Hello Chefs,
We are happy to announce that the 11.1.4 release of the open source Chef Server is now available. This is primarily a bug fix release.
This release includes a bump in OpenSSL from 1.0.1h to 1.0.1i, as we announced in a previous post.
Other notable changes include:
-
Bumping the Postgres install used by the Chef Server to 9.2.9 from 9.2.8. This change pulls in a minor security patch around securing the unix domain socket. We have no evidence that this represents a critical security issue on a properly configured Chef Server, but wanted to make you aware of it.
-
Fixes a bug in the upgrade command that would cause some upgrades to fail in the 11.1.3 release.
-
Simplifying the upgrade process so that the recommended stop before an upgrade and the recommended restart after an upgrade are now automated as part of the upgrade command, instead of being a manual process.
You can read the full list of changes in the CHANGELOG that is maintained for the Chef Server.
The MVPs for this release are Alexander Strogonov and Gavin Reynolds for their help in determining the cause of and the solution to the upgrade bug.
Obtaining the Release
The release is available for downloaded from the Chef Server tab on the Chef downloads page: http://www.getchef.com/chef/install/
Upgrading
A Chef Server can be upgraded by following the upgrade instructions in the documentation.
Reporting Issues
If you encounter any issues with this release, open a GitHub issue against the Chef GitHub repository and we’ll look into it. This follows with our new issue tracking policy we announced a while back. When opening the issue, if you could label it as a Chef Server issue, that would be appreciated.