- Issued:
- 2016-10-04
- Updated:
- 2016-10-04
RHBA-2016:1988 - Bug Fix Advisory
Synopsis
Red Hat OpenShift Container Platform 3.3.0.34 bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Red Hat OpenShift Container Platform release 3.3.0.34 is now available with updates to packages and images that fix several bugs.
Description
Red Hat OpenShift Container Platform is the company's cloud computing Platform-as-a-Service (PaaS) solution designed for on-premise or private cloud deployments.
This update fixes the following bugs:
- A build timeout previously exposed a path where a golang WaitGroup was not bumped when it should have been. This caused build objects to stay stuck in running state. With this bug fix, the golang WaitGroup is now properly handled, including when a build timeout occurs. As a result, builds that experience unexpected timeouts are appropriately marked as failed and terminated. (BZ#1370265)
- Piping `tar` content from `bsdtar` to `tar` previously resulted in sparse entries. This caused binary builds to fail when the content was sparse. This bug fix reverts the code to no longer use a pipe between `bsdtar` and `tar`, but instead use `bsdtar` for the entire extraction. As a result, binary builds now work correctly for all content. (BZ#1377460)
- ClusterResourceQuota annotation selectors containing special characters caused parse errors when used to select namespaces. Namespaces that should have the cluster resource quota applied to them were not restricted by the cluster resource quota. With this bug fix, special characters are now handled correctly, and as a result the specified namespaces have cluster resource quota correctly applied. (BZ#1380837)
- Previously, services were not being updated correctly on an edit. When you edited a service, both the old and new values for the services would remain, causing requests to still go to the old service. This bug fix changes the code to handle the update correctly. As a result, the routes only send traffic to the new service. (BZ#1374772)
- The recommended master configuration file location for configuring the ClusterResourceOverride admission plug-in changed previously, but the code for providing that configuration for the web console was not updated. If the plug-in was configured in the recommended location, the web console page for setting resource constraints worked as if it was not configured at all, leaving all the resource constraints configurable. This bug fix updates the code for providing the plug-in configuration for the web console to now look in both of the potential places where the plug-in might be configured. As a result, the web console appears as before when the plug-in is configured. (BZ#1380182)
This advisory contains the RPM packages for this release. See the following advisory for the container images for this release:
https://access.redhat.com/errata/RHBA-2016:1987
All OpenShift Container Platform 3 users are advised to upgrade to these updated packages and images.
Solution
Before applying this update, make sure all previously released errata relevant to your system have been applied.
See the OpenShift Container Platform 3.3 documentation, which will be updated shortly for release 3.3.0.34, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:
https://docs.openshift.com/container-platform/3.3/release_notes/ocp_3_3_release_notes.html
This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/articles/11258.
Affected Products
- Red Hat OpenShift Container Platform 3.3 x86_64
Fixes
- BZ - 1370265 - Build stuck in Running state - logs show error
- BZ - 1374772 - Editing routes doesn't properly clean up the config
- BZ - 1377460 - binary build fails with openshift3/ose-docker-builder:v3.2.1.15 but works fine with openshift3/ose-docker-builder:v3.2.1.1
- BZ - 1380837 - ClusterResourceQuota annotation selector encounters errors matching special characters
CVEs
(none)
References
(none)
Red Hat OpenShift Container Platform 3.3
SRPM | |
---|---|
atomic-openshift-3.3.0.34-1.git.0.83f306f.el7.src.rpm | SHA-256: 85140452f93ab22dec2f8d4d3bf95170861bcf38f96b7f5836dfd1f162e341a7 |
x86_64 | |
atomic-openshift-3.3.0.34-1.git.0.83f306f.el7.x86_64.rpm | SHA-256: 52d6334c1b032cb84a028898a7267d54c369cfc2b0c2567ae0f832f7178f0303 |
atomic-openshift-clients-3.3.0.34-1.git.0.83f306f.el7.x86_64.rpm | SHA-256: 8d9c9fe6536ac11eebafe9b495f8d8a94084ac46343fdffaafa3a1cc489fec61 |
atomic-openshift-clients-redistributable-3.3.0.34-1.git.0.83f306f.el7.x86_64.rpm | SHA-256: 850801497575bd92cf24c24d4a422ccb32041db012fa81a547c2ab0d778809af |
atomic-openshift-dockerregistry-3.3.0.34-1.git.0.83f306f.el7.x86_64.rpm | SHA-256: e675a0661ea88200ac3cbfdd68d5a27162ba8ded84d0da1c48f72e728685abf0 |
atomic-openshift-master-3.3.0.34-1.git.0.83f306f.el7.x86_64.rpm | SHA-256: cbeb0a535a27d25a7d8ebc70da26f0511b8a77eeabb8e35aee483963d8b0f4ca |
atomic-openshift-node-3.3.0.34-1.git.0.83f306f.el7.x86_64.rpm | SHA-256: f1222666862bb275199a93b8cb2d0961ad67c5df475f079fe5f84998b9ce23f8 |
atomic-openshift-pod-3.3.0.34-1.git.0.83f306f.el7.x86_64.rpm | SHA-256: 45e8c378325e8fb6c0a9bd5add48c5dfd7fc5724f614d5bd74e9aea26d648612 |
atomic-openshift-sdn-ovs-3.3.0.34-1.git.0.83f306f.el7.x86_64.rpm | SHA-256: 0d8a4921b6231403733588aa778ea4f2ae48391d49db1a0bbdcc4c4a89ffcd47 |
atomic-openshift-tests-3.3.0.34-1.git.0.83f306f.el7.x86_64.rpm | SHA-256: 0e1629f6a03becb8bedb1ebaf948a620f0e056f25375049c511c0a67605b5db3 |
tuned-profiles-atomic-openshift-node-3.3.0.34-1.git.0.83f306f.el7.x86_64.rpm | SHA-256: ae21a8831f8839accf4c1a5a1a48b20a6431e798b878285ae1070a0c86235831 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.