 3.9.0
+- The unused windows-api gem is no longer bundled with Chef on Windows hosts
+
# Chef Infra Client Release Notes 14.11:
## Updated Resources
@@ -464,6 +483,8 @@ RubyGems has been updated to 2.7.9 in order to resolve the following CVEs:
- [CVE-2019-8324](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8324): Installing a malicious gem may lead to arbitrary code execution
- [CVE-2019-8325](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8325): Escape sequence injection vulnerability in errors
+
+
# Chef Client Release Notes 14.10:
## Updated Resources