Skip to content

Latest commit

 

History

History
147 lines (106 loc) · 10.6 KB

CHANGELOG.md

File metadata and controls

147 lines (106 loc) · 10.6 KB

knife-windows Change Log

Release 1.9.0

Release 1.8.0

Release 1.7.1

Release 1.7.0

Release 1.6.0

Release 1.5.0

  • knife-windows #377 Added code and corresponding RSpecs to read the json attributes from the --json-attributes-file option.

Release 1.4.1

Release 1.4.0

  • knife-windows #354 Allows the user to specify the architecture they want to install on the target system during knife bootstrap windows. In your knife config specify knife[:bootstrap_architecture]. Valid values are :i386 for 32 bit or :x86_64 for 64 bit. By default the architecture will be whatever the target system is. If you try to install a 64 bit package on a 32 bit system you will receive an error.
  • knife-windows #352 Have client.rb verify that FIPS mode can be enforced

Release 1.3.0

  • knife-windows #349 Pulls in Winrm 1.7.0 which now consumes rubyntlm 0.6.0 to support Extended Protection for Authentication (aka channel binding) for NTLM over TLS
  • knife-windows #350 Adding a --ssl-peer-fingerprint option as an alternative to --winrm-ssl-verify-mode verify_none in self signed scenarios

Release 1.2.1

  • knife-windows #341 Removes nokogiri dependency and adds UX fixes for knife wsman test when probing a SSL endpoint configured with a self signed certificate

Release 1.2.0

  • knife-windows #334 Uses Negotiate authentication via winrm 1.6 on both windows and linux and drops winrm-s dependency

Release 1.1.4

  • Bumps winrm-s and winrm dependencies to address a winrm-s incompatibility bug with winrm 1.5

Release 1.1.3

  • knife-windows #329 Pin to a minimum winrm-s of 0.3.2 addressing encoding issues in 0.3.1

Release 1.1.2

Release 1.1.1

Release 1.1.0

  • knife-windows #302 Address regression caused by chef client 12.5 environment argument
  • knife-windows #295 Bootstrap missing policy_group, policy_name feature from Chef Client 12.5
  • knife-windows #296 Installing knife-windows produces warning for all knife commands in Mac OS X with ChefDK 0.8.0
  • knife-windows #297 use configured proxy settings for all winrm sessions

Release 1.0.0

Release: 0.8.5

Release: 0.8.4

Release: 0.8.3

  • knife-windows #131 Issue #131: Windows should be bootstrapped using latest Chef Client version compatible with knife's version just like non-Windows systems
  • knife-windows #139 Force dev dependency on Chef 11 for test scenarios to avoid Ohai 8 conflict on Ruby 1.9.x

Release: 0.8.2

  • knife-windows #108 Error: Unencrypted communication not supported if remote server does not require encryption

Release: 0.8.0

  • knife-windows #98 Get winrm command exit code if it is not expected
  • knife-windows #96 Fix break from OS patch KB2918614
  • Remove the 'instance data' method of creating EC2 servers
  • Update winrm-s dependency along with em-winrm and winrm dependencies
  • Return failure codes from knife winrm even when returns is not set
  • Support Windows negotiate authentication protocol when running knife on Windows

Release: 0.6.0 (05/08/2014)

  • KNIFE-386 Wait for a valid command response before bootstrapping over WinRM
  • KNIFE-394 Update em-winrm dependency
  • KNIFE-450 Set knife winrm command exit status on exception and command failure

See source control commit history for earlier changes.

Selected release notes

These are release notes from very early releases of the plugin. For recent releases (2014 and later), see the RELEASE_NOTES.md file of each tagged release branch.

Release Notes - Knife Windows Plugin - Version 0.5.6

** New Feature * new default bootstrap template that installs Chef using official chef-client MSI installer

Release Notes - Knife Windows Plugin - Version 0.5.4

** Bug * [KNIFE_WINDOWS-7] - Exception: NoMethodError: undefined method `env_namespace' for Savon:Module * [KNIFE_WINDOWS-8] - winrm based bootstrap fails with 'Bad HTTP response returned from server (500)'

** New Feature * [KNIFE_WINDOWS-6] - default bootstrap template should support encrypted_data_bag_secret