Skip to content

Commit

Permalink
Merge pull request #2 from puppetlabs/4.1.1_prep
Browse files Browse the repository at this point in the history
Release prep for 4.1.1
  • Loading branch information
Morgan Haskel committed Nov 20, 2015
2 parents 4d69d9b + 1becc9f commit 20d323e
Show file tree
Hide file tree
Showing 2 changed files with 13 additions and 5 deletions.
7 changes: 7 additions & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -1,3 +1,10 @@
## Supported Release 4.1.1
### Summary
This is a bugfix release to address security vulnerability CVE-2013-5211.

#### Bugfixes
- Changes the default behavior to disable monitoring as part of the solution for CVE-2013-5211.

## 2015-07-21 - Supported Release 4.1.0
### Summary
This release updates metadata to support new version of puppet enterprise, as well as new features, bugfixes, and test improvements.
Expand Down
11 changes: 6 additions & 5 deletions metadata.json
Original file line number Diff line number Diff line change
@@ -1,12 +1,16 @@
{
"name": "puppetlabs-ntp",
"version": "4.1.0",
"version": "4.1.1",
"author": "Puppet Labs",
"summary": "Installs, configures, and manages the NTP service.",
"license": "Apache Version 2.0",
"source": "https://github.com/puppetlabs/puppetlabs-ntp",
"project_page": "https://github.com/puppetlabs/puppetlabs-ntp",
"issues_url": "https://tickets.puppetlabs.com/browse/MODULES",
"dependencies": [
{"name":"puppetlabs/stdlib","version_requirement":">= 4.6.0 < 5.0.0"}
],
"data_provider": null,
"operatingsystem_support": [
{
"operatingsystem": "RedHat",
Expand Down Expand Up @@ -96,8 +100,5 @@
"version_requirement": ">= 3.0.0 < 5.0.0"
}
],
"description": "NTP Module for Debian, Ubuntu, CentOS, RHEL, OEL, Fedora, FreeBSD, ArchLinux and Gentoo.",
"dependencies": [
{"name":"puppetlabs/stdlib","version_requirement":">= 4.6.0 < 5.0.0"}
]
"description": "NTP Module for Debian, Ubuntu, CentOS, RHEL, OEL, Fedora, FreeBSD, ArchLinux and Gentoo."
}

0 comments on commit 20d323e

Please sign in to comment.