- Issued:
- 2017-05-25
- Updated:
- 2017-05-25
RHBA-2017:1333 - Bug Fix Advisory
Synopsis
gdeploy bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Lightspeed patch analysis
Identify and remediate systems affected by this advisory.
Topic
An updated gdeploy package that supports the latest Ansible version (2.3)
is now available for Red Hat Enterprise Linux.
Description
gdeploy is a command line tool that automates the process of creating,
formatting, and mounting bricks to create Red Hat Gluster Storage
volumes. The advantages of using gdeploy includes automated brick
creation, flexibility in choosing the drives to configure (sd, vd, etc.),
and flexibility in naming the logical volumes (LV) and volume groups (VG).
This update provides an improved version of gdeploy that is compatible
with Ansible 2.3. This corrects the following issue:
- Modules that were previously included in the ansible/modules/extras
directory are no longer used or included in Ansible 2.3. These modules
are now included in the ansible/modules/gdeploy directory to ensure
compatibility with Ansible 2.3. (BZ#1450320)
- Playbook conditional syntax changed in Ansible 2.3. gdeploy playbooks
are updated to account for this. (BZ#1450320)
Red Hat recommends upgrading to this updated package, which corrects this issue.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Gluster Storage Server for On-premise 3 for RHEL 7 x86_64
Fixes
- BZ - 1450320 - [3.2.0_async] [RHEL7] gdeploy has to be rebuilt to be compatible with ansible 2.3
CVEs
(none)
References
(none)
Red Hat Gluster Storage Server for On-premise 3 for RHEL 7
| SRPM | |
|---|---|
| gdeploy-2.0.1-13.el7rhgs.src.rpm | SHA-256: f43f194ad0a1a29ab9ece8140d9a83b036749ea787b4abbe86f11a27794e7797 |
| x86_64 | |
| gdeploy-2.0.1-13.el7rhgs.noarch.rpm | SHA-256: 0f018d21cef0a51a3b2303faa40765efe0d8b47e661c6435dfec0929041a65cf |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.