- Issued:
- 2017-01-31
- Updated:
- 2017-01-31
RHBA-2017:0224 - Bug Fix Advisory
Synopsis
OpenShift Container Platform atomic-openshift-utils bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated atomic-openshift-utils and openshift-ansible packages that fix several bugs are now available for OpenShift Container Platform 3.4, 3.3, and 3.2.
Description
Red Hat OpenShift Container Platform is the company's cloud computing Platform-as-a-Service (PaaS) solution designed for on-premise or private cloud deployments.
The atomic-openshift-utils and openshift-ansible packages contain the installation utility and Ansible requirements for installing and upgrading OpenShift Container Platform 3.
This update fixes the following bugs:
- Previously, an OpenShift Ansible failure on one node would cause installation to fail entirely when verifying node registration with the master. OpenShift Ansible will now continue running on nodes that have not failed and will only ensure that passing hosts have been registered. (BZ#1377619)
- The common/openshift-master/config.yml playbook was configured to add several IPtables rules by default. Therefore, several ports were opened in the firewall, which were not necessary for default deployments. The common/openshift-master/config.yml playbook was updated to remove the unneeded rules and logic was added to only open ports required for etcd when ectd was an embedded install. This reduced the number of open ports for default installs. (BZ#1386329)
- The expiry role was not checking for emebdded etcd environments. Therefore, the health of embedded etcd certificates were not evaluated.
This fix ensures that the openshift_cert_expiry module correctly identifies embedded etcd environments. The health of embedded etcd certificates are now evaluated. (BZ#1389264)
- The installation summary was only printing etcd hosts if they were also masters. As a result, dedicated etcd hosts were not appearing in the installation summary. This fix removed the check for masters prior to the check for etcd hosts. The installation summary is now correct. (BZ#1389649)
- Node certificates created by openshift-ansible had duplicate serial numbers. This was a concern for IPsec encryption, which requires that the certificate serials are unique. This fix corrects the duplication. (BZ#1414537, BZ#1414542, BZ#1414570)
- When attempting to upgrade OpenShift Container Platform from 3.3.1 to 3.4.1, the upgrade failed when trying evacuate the node with command `oc adm manage-node <node_ID> --drain --force`. An error message indicated that an unsupported command was used. This fix addresses the issue. (BZ#1414707)
All OpenShift Container Platform 3.4, 3.3, and 3.2 users are advised to upgrade to these updated packages.
Solution
Before applying this update, make sure all previously released errata relevant to your system have been applied.
To apply this update, run the following on all hosts where you intend to initiate Ansible-based installation or upgrade procedures:
# yum update atomic-openshift-utils
This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/articles/11258.
Affected Products
- Red Hat OpenShift Container Platform 3.4 x86_64
- Red Hat OpenShift Container Platform 3.3 x86_64
Fixes
- BZ - 1377619 - [3.3] ansible playbooks continue running after get error
- BZ - 1386329 - [3.4] Installer creating rules/opening up ports in iptables that are not needed.
