- Issued:
- 2016-06-07
- Updated:
- 2016-06-07
RHBA-2016:1208 - Bug Fix Advisory
Synopsis
Red Hat OpenShift Enterprise atomic-openshift-utils bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Lightspeed patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated atomic-openshift-utils and openshift-ansible packages that fix several bugs are now available for Red Hat OpenShift Enterprise.
Description
OpenShift Enterprise by Red Hat is the company's cloud computing Platform-as-a-Service (PaaS) solution designed for on-premise or private cloud deployments.
The atomic-openshift-utils and openshift-ansible packages contain the installation utility and Ansible requirements for installing and upgrading OpenShift Enterprise 3.
Space precludes documenting all of the bug fixes in this advisory. See the OpenShift Enterprise 3.2 Release Notes linked to in the References section, which will be updated shortly for this advisory, for details about these changes.
Solution
Before applying this update, make sure all previously released errata relevant to your system have been applied.
To apply this update, run the following on all hosts where you intend to initiate Ansible-based installation or upgrade procedures:
# yum update atomic-openshift-utils
This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/articles/11258.
Affected Products
- Red Hat OpenShift Container Platform 3.1 x86_64
- Red Hat OpenShift Container Platform 3.0.0.0 x86_64
Fixes
- BZ - 1326045 - Docker CLI option backward compatability not taking effect
- BZ - 1326642 - The IMAGE_VERSION is not the value we specified by openshift_image_tag
- BZ - 1329496 - The parameter 'osm_default_subdomain' didn't take effect
- BZ - 1330920 - The variable of "openshift_generate_no_proxy_hosts" should be in key=value form in example inventory files
- BZ - 1330934 - The variable of "openshift_generate_no_proxy_hosts" doesn't work
- BZ - 1330935 - use_dnsmasq defaults should be false for 3.1 installs
- BZ - 1331097 - Re-running BYO config playbook can upgrade containerized environment
- BZ - 1331236 - [quick install] Proxy settings can't be written in inventory hosts file
- BZ - 1331239 - [quick install]Global proxy setting shouldn't be supported for 3.0 and 3.1
- BZ - 1331346 - Global proxy settings are written with incorrect format in master-config.yaml file
- BZ - 1331365 - [quick install]Proxy settings should be more fridenly
- BZ - 1331389 - cli_docker_additional_registries doesn't take effect during upgrade
- BZ - 1334148 - The parameter 'openshift_docker_hosted_registry_insecure' didn't take effect when it is set to false
- BZ - 1334187 - Fail to downgrade docker from docker-1.9.1-40 to docker-1.8.2
- BZ - 1334639 - imagePolicyConfig option is not set correctly
- BZ - 1334895 - dnsmasq dispatcher script doesn't work for static interfaces
- BZ - 1335063 - Master service can't recognize quoted proxy variables in container installation
- BZ - 1336202 - RPM upgrades to 3.2 fails when in a non-Internet connected environment
- BZ - 1336780 - [docker1.10] using network plugins \"redhat/openshift-ovs-multitenant\": Error running network setup script: + network_mode=\n; Skipping pod"
- BZ - 1337425 - [ansible-2.0] installer failed if yum-utils wasn't installed
- BZ - 1337438 - [ansible-2.0] installer failed due to docker configure file went wrong
CVEs
(none)
Red Hat OpenShift Container Platform 3.2
| SRPM | |
|---|---|
| openshift-ansible-3.0.94-1.git.0.67a822a.el7.src.rpm | SHA-256: b8d1ef16b25ec20127a79d185ff144e30dc135e9a724833b16f771f8814a85f2 |
| x86_64 | |
Red Hat OpenShift Container Platform 3.1
| SRPM | |
|---|---|
| openshift-ansible-3.0.94-1.git.0.67a822a.el7.src.rpm | SHA-256: b8d1ef16b25ec20127a79d185ff144e30dc135e9a724833b16f771f8814a85f2 |
| x86_64 | |
| atomic-openshift-utils-3.0.94-1.git.0.67a822a.el7.noarch.rpm | SHA-256: b1bc8883c6eeae3e41aa6d8bbafd521ccab85ea9823f4ac7694db4e79ce161f4 |
| openshift-ansible-3.0.94-1.git.0.67a822a.el7.noarch.rpm | SHA-256: 33285fe893e4d64dc7495e5597f3f86091f0b8ff2bda7f17442dfa9ae2f15700 |
| openshift-ansible-docs-3.0.94-1.git.0.67a822a.el7.noarch.rpm | SHA-256: 814fd4ad7a71293903c0c7826e37268f4e916bd9bccacd862935993e065840fb |
| openshift-ansible-filter-plugins-3.0.94-1.git.0.67a822a.el7.noarch.rpm | SHA-256: 4c5516ef5a693c833b4a9c23b0e23dc9d2790cdd6ff6602ada6616f19ba08059 |
| openshift-ansible-lookup-plugins-3.0.94-1.git.0.67a822a.el7.noarch.rpm | SHA-256: 9f631b590b9eb4dedfe164840ac208136107ff2b6df61c96b0d2e51a7f21baff |
| openshift-ansible-playbooks-3.0.94-1.git.0.67a822a.el7.noarch.rpm | SHA-256: b4ca23735b4771702125059368fdfd97eeca2eedf320e41b7e3583332ebab0e1 |
| openshift-ansible-roles-3.0.94-1.git.0.67a822a.el7.noarch.rpm | SHA-256: 5c3be5749481cc5b1a9135f8f6173385e28b7a035f154a32fdc313328c71fb4a |
Red Hat OpenShift Container Platform 3.0.0.0
| SRPM | |
|---|---|
| openshift-ansible-3.0.94-1.git.0.67a822a.el7.src.rpm | SHA-256: b8d1ef16b25ec20127a79d185ff144e30dc135e9a724833b16f771f8814a85f2 |
| x86_64 | |
| atomic-openshift-utils-3.0.94-1.git.0.67a822a.el7.noarch.rpm | SHA-256: b1bc8883c6eeae3e41aa6d8bbafd521ccab85ea9823f4ac7694db4e79ce161f4 |
| openshift-ansible-3.0.94-1.git.0.67a822a.el7.noarch.rpm | SHA-256: 33285fe893e4d64dc7495e5597f3f86091f0b8ff2bda7f17442dfa9ae2f15700 |
| openshift-ansible-docs-3.0.94-1.git.0.67a822a.el7.noarch.rpm | SHA-256: 814fd4ad7a71293903c0c7826e37268f4e916bd9bccacd862935993e065840fb |
| openshift-ansible-filter-plugins-3.0.94-1.git.0.67a822a.el7.noarch.rpm | SHA-256: 4c5516ef5a693c833b4a9c23b0e23dc9d2790cdd6ff6602ada6616f19ba08059 |
| openshift-ansible-lookup-plugins-3.0.94-1.git.0.67a822a.el7.noarch.rpm | SHA-256: 9f631b590b9eb4dedfe164840ac208136107ff2b6df61c96b0d2e51a7f21baff |
| openshift-ansible-playbooks-3.0.94-1.git.0.67a822a.el7.noarch.rpm | SHA-256: b4ca23735b4771702125059368fdfd97eeca2eedf320e41b7e3583332ebab0e1 |
| openshift-ansible-roles-3.0.94-1.git.0.67a822a.el7.noarch.rpm | SHA-256: 5c3be5749481cc5b1a9135f8f6173385e28b7a035f154a32fdc313328c71fb4a |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.