- Issued:
- 2015-04-16
- Updated:
- 2015-04-16
RHBA-2015:0827 - Bug Fix Advisory
Synopsis
openstack-heat bug fix advisory
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated OpenStack Orchestration packages that resolve various issues are
now available for Red Hat Enterprise Linux OpenStack Platform 5.0
(Icehouse) for RHEL 7.
Description
Red Hat Enterprise Linux OpenStack Platform provides the facilities for
building a private or public infrastructure-as-a-service (IaaS) cloud
running on commonly available physical hardware. This advisory includes
packages for:
- OpenStack Orchestration service
OpenStack Orchestration (heat) is a template-driven engine used to specify
and deploy configurations for Compute, Storage, and OpenStack Networking.
It can also be used to automate post-deployment actions, which in turn
allows automated provisioning of infrastructure, services, and
applications. Orchestration can also be integrated with Telemetry alarms to
implement auto-scaling for certain infrastructure resources.
With this update, the Orchestration packages are now re-based to upstream
version 2014.1.4. This re-base fixes several issues in the way stack user
projects and load balancers are deleted.
This update also applies the following fixes:
- Previously, any template where the get_attr (or Fn::GetAtt) intrinsic
function was used to obtain a list to be passed to the list_join (or
Fn::Join) intrinsic function was rejected. This is a valid construct,
and should therefore not be rejected. This re-base fixes the issue,
ensuring that this construct is recognized properly. (BZ#1198603)
- Previously, when detaching a volume from a Compute server, the
Orchestration service repeatedly issued the detach call until it
succeeded. However, calling detach multiple times could lead to a
race condition that results in the volume remaining permanently
stuck in the 'detaching' state. To avoid triggering this error, the
Orchestration service now issues only a single detach call.
(BZ#1182672)
- The logs for the Orchestration service are stored in the /var/log/heat
directory. In previous releases, this directory was readable by all.
This update restricts readability of /var/log/heat to only user and
group (0750). (BZ#1163419)
Solution
Before applying this update, ensure all previously released errata relevant to
your system have been applied.
Red Hat Enterprise Linux OpenStack Platform 5 for RHEL 7 runs on Red Hat
Enterprise Linux 7.1.
The Red Hat Enterprise Linux OpenStack Platform 5 for RHEL 7 Release Notes (see
References section) contain the following:
- An explanation of the way in which the provided components interact to form a
working cloud computing environment.
- Technology Previews, Recommended Practices, and Known Issues.
- The channels required for Red Hat Enterprise Linux OpenStack Platform 5 for
RHEL 7, including which channels need to be enabled and disabled.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
Affected Products
- Red Hat OpenStack 5.0 for RHEL 7 x86_64
Fixes
- BZ - 1163419 - Adjust log permissions to 0750 for openstack-heat
- BZ - 1182672 - Volumes can't be detached from heat templates
- BZ - 1198603 - Template validation fails due to empty runtime variables
- BZ - 1203280 - Rebase openstack-heat to 2014.1.4
CVEs
(none)
References
(none)
Red Hat OpenStack 5.0 for RHEL 7
| SRPM | |
|---|---|
| x86_64 | |
| openstack-heat-api-2014.1.4-1.el7ost.noarch.rpm | SHA-256: 7242061d99095bcf4a6ba9d01c89f8bb14e9d8a1482c7afcc90ed614ee3e3fbf |
| openstack-heat-api-cfn-2014.1.4-1.el7ost.noarch.rpm | SHA-256: 629ce0d1277ed69189f752e9cc38e9f0b31bd6d0a2cb69b9c1ffd7d5f846e7fb |
| openstack-heat-api-cloudwatch-2014.1.4-1.el7ost.noarch.rpm | SHA-256: c5820e5a99b5d5c842d5d373da105ab54574623e8b54fa740de7d9cac8cb15da |
| openstack-heat-common-2014.1.4-1.el7ost.noarch.rpm | SHA-256: f641602e4a315f99d9c213a56c142c080a23bdb92e9788ce354c25b9dc0cb922 |
| openstack-heat-engine-2014.1.4-1.el7ost.noarch.rpm | SHA-256: 6b4b5615c3db24d913c3f7d1f24d8c1a21a00e9c80594cb62d4ced388003cfca |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.