- BZ - 1389264 - [3.4] openshift_certificate_expiry missed embeded-etcd's cert check
- BZ - 1389649 - [3.4] [quick install]Installation summary is not correct when specifying a dedicated etcd in installer.cfg.yml
- BZ - 1414537 - [3.4] Node certificate serials are not unique
- BZ - 1414542 - [3.3] Node certificate serials are not unique
- BZ - 1414570 - [3.2] Node certificate serials are not unique
- BZ - 1414707 - [3.4] failed to evacuate node due to unknown flag drain used in upgrade_nodes.yml
CVEs
(none)
References
(none)
Red Hat OpenShift Container Platform 3.4
SRPM | |
---|---|
openshift-ansible-3.4.56-1.git.0.7ba9968.el7.src.rpm | SHA-256: be7a1e3d0e99346bae9ce07a7f1fc0c5562a9d93fbec2583ccd51a27df2fee99 |
x86_64 | |
atomic-openshift-utils-3.4.56-1.git.0.7ba9968.el7.noarch.rpm | SHA-256: c743f97139a11f8099d476ec353bd20c201ebef48eed3599651a9d7498525dbe |
openshift-ansible-3.4.56-1.git.0.7ba9968.el7.noarch.rpm | SHA-256: 327c74deadbf34884803ee54413e7c88155ba54ffae277f1c78bc1f97e0e1b14 |
openshift-ansible-callback-plugins-3.4.56-1.git.0.7ba9968.el7.noarch.rpm | SHA-256: 698e3bd11ff7079aa449b7b446b34ea8f324ac0a0905f0b53ad34ef7862b0e6d |
openshift-ansible-docs-3.4.56-1.git.0.7ba9968.el7.noarch.rpm | SHA-256: 51bb58c86663b922d553e5826846acdfcc1ce8f074af3e88495d6f3a9932abdf |
openshift-ansible-filter-plugins-3.4.56-1.git.0.7ba9968.el7.noarch.rpm | SHA-256: f4620cd550068bceab34045f7401a6beaa241e83cc75027336a11e66189be443 |
openshift-ansible-lookup-plugins-3.4.56-1.git.0.7ba9968.el7.noarch.rpm | SHA-256: 04a7d11842b7dfe86811ac7e71d5a217cd01f1052c8741850c8165a9830d55d7 |
openshift-ansible-playbooks-3.4.56-1.git.0.7ba9968.el7.noarch.rpm | SHA-256: 94970181442e673ff7155f10a90155d155f9de880d228a3471ab2367f79dbd98 |
openshift-ansible-roles-3.4.56-1.git.0.7ba9968.el7.noarch.rpm | SHA-256: 6c566b269f0666509276e1b6890474578248ea391ad09d26a8299c1dc32fcd1c |
Red Hat OpenShift Container Platform 3.3
SRPM | |
---|---|
openshift-ansible-3.3.61-1.git.0.27743e6.el7.src.rpm | SHA-256: e6065464e2691d28e89ec9c3fe9b805698f023637621e7e55f930066dad10a36 |
x86_64 | |
atomic-openshift-utils-3.3.61-1.git.0.27743e6.el7.noarch.rpm | SHA-256: d854e0dc881fe0bab4646286bc0b2f111b693a7b9c5ccd860befb74965797f85 |
openshift-ansible-3.3.61-1.git.0.27743e6.el7.noarch.rpm | SHA-256: fce1bc5887f887802d04e26f6746a77b4c3f38da053260b71e0d8144967ec31f |
openshift-ansible-callback-plugins-3.3.61-1.git.0.27743e6.el7.noarch.rpm | SHA-256: 36e51b87124fbe3e792b45d7907c40301af1ef1adae0de28e1549de1ebe08d97 |
openshift-ansible-docs-3.3.61-1.git.0.27743e6.el7.noarch.rpm | SHA-256: dd11983a880b5ea2494a1cf4c5abfecacfbe39681e4cd4a888c4b1ab6bd5fd53 |
openshift-ansible-filter-plugins-3.3.61-1.git.0.27743e6.el7.noarch.rpm | SHA-256: a73de954a6d6412158652bbcfe390f6941e5a295f28cb0eb5a4203b4b2f6ecdb |
openshift-ansible-lookup-plugins-3.3.61-1.git.0.27743e6.el7.noarch.rpm | SHA-256: 734d091816a4ceeb76ffc7c1804d25cd45f39c29bdf837b4d9ac2b8f49987f97 |
openshift-ansible-playbooks-3.3.61-1.git.0.27743e6.el7.noarch.rpm | SHA-256: 691d9c06182e4bf993526c35483f83973eec2155ad66af24c890eb370bccaa3a |
openshift-ansible-roles-3.3.61-1.git.0.27743e6.el7.noarch.rpm | SHA-256: d49e8aaf345e8911d2dfc646ef5a5afaf80ab1c33a8a98288e80c2e7e20121ef |
Red Hat OpenShift Container Platform 3.2
SRPM | |
---|---|
openshift-ansible-3.2.47-1.git.0.34a924d.el7.src.rpm | SHA-256: bbad5ec5060740894396141be3cbffcf7c1c652384e9d49716083da6eebb6167 |
x86_64 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.