- Issued:
- 2016-01-27
- Updated:
- 2016-01-27
RHBA-2016:0075 - Bug Fix Advisory
Synopsis
Red Hat OpenShift Enterprise atomic-openshift-utils bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Lightspeed patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated atomic-openshift-utils and openshift-ansible packages are now available that fix several bugs.
Description
OpenShift Enterprise by Red Hat is the company's cloud computing Platform-as-a-Service (PaaS) solution designed for on-premise or private cloud deployments.
The atomic-openshift-utils and openshift-ansible packages contain the installation utility and Ansible requirements for installing and upgrading OpenShift Enterprise 3. This update fixes several bugs related to the installation utility and related Ansible playbooks.
All OpenShift Enterprise 3 users are advised to upgrade to these updated packages.
Solution
Before applying this update, make sure all previously released errata relevant to your system have been applied.
To apply this update, run the following on all hosts where you intend to initiate Ansible-based installation or upgrade procedures:
# yum update atomic-openshift-utils
This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/articles/11258.
Affected Products
- Red Hat OpenShift Container Platform 3.1 x86_64
- Red Hat OpenShift Container Platform 3.0.0.0 x86_64
Fixes
- BZ - 1211856 - Ansible installer doesn't work with overlong hostname
- BZ - 1277047 - Inaccurate prompt from atomic-openshift-installer
- BZ - 1280169 - Can not restart node service on atomic host
- BZ - 1280171 - Fail to install env on Atomic when 'openshift_set_hostname' is true
- BZ - 1284991 - "atomic-openshift-installer uninstall" error when configuration file is missing.
- BZ - 1286743 - Ansible (openshift-clients really) should install git automatically
- BZ - 1286936 - Can not create master certificates when installing env on Atomic host
- BZ - 1289920 - atomic-openshift-installer shouldn't give note about HA installation when installing ose-3.0
- BZ - 1290307 - Fail to install containerized env on RHEL72
- BZ - 1290320 - Fail to install openshift client package when ansible_pkg_mgr is 'dnf' on rhel72
- BZ - 1291114 - Shoud not set duplicated value 'registry.access.redhat.com' in $ADD_REGISTRY
- BZ - 1291154 - Miss configuring the '--log-driver' and '--log-opt' in docker configuration
- BZ - 1291162 - Uninstall playbook should remove the etcd images
- BZ - 1292500 - 3.1 upgrade playbooks mangle registry and router image names
- BZ - 1292679 - Ansible can not judge whether the specified images exist accurately
- BZ - 1293267 - Ansible installation needs to handle SELinux booleans when installing containerized env
- BZ - 1293397 - Allow for ansible to set garbage_collection parameters for a cluster.
- BZ - 1293660 - Uninstall of local load-balancer always fails
- BZ - 1293789 - The playbook in packages should support containerized installation
- BZ - 1294664 - Support ManageIQ Service Account and Role by default
- BZ - 1294748 - Failed to scale out nodes in pre-existing env
- BZ - 1295677 - Couldn't run oadm/oc commands with space character in options on a containerized environment
- BZ - 1295911 - errors raised starting controllers during ha install
- BZ - 1296022 - ansible should install glusterfs and ceph packages for containerized installation on RHEL
- BZ - 1296388 - The playbook still configure ManageIQ when openshift_use_manageiq is false
- BZ - 1297348 - [REF] ansible upgrade native Master HA
CVEs
(none)
Red Hat OpenShift Container Platform 3.1
| SRPM | |
|---|---|
| openshift-ansible-3.0.35-1.git.0.6a386dd.el7aos.src.rpm | SHA-256: 4ca3531da29101299ffa92ffbfc69b7bd4db56c9af4f36ee4cdd35672a63ee34 |
| x86_64 | |
| atomic-openshift-utils-3.0.35-1.git.0.6a386dd.el7aos.noarch.rpm | SHA-256: 54b4e59820b71d9fe49bdb8ab5f14e5835f1a8710e980849cd18795a0a83e0f1 |
| openshift-ansible-3.0.35-1.git.0.6a386dd.el7aos.noarch.rpm | SHA-256: 90713438fbeac72d4dbe14611b1fb040d068e20f7dd4430cf952d724800e8580 |
| openshift-ansible-docs-3.0.35-1.git.0.6a386dd.el7aos.noarch.rpm | SHA-256: bcb96f06237709714d5a4cc0c45950c61e04fc8a06df847dffafc572770a675a |
| openshift-ansible-filter-plugins-3.0.35-1.git.0.6a386dd.el7aos.noarch.rpm | SHA-256: 1596699d5888861865f7371b5135851cb452c0b23d75e27a512f4eaab8ac8785 |
| openshift-ansible-lookup-plugins-3.0.35-1.git.0.6a386dd.el7aos.noarch.rpm | SHA-256: 4f26f1a52dcc9553e8dbc9201b874800d741fd7a29ffe14a8ea7df11f290b247 |
| openshift-ansible-playbooks-3.0.35-1.git.0.6a386dd.el7aos.noarch.rpm | SHA-256: cff1e3d63d89fa9a7d34d42c573c90ef4c594353f8852a64f64db6d09c8ec8fd |
| openshift-ansible-roles-3.0.35-1.git.0.6a386dd.el7aos.noarch.rpm | SHA-256: 885563a95aa32e6e67790b7634f0e7820511182eb195377bf56341afa44ac2f1 |
Red Hat OpenShift Container Platform 3.0.0.0
| SRPM | |
|---|---|
| openshift-ansible-3.0.35-1.git.0.6a386dd.el7aos.src.rpm | SHA-256: 4ca3531da29101299ffa92ffbfc69b7bd4db56c9af4f36ee4cdd35672a63ee34 |
| x86_64 | |
| atomic-openshift-utils-3.0.35-1.git.0.6a386dd.el7aos.noarch.rpm | SHA-256: 54b4e59820b71d9fe49bdb8ab5f14e5835f1a8710e980849cd18795a0a83e0f1 |
| openshift-ansible-3.0.35-1.git.0.6a386dd.el7aos.noarch.rpm | SHA-256: 90713438fbeac72d4dbe14611b1fb040d068e20f7dd4430cf952d724800e8580 |
| openshift-ansible-docs-3.0.35-1.git.0.6a386dd.el7aos.noarch.rpm | SHA-256: bcb96f06237709714d5a4cc0c45950c61e04fc8a06df847dffafc572770a675a |
| openshift-ansible-filter-plugins-3.0.35-1.git.0.6a386dd.el7aos.noarch.rpm | SHA-256: 1596699d5888861865f7371b5135851cb452c0b23d75e27a512f4eaab8ac8785 |
| openshift-ansible-lookup-plugins-3.0.35-1.git.0.6a386dd.el7aos.noarch.rpm | SHA-256: 4f26f1a52dcc9553e8dbc9201b874800d741fd7a29ffe14a8ea7df11f290b247 |
| openshift-ansible-playbooks-3.0.35-1.git.0.6a386dd.el7aos.noarch.rpm | SHA-256: cff1e3d63d89fa9a7d34d42c573c90ef4c594353f8852a64f64db6d09c8ec8fd |
| openshift-ansible-roles-3.0.35-1.git.0.6a386dd.el7aos.noarch.rpm | SHA-256: 885563a95aa32e6e67790b7634f0e7820511182eb195377bf56341afa44ac2f1 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.