- Issued:
- 2017-10-17
- Updated:
- 2017-10-17
RHBA-2017:2900 - Bug Fix Advisory
Synopsis
OpenShift Container Platform atomic-openshift-utils bug fix and enhancement
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated atomic-openshift-utils and openshift-ansible packages that fix several bugs and add enhancements are now available for OpenShift Container Platform 3.6, 3.5, 3.4, and 3.3.
Description
Red Hat OpenShift Container Platform (OCP) is the company's cloud computing Platform-as-a-Service (PaaS) solution designed for on-premise or private cloud deployments.
The atomic-openshift-utils and openshift-ansible packages contain the installation utility and Ansible requirements for installing and upgrading OpenShift Container Platform 3.
This update fixes the following bugs:
- The `nodeSelector` and `supplementalGroups` parameters from existing deployments were ignored because they should be defined in the inventory file. There was no way to define values for each deployment configuration (DC), which hinders the use case where a deployment is using host mount volumes. As a result, the `nodeSelector` and `supplementalGroups` parameters were replaced with those defined in the inventory file. Use `nodeSelector` and `supplementalGroups` from logging facts if they exist for a given DC. The `nodeSelector` and `supplementalGroups` parameters are now retained when applied changes. (BZ#1478771, BZ#1482661)
- With Ansible 2.3, warnings are issued when using Jinja delimiters in 'when' conditions. The delimiters have been removed from the code base to avoid these warnings. (BZ#1480129, BZ#1488359, BZ#1488360, BZ#1488361, BZ#1488363)
- The docker_image_availability Ansible health check did not apply any intelligence for when registries are not reachable, and also did not search for images in the local index with all fully qualified names. This check takes a long time to run in disconnected installs if not all of the required images are imported and tagged a certain way. This causes it to consult the default registry, which is not reachable and takes a long time to timeout for each image. This bug fix updates docker_image_availability check to:
1. Check correctly for the image in the docker index (using all registry names).
2. Inspect registries in the order configured, to enable finding required images in a local registry before consulting a public one.
3. Probe for connectivity to registries and do not continue to inspect ones that cannot be reached.
4. Retry failed registry inspections to add robustness, in case of transient network problems.
With this bug fix, the check is more robust and performance in disconnected scenarios is improved. (BZ#1480195)
- The installer does not default a value for PVC size. Therefore, the storage provisioner is unable to bind a PV to the PVC for glusterfs because no requested size is provided. This bug fix defaults a value so that the PVC is created using a default value when requesting a dynamic PVC. (BZ#1480878)
- The service account was not being added for the `admin` role. Therefore, the service account did not have correct permissions. With this bug fix, the service account was added for the `admin` role and the service account now has correct permissions. (BZ#1487648)
- The flannel network was previously defined using the same subnet as the kubernetes services subnet. This caused a conflict between services and SDN networks. The flannel network is now correctly defined by the `osm_cluster_network_cidr` variable. (BZ#1491412, BZ#1491413)
The update includes the following enhancements:
- The installer now allows you to specify the variables `oreg_auth_user` and `oreg_auth_password` to specify the credentials used to pull infrastructure images from an authenticated registry that is defined by setting `oreg_url`. Your environment may require credentials to pull infrastructure images from your private registry defined via `oreg_url`.
OCP may now pull images from a private registry requiring user name and password credentials. (BZ#1316341, BZ#1484063, BZ#1484068)
- .NET Core 2.0 image streams have been added to the install and upgrade playbooks for OCP 3.5 and 3.6. (BZ#1492618)
All OpenShift Container Platform users are advised to upgrade to these updated packages.
Solution
Before applying this update, make sure all previously released errata relevant to your system have been applied.
