summaryrefslogtreecommitdiff
path: root/RELEASE_NOTES.md
diff options
context:
space:
mode:
authorTim Smith <tsmith84@gmail.com>2021-03-12 19:39:31 -0800
committerTim Smith <tsmith84@gmail.com>2021-03-12 19:50:35 -0800
commitda7e1c136c63e66244eb53677976a25a7af1af50 (patch)
tree54ea4b13f03bcbc5999186047b937bd13054e137 /RELEASE_NOTES.md
parent1260d87fb848a871883e208d72624ef60cf6e8a8 (diff)
downloadchef-da7e1c136c63e66244eb53677976a25a7af1af50.tar.gz
Update how we describe Alma Linux in release notesplatform_support
Clarify this is not a commercially supported distribution in chef. Signed-off-by: Tim Smith <tsmith@chef.io>
Diffstat (limited to 'RELEASE_NOTES.md')
-rw-r--r--RELEASE_NOTES.md18
1 files changed, 8 insertions, 10 deletions
diff --git a/RELEASE_NOTES.md b/RELEASE_NOTES.md
index bf8783b115..9624afbf68 100644
--- a/RELEASE_NOTES.md
+++ b/RELEASE_NOTES.md
@@ -31,7 +31,7 @@ This section serves to track things we should later document here for 17.0
- gem resource: assume rubygems 1.8+ now: https://github.com/chef/chef/pull/10379
- file: only run verifiers when the contents changed - https://github.com/chef/chef/pull/11171
-### Ohai
+### Ohai
- Ohai now detects systems running in the Effortless pattern at `node['chef_packages']['chef']['chef_effortless']` - https://github.com/chef/ohai/pull/1624
- New Ohai habitat plugin at `node['habitat']` - https://github.com/chef/ohai/pull/1623
- Detect Sangoma Linux in Ohai - https://github.com/chef/ohai/pull/1631
@@ -53,9 +53,9 @@ This section serves to track things we should later document here for 17.0
Upgraded OpenSSL to 1.0.2y, which resolves the following CVEs:
-* [CVE-2021-23841](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23841)
-* [CVE-2021-23839](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23839)
-* [CVE-2021-23840](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23840)
+- [CVE-2021-23841](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23841)
+- [CVE-2021-23839](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23839)
+- [CVE-2021-23840](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23840)
### Platform Updates
@@ -91,11 +91,11 @@ On AWS instances, we now gather data from the latest metadata API versions, expo
- placement/region
- spot/instance-action
-#### Alma Linux Support
+#### Alma Linux Detection
-Chef Infra Client now maps [Alma Linux](https://almalinux.org/) to the `rhel` `platform_family` value. Alma Linux is a new open-source RHEL fork produced by the CloudLinux team.
+Chef Infra Client now maps [Alma Linux](https://almalinux.org/) to the `rhel` `platform_family` value. Alma Linux is a new open-source RHEL fork produced by the CloudLinux team. Alma Linux falls under Chef's [Community Support](https://docs.chef.io/platforms/#community-support) platform support policy providing community driven support without the extensive testing given to commercially supported platforms in Chef Infra Client.
-We've also added support for testing cookbooks on Alma Linux with new [Alma Linux 8 Vagrant Images](https://app.vagrantup.com/bento/boxes/almalinux-8) for use in Test Kitchen on VirtualBox, Parallels, and VMware. You can use these images today in Test Kitchen by specifying this new box in your config as follows:
+You can test cookbooks on Alma Linux in Test Kitchen using [Alma Linux 8 Vagrant Images](https://app.vagrantup.com/bento/boxes/almalinux-8 on VirtualBox, Parallels, and VMware hypervisors as follows:
```yaml
platforms:
@@ -104,8 +104,6 @@ platforms:
box: bento/almalinux-8
```
-Note: In the upcoming release of Chef Workstation, you'll be able to skip the `box` config and Test Kitchen will automatically map `almalinux-8` to the appropriate Vagrant image.
-
#### Knife Bootstrapping Without Sudo
The `knife bootstrap` command now supports elevating privileges on systems without `sudo` by using the `su` command instead. Use the new `--su-user` and `--su-password` flags to specify credentials for `su`.
@@ -432,7 +430,7 @@ The `ifconfig` resource has been updated to no longer add empty blank lines to t
The `windows_audit_policy` resource has been updated to fix a bug on failure-only auditing.
-## Ohai Improvements
+### Ohai Improvements
#### Passwd Plugin For Windows