- Issued:
- 2016-10-27
- Updated:
- 2016-10-27
RHBA-2016:2122 - Bug Fix Advisory
Synopsis
OpenShift Container Platform atomic-openshift-utils bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated atomic-openshift-utils, openshift-ansible, and ansible packages that fix several bugs are now available for OpenShift Container Platform 3.2 and 3.3.
Description
Red Hat OpenShift Container Platform is the company's cloud computing Platform-as-a-Service (PaaS) solution designed for on-premise or private cloud deployments.
The atomic-openshift-utils and openshift-ansible packages contain the installation utility and Ansible requirements for installing and upgrading OpenShift Container Platform 3.
Space precludes documenting all of the bug fixes in this advisory. See the
OpenShift Container Platform 3.3 Release Notes, which will be updated shortly
for this release, for details about these changes:
https://docs.openshift.com/container-platform/3.3/release_notes/ocp_3_3_release_notes.html
All OpenShift Container Platform users are advised to upgrade to these updated packages.
Solution
Before applying this update, make sure all previously released errata relevant to your system have been applied.
To apply this update, run the following on all hosts where you intend to initiate Ansible-based installation or upgrade procedures:
# yum update atomic-openshift-utils
This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/articles/11258.
Affected Products
- Red Hat OpenShift Container Platform 3.3 x86_64
Fixes
- BZ - 1298336 - Rerunning the installer fails when not in default namespace
- BZ - 1337089 - gitHTTPSProxy and HTTPS_PROXY should be included in openshift_builddefaults_json variable of example file
- BZ - 1342028 - user can not make use of environment variables to set openshift_cloudprovider_aws_{access,secret}_key within the ansible inventory
- BZ - 1361677 - Upgrades force docker 1.10 update
- BZ - 1366125 - [networking_public_54]'ingressIPNetworkCIDR' should be added in master-config.yaml by ansilbe installation
- BZ - 1366522 - The value of "debug_level" isn't applied to /etc/sysconfig/atomic-openshift-master
- BZ - 1367948 - openshift 3.3 installer is unstable
- BZ - 1368414 - [quick install] The variables defined in host level (installer.cfg.yml) aren't applied to inventory_hosts
- BZ - 1369410 - uninstall fail at task [restart docker] on atomic-host
- BZ - 1371459 - [RFE] installer should deploy the atomic-registry console to normal OCP clusters by default
- BZ - 1371852 - Dynamic pv and pvc are not automatically created when deploying logging with es-pvc-dynamic=true
- BZ - 1372609 - The node should be set back to schedulable after the node service have been restarted
- BZ - 1373106 - [RFE] installer should support deploy secure docker-registry
- BZ - 1375946 - [quick install]docker registry and router can not be deployed for failedScheduling
- BZ - 1380317 - OpenShift upgrade fails while trying to upgrade docker on etcd servers
- BZ - 1381335 - Scale up playbook does not rerun master-facts.
- BZ - 1381411 - OpenShift Quick Installation failed to upgrade 3.2 to 3.3 due to variant_version mismatch
- BZ - 1381710 - [ocp3.2.1] user can not make use of environment variables to set openshift_cloudprovider_aws_{access,secret}_key within the ansible inventory
- BZ - 1382172 - MONGODB_VERSION parameter is missing from templates
- BZ - 1382380 - Upgrade from 3.2 to 3.3 fails with could not get EgressNetworkPolicies
- BZ - 1382636 - Upgrade from v3.2 to v3.3 fails since oadm-command is deprecated
- BZ - 1382694 - service serving certs are created after attempt to upgrade master packages causing restart of services to fail
- BZ - 1383004 - quick install OCP3.3 failed for 'NoneType' object has no attribute 'strategy'
CVEs
(none)
References
(none)
Red Hat OpenShift Container Platform 3.3
SRPM | |
---|---|