To apply this update, run the following on all hosts where you intend to initiate Ansible-based installation or upgrade procedures:
# yum update atomic-openshift-utils
This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at:
Affected Products
- Red Hat OpenShift Container Platform 3.6 x86_64
- Red Hat OpenShift Container Platform 3.5 x86_64
- Red Hat OpenShift Container Platform 3.4 x86_64
- Red Hat OpenShift Container Platform 3.3 x86_64
Fixes
- BZ - 1316341 - [3.6] installer need provide a way to add docker auth to kubelet for auto pulling infra image from an authenticated registry
- BZ - 1471322 - Default image tags for logging components allow new images to deploy without required configmap or deploymentconfig changes
- BZ - 1478771 - We do not preserve the security context and node selector for the elasticsearch dc after running ansible-playbook /usr/share/ansible/openshift-ansible/playbooks/byo/openshift-cluster/openshift-logging.yml after upgade to OCP 3.5
- BZ - 1480129 - [3.2] "when statements should not include jinja2 templating delimiters" warning is shown when running installer with ansible-2.3.1.0-3.el7.noarch
- BZ - 1480195 - docker_image_availability check fails in disconnected environment
- BZ - 1480878 - Logging does not deploy dynamic PVC when volume size is not specified
- BZ - 1482661 - We do not preserve the security context and node selector for the elasticsearch dc after running ansible-playbook /usr/share/ansible/openshift-ansible/playbooks/byo/openshift-cluster/openshift-logging.yml after upgade
- BZ - 1484063 - [3.5] installer need provide a way to add docker auth to kubelet for auto pulling infra image from an authenticated registry
- BZ - 1484068 - [3.4] installer need provide a way to add docker auth to kubelet for auto pulling infra image from an authenticated registry
- BZ - 1487648 - Installer does not add management-admin service account to management-infra project admin role
- BZ - 1488359 - [3.3] "when statements should not include jinja2 templating delimiters" warning is shown when running installer with ansible-2.3.1.0-3.el7.noarch
- BZ - 1488360 - [3.4] "when statements should not include jinja2 templating delimiters" warning is shown when running installer with ansible-2.3.1.0-3.el7.noarch
- BZ - 1488361 - [3.5] "when statements should not include jinja2 templating delimiters" warning is shown when running installer with ansible-2.3.1.0-3.el7.noarch
- BZ - 1488363 - [3.6] "when statements should not include jinja2 templating delimiters" warning is shown when running installer with ansible-2.3.1.0-3.el7.noarch
- BZ - 1491412 - [3.6] Installer does not configure flannel correctly for openstack installs.
- BZ - 1491413 - [3.5] Installer does not configure flannel correctly for openstack installs.
- BZ - 1492618 - [3.5] New .NET Core 2.0 imagestreams/templates for OpenShift Container Platform
CVEs
(none)
References
(none)
Red Hat OpenShift Container Platform 3.6
| SRPM | |
|---|---|
| ansible-2.3.2.0-2.el7.src.rpm | SHA-256: 7d43d325e9078fdc7a60fdc6588123e52b668977b0942bba2ce2eb448dda9de5 |
| openshift-ansible-3.6.173.0.48-1.git.0.1609d30.el7.src.rpm | SHA-256: af3c0d7ce139af768c12deffe949677dd9c58e49575b54924beeef288bc9947d |
| x86_64 | |
| ansible-2.3.2.0-2.el7.noarch.rpm | SHA-256: bdf228f745e1e0f181d459e664c36753d8d872ae270489ed98ed751c3667b266 |
| atomic-openshift-utils-3.6.173.0.48-1.git.0.1609d30.el7.noarch.rpm | SHA-256: 1471a7cc7eee1f8ff75fb697efd3ba43294a88ea6822ef2221b1250cc25793c0 |
