- Issued:
- 2014-01-13
- Updated:
- 2014-01-13
RHBA-2014:0019 - Bug Fix Advisory
Synopsis
Red Hat OpenShift Enterprise 1.2.7 bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
OpenShift Enterprise by Red Hat release 1.2.7 is now available with updates to
packages that fix several bugs and introduce feature enhancements.
Description
OpenShift Enterprise by Red Hat is the company's cloud computing
Platform-as-a-Service (PaaS) solution designed for on-premise or private cloud
deployments.
This update addresses the following bug fixes and enhancements on broker hosts:
- Previously, the oo-accept-broker command sometimes failed to invoke Ruby
correctly from the Software Collection Library (SCL), causing errors. The
oo-accept-broker command now ensures it uses the oo-ruby command to invoke Ruby
correctly from the SCL. (BZ#1014397)
- If the hostname of a node host changes after its initial setup, applications
with existing gears on that node host can become inaccessible to an OpenShift
Enterprise user. Many other problems can result as well. To help detect this
issue, the oo-admin-chk command now checks whether the current hostname of a
reporting node host matches what is recorded in the datastore for any gear
discovered on that node host. This may briefly report problems if a gear is
being moved at the time the command is run, but should otherwise be considered a
legitimate issue. Detecting and correcting this issue also helps prevent future
upgrade problems. (BZ#1025048)
- Previously, the default DNS health check performed by the oo-diagnostics
command was too strict. If administrators configured their DNS server to disable
recursion, the command would report a problem. The oo-diagnostics command now
simply ensures that it receives a response during the default DNS health check.
(BZ#1033763)
This update also addresses the following enhancement on node hosts:
- The WebSockets proxy now utilizes Node.js 0.10 from the Software Collections
Library (SCL) instead of Node.js 0.6. Users must ensure their node hosts are
subscribed to the Red Hat Software Collections 1 channel for this enhancement.
(BZ#1028182)
Users are advised to upgrade to OpenShift Enterprise by Red Hat release 1.2.7.
Solution
Before applying this update, make sure all previously released errata relevant
to your system have been applied.
To prepare to apply this update, install or update to the latest
openshift-enterprise-release package now available in the OpenShift Enterprise
1.2 channels on each host:
# yum install openshift-enterprise-release
Then run the new oo-admin-yum-validator command on each host and follow any
instructions it provides regarding the hosts' yum configuration:
# oo-admin-yum-validator
For more detailed instructions on running the validation tool, see the Red Hat
Knowledgebase article at https://access.redhat.com/site/articles/386273.
After validating the hosts' yum configuration, install the updated packages and
restart the OpenShift Enterprise services.
This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258.
Affected Products
- Red Hat OpenShift Enterprise Infrastructure 1.2 x86_64
- Red Hat OpenShift Enterprise Application Node 1.2 x86_64
Fixes
- BZ - 1010865 - "--allow_change_district" option in man page is not supported by oo-admin-move
- BZ - 1025048 - Tracking: oo-admin-chk detects apps whose hosts have changed names
- BZ - 1028182 - Backport scl'ification of openshift-origin-node-proxy
- BZ - 1033763 - oo-diagnostics DNS-checking test is too strict
CVEs
(none)
References
(none)
Red Hat OpenShift Enterprise Infrastructure 1.2
SRPM | |
---|---|
openshift-enterprise-upgrade-1.2.7.0-1.el6op.src.rpm | SHA-256: 70e213dd24ac3cd8d710f9b28fbe493215434c48653d26cba24fa67094f54a39 |
openshift-origin-broker-util-1.9.15-1.el6op.src.rpm | SHA-256: 31efee0043ff0d0dffb7b553942a8e8080993d65be5e0cfc3a1664be6cac89dd |
rubygem-openshift-origin-common-1.8.17-1.el6op.src.rpm | SHA-256: 23539581fb0aba3568630ac414eb0274e8627d371c180deab6b5ef27a1085fc3 |
x86_64 | |