ansible-2.2.0.0-0.62.rc1.el7.src.rpm | SHA-256: 2ab0f6e58e790733ee11470660ed49597790cd43016bf71aee6805d710f72430 |
openshift-ansible-3.3.41-1.git.0.a1a327b.el7.src.rpm | SHA-256: d1be18d05439a3d6067d1d7c346b811d39eba14a4beff9d9708f84a68ed64586 |
python-boto3-1.4.0-1.el7.src.rpm | SHA-256: 40907459b0830815891a1d5055969f0ad5f0b90da7325818701a0962736d89fa |
python-botocore-1.4.57-5.el7.src.rpm | SHA-256: cc5713e9f2e2e5f9bdf3392e69c7fbeba40991e4ad5416f5b443ef0f27e72fb4 |
python-futures-3.0.3-2.el7.src.rpm | SHA-256: a5a8affadefcd7a5974f6575954e232febd7c0aba59a229aa7d512620754ace6 |
python-jmespath-0.9.0-2.el7.src.rpm | SHA-256: dc35447129505c81a813f023138c79aec18166f68dc9e25f70cd9ead9ea2100f |
python-passlib-1.6.5-1.el7.src.rpm | SHA-256: 17abc72fe9141653e0d894e413a6f471c3302f2cd6906c2edbd908ee87e43d4b |
python-s3transfer-0.1.3-1.el7.src.rpm | SHA-256: 9d5bf3b5a3d9f5a1d7ddf847831314739a72cb931fea203d7bf3c2b1f7a7e3d5 |
x86_64 | |
ansible-2.2.0.0-0.62.rc1.el7.noarch.rpm | SHA-256: 912c66f5aa20560d9787cb0b73892ff9020684d4bf34db7a3aa391f869bf1913 |
atomic-openshift-utils-3.3.41-1.git.0.a1a327b.el7.noarch.rpm | SHA-256: 27f9b6bd0d178be6383e88f2477833a0243a756c7dd75b3f541cff94b653ee4e |
openshift-ansible-3.3.41-1.git.0.a1a327b.el7.noarch.rpm | SHA-256: 863a264c45e5cded5d35fb64725e48abc3ff859cf43a44085e10e60bb456f585 |
openshift-ansible-callback-plugins-3.3.41-1.git.0.a1a327b.el7.noarch.rpm | SHA-256: 91998db2f80c30e1bf5aaebb69374a57ca7ccc054866ff1661ee14516d5537de |
openshift-ansible-docs-3.3.41-1.git.0.a1a327b.el7.noarch.rpm | SHA-256: 9a2289cf644627065d15848b2d42cb4b04a5b420fbac3c460ed339624243edfb |
openshift-ansible-filter-plugins-3.3.41-1.git.0.a1a327b.el7.noarch.rpm | SHA-256: 5eacd22254ab396e96e5083d90132ec1732e165f7f3642b7978534ebe855bab1 |
openshift-ansible-lookup-plugins-3.3.41-1.git.0.a1a327b.el7.noarch.rpm | SHA-256: 6d607dea546266403d469aa3f93561cc616597a9036e443ad8901509634102dc |
openshift-ansible-playbooks-3.3.41-1.git.0.a1a327b.el7.noarch.rpm | SHA-256: 44afa1a72a7449d8fb5f3b8c0c8b239f378bdfd662fabb015ea8de4d55ce38bd |
openshift-ansible-roles-3.3.41-1.git.0.a1a327b.el7.noarch.rpm | SHA-256: 65a24ceafb2270ba7caa607ad3e17d465e4cf32fed3780e567d07c0b55b83ab3 |
python-futures-3.0.3-2.el7.noarch.rpm | SHA-256: fc2bf956424e5374a3da0a494360adbe09330506946360390ff106c42dfc0717 |
python2-boto3-1.4.0-1.el7.noarch.rpm | SHA-256: bc8460bdb29889a80c893b79cab6a65e449097a8f3d44a5b4bc8dcee4ce72c7b |
python2-botocore-1.4.57-5.el7.noarch.rpm | SHA-256: c07b05f3ec1434a78bd29461f95b29fd3dd4baf449497e2fc705055ecb6251c1 |
python2-jmespath-0.9.0-2.el7.noarch.rpm | SHA-256: 1838e3018fc48dcd601f01f1f863c3a33b91553140e736550eca0c0a706ddc76 |
python2-passlib-1.6.5-1.el7.noarch.rpm | SHA-256: 493cd4898552bddc721a3f5a6681f9d2009ffa85244d83fa7fb01b9178cf8d78 |
python2-s3transfer-0.1.3-1.el7.noarch.rpm | SHA-256: 9cc6204523838f019dd691ff2497d6de486c37be1673ef97b297d4d72e813a70 |
Red Hat OpenShift Container Platform 3.2
SRPM | |
---|---|
ansible-2.2.0.0-0.62.rc1.el7.src.rpm | SHA-256: 2ab0f6e58e790733ee11470660ed49597790cd43016bf71aee6805d710f72430 |
openshift-ansible-3.2.36-1.git.0.164eb4c.el7.src.rpm | SHA-256: e95004d352b55e692515c99b317eb17340e0f3720e01e2b2012a9bb2ec7f5e55 |
python-boto3-1.4.0-1.el7.src.rpm | SHA-256: 40907459b0830815891a1d5055969f0ad5f0b90da7325818701a0962736d89fa |
python-botocore-1.4.57-5.el7.src.rpm | SHA-256: cc5713e9f2e2e5f9bdf3392e69c7fbeba40991e4ad5416f5b443ef0f27e72fb4 |
python-futures-3.0.3-2.el7.src.rpm | SHA-256: a5a8affadefcd7a5974f6575954e232febd7c0aba59a229aa7d512620754ace6 |
python-jmespath-0.9.0-2.el7.src.rpm | SHA-256: dc35447129505c81a813f023138c79aec18166f68dc9e25f70cd9ead9ea2100f |
python-passlib-1.6.5-1.el7.src.rpm | SHA-256: 17abc72fe9141653e0d894e413a6f471c3302f2cd6906c2edbd908ee87e43d4b |
python-s3transfer-0.1.3-1.el7.src.rpm | SHA-256: 9d5bf3b5a3d9f5a1d7ddf847831314739a72cb931fea203d7bf3c2b1f7a7e3d5 |
x86_64 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.