openshift-enterprise-release-1.2.7.0-1.el6op.noarch.rpm | SHA-256: ff71dec60fc9c735f066444b7c5de9e9ff93e05f47568c889ac6c458bac89d02 |
openshift-enterprise-upgrade-broker-1.2.7.0-1.el6op.noarch.rpm | SHA-256: 263d102c9ee3c30e8346e97ad3506e110feef3ae276854d0a689d47e30fa4229 |
openshift-enterprise-yum-validator-1.2.7.0-1.el6op.noarch.rpm | SHA-256: 563f70cccdd831d9cffc6ae5e5364334453dceab024a6e9188c5fead7f239faa |
openshift-origin-broker-util-1.9.15-1.el6op.noarch.rpm | SHA-256: 5050f939dd349eb565054ee5192ad96b1a2a582bf3c92f840eced18f0b88fa14 |
rubygem-openshift-origin-common-1.8.17-1.el6op.noarch.rpm | SHA-256: 6e4c1be9de30f58239a67fa808688bab06dc2014cd750095caed96284fc032d4 |
Red Hat OpenShift Enterprise Application Node 1.2
SRPM | |
---|---|
nodejs010-nodejs-commander-1.1.1-3.el6op.src.rpm | SHA-256: eb8fa6499ee82df79d41ae40f19f07ed008d8b5df9fadcef96a9adebbd26a7c3 |
nodejs010-nodejs-keypress-0.2.1-1.el6op.src.rpm | SHA-256: ab05e025ee82246f314ce8286bd143164fb13fc421f625ac07e12ccf4d835589 |
nodejs010-nodejs-optimist-0.4.0-2.el6op.src.rpm | SHA-256: 08134b07d4166536cece183e5e52eff5c061cab7f83e2b594a4209903409c734 |
nodejs010-nodejs-options-0.0.5-2.el6op.src.rpm | SHA-256: 2135f753e6c0dac638d8f4c60d76cb20c8c673804fec84b110234c2efe775f83 |
nodejs010-nodejs-supervisor-0.5.2-3.el6op.src.rpm | SHA-256: 527ad82a5353a7316587c22fd4c45fcb97da09f421c41ddabb158edc36618002 |
nodejs010-nodejs-tinycolor-0.0.1-5.el6op.src.rpm | SHA-256: 232a02a6f15be44baba905cfd4241885569e264c2069b89279951732c157242a |
nodejs010-nodejs-wordwrap-0.0.2-2.el6op.src.rpm | SHA-256: c96ff02ba61b0524a50c0dcff0acf380833190706fda86a775dbdfb507baf200 |
nodejs010-nodejs-ws-0.4.25-6.el6op.src.rpm | SHA-256: e99b4b541bce3e59aba23a12d92282b1cd9ed0f51546b13a2446539cb75c6e89 |
openshift-enterprise-upgrade-1.2.7.0-1.el6op.src.rpm | SHA-256: 70e213dd24ac3cd8d710f9b28fbe493215434c48653d26cba24fa67094f54a39 |
openshift-origin-node-proxy-0.9.5-1.el6op.src.rpm | SHA-256: c006bfb5de484172a1cc51dafefe16cd3673dc3c02eb833889c35196b1d9935b |
rubygem-openshift-origin-common-1.8.17-1.el6op.src.rpm | SHA-256: 23539581fb0aba3568630ac414eb0274e8627d371c180deab6b5ef27a1085fc3 |
x86_64 | |
nodejs010-nodejs-commander-1.1.1-3.el6op.noarch.rpm | SHA-256: 9be5a8070bc0d99bb59ad79d39a3939a5774493ecc19391e2d1ca06404362136 |
nodejs010-nodejs-keypress-0.2.1-1.el6op.noarch.rpm | SHA-256: 892c62444ec0f361917da8a43d42a0c8040796c8e1215c889b4af7c308fb47d2 |
nodejs010-nodejs-optimist-0.4.0-2.el6op.noarch.rpm | SHA-256: d4ee707d84ac4997c6a7636edf0d389ec8f25b5fb8baa9b4d95fe60eb4bc840f |
nodejs010-nodejs-options-0.0.5-2.el6op.noarch.rpm | SHA-256: 8d8ba0b3ca1becd52afa58397f891ee716c961662d105593faba4dbc3cd5b172 |
nodejs010-nodejs-supervisor-0.5.2-3.el6op.noarch.rpm | SHA-256: 32e3f03f5883f418dbfa6b9cfb4b9c78ee46dc51caa8aeaba6cff07a9824a36b |
nodejs010-nodejs-tinycolor-0.0.1-5.el6op.noarch.rpm | SHA-256: b537d6483f8207c7ede9d7f077400216155acfc22f33ebd73b6be8fffeb0a3c7 |
nodejs010-nodejs-wordwrap-0.0.2-2.el6op.noarch.rpm | SHA-256: 3f1a7ea9d7f9dffd74a7b1e696ada4503b7ae5b245f1935e4978235144f31f83 |
nodejs010-nodejs-ws-0.4.25-6.el6op.x86_64.rpm | SHA-256: c2f2a7021e33add8953e8b572dedf2fa6010f6ffd7d9da9e2f4d2e523e7036eb |
nodejs010-nodejs-ws-debuginfo-0.4.25-6.el6op.x86_64.rpm | SHA-256: cf4868d8c0b1f88aa6fd0070b9635b3a06b1bbc56cb1f6b1e4c3d66bff1fe25e |
openshift-enterprise-release-1.2.7.0-1.el6op.noarch.rpm | SHA-256: ff71dec60fc9c735f066444b7c5de9e9ff93e05f47568c889ac6c458bac89d02 |
openshift-enterprise-upgrade-node-1.2.7.0-1.el6op.noarch.rpm | SHA-256: 053b8a2149472d6f4e83c5f48b218d0bd6afbd48ae3332eff235968c8caa4e3e |
openshift-enterprise-yum-validator-1.2.7.0-1.el6op.noarch.rpm | SHA-256: 563f70cccdd831d9cffc6ae5e5364334453dceab024a6e9188c5fead7f239faa |
openshift-origin-node-proxy-0.9.5-1.el6op.noarch.rpm | SHA-256: e36f64449c7b8a4913a32231dd1018e6da67692b303c4d6bcf320c707316b4d4 |
rubygem-openshift-origin-common-1.8.17-1.el6op.noarch.rpm | SHA-256: 6e4c1be9de30f58239a67fa808688bab06dc2014cd750095caed96284fc032d4 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.