| openshift-ansible-3.6.173.0.48-1.git.0.1609d30.el7.noarch.rpm | SHA-256: 0c7e5c1d0c87dd0ab9de76f1695428b3bde3d7e88c1b923494c9a82bcbd52ab0 |
| openshift-ansible-callback-plugins-3.6.173.0.48-1.git.0.1609d30.el7.noarch.rpm | SHA-256: b2b87bb8badef781e981978f7b50c45064095c328b07688ad510a508244c586b |
| openshift-ansible-docs-3.6.173.0.48-1.git.0.1609d30.el7.noarch.rpm | SHA-256: b93bb0684f0bfeaa5b67e7a69a17656dd9c046470d3725084c9acc760f2fc56e |
| openshift-ansible-filter-plugins-3.6.173.0.48-1.git.0.1609d30.el7.noarch.rpm | SHA-256: e2db05cfbafb1ff741d6e32292274c6f567a42cea165426af2598982b903ce75 |
| openshift-ansible-lookup-plugins-3.6.173.0.48-1.git.0.1609d30.el7.noarch.rpm | SHA-256: 37c4b3cfde9c1ad4cbc67f39d96399125f9378a282b6002f7cf118cd0799324f |
| openshift-ansible-playbooks-3.6.173.0.48-1.git.0.1609d30.el7.noarch.rpm | SHA-256: 81ec6e1bf90d8f38bc1de3b8fe5649405bf6ae7aa135b49c96185babb068ab17 |
| openshift-ansible-roles-3.6.173.0.48-1.git.0.1609d30.el7.noarch.rpm | SHA-256: 0df0e2e5ca1a46c4d29050fa45d2aa642d0aab0590020dd1bfeb30705f583eed |
Red Hat OpenShift Container Platform 3.5
| SRPM | |
|---|---|
| ansible-2.3.2.0-2.el7.src.rpm | SHA-256: 7d43d325e9078fdc7a60fdc6588123e52b668977b0942bba2ce2eb448dda9de5 |
| openshift-ansible-3.5.132-1.git.0.a5c4a4d.el7.src.rpm | SHA-256: eb651157792b917b52e677b56853c36ea40b562b2112eb577f301d9eea6b259a |
| x86_64 | |
| ansible-2.3.2.0-2.el7.noarch.rpm | SHA-256: bdf228f745e1e0f181d459e664c36753d8d872ae270489ed98ed751c3667b266 |
| atomic-openshift-utils-3.5.132-1.git.0.a5c4a4d.el7.noarch.rpm | SHA-256: 82383e98e20760287aacf71829d89bc4a42dfe0fe8cb22861845e74825d9d3ee |
| openshift-ansible-3.5.132-1.git.0.a5c4a4d.el7.noarch.rpm | SHA-256: f84daed89dd11db001217c8694bb9ff1631a00112ce462eeee7321d9f4400059 |
| openshift-ansible-callback-plugins-3.5.132-1.git.0.a5c4a4d.el7.noarch.rpm | SHA-256: ebabfd6c3af9c49e7b75fcc4546cdf765c92afd3cfa0a4cd0028ce9f43b9b97e |
| openshift-ansible-docs-3.5.132-1.git.0.a5c4a4d.el7.noarch.rpm | SHA-256: 9adc3794182b1cf049d97a42f5d1384984776061b0143f59b94d8604850130e8 |
| openshift-ansible-filter-plugins-3.5.132-1.git.0.a5c4a4d.el7.noarch.rpm | SHA-256: 8cc76c013d62a843d206bbed9d7545e3da16df304d7ec5f67abcc67c3ab339fd |
| openshift-ansible-lookup-plugins-3.5.132-1.git.0.a5c4a4d.el7.noarch.rpm | SHA-256: 03b0367fcc3f3a24d7a48b7a7862fa56e8d0e175295e8d49a661d9dd57915bdd |
| openshift-ansible-playbooks-3.5.132-1.git.0.a5c4a4d.el7.noarch.rpm | SHA-256: 2f04dd067b4bf04c2261a5757401601491d0a879f51234b3bef30a4bcfba144e |
| openshift-ansible-roles-3.5.132-1.git.0.a5c4a4d.el7.noarch.rpm | SHA-256: 7f00d47e714d2e94265bf858a32720228993089e882480a69e388202651acb45 |
Red Hat OpenShift Container Platform 3.4
| SRPM | |
|---|---|
| ansible-2.3.2.0-2.el7.src.rpm | SHA-256: 7d43d325e9078fdc7a60fdc6588123e52b668977b0942bba2ce2eb448dda9de5 |
| openshift-ansible-3.4.142-1.git.0.b5b1a6a.el7.src.rpm | SHA-256: 3c3f23eb34009f8658b30423fe781758a72c614072b43cf452327e17a37f68d8 |
| x86_64 | |
| ansible-2.3.2.0-2.el7.noarch.rpm | SHA-256: bdf228f745e1e0f181d459e664c36753d8d872ae270489ed98ed751c3667b266 |
| atomic-openshift-utils-3.4.142-1.git.0.b5b1a6a.el7.noarch.rpm | SHA-256: 11883394cc24d9eb78cd3481889fe37e5c799eb7274c222727c4b258210e4a57 |
| openshift-ansible-3.4.142-1.git.0.b5b1a6a.el7.noarch.rpm | SHA-256: 3c8576f1915503fe2209011a445a0fa958af02e764df485c2b6d293351239f69 |
| openshift-ansible-callback-plugins-3.4.142-1.git.0.b5b1a6a.el7.noarch.rpm | SHA-256: 0710590a3b0f2e88b1b53fa18c71d7ab7479cf1141c37a135d326596a689b5ea |
| openshift-ansible-docs-3.4.142-1.git.0.b5b1a6a.el7.noarch.rpm | SHA-256: f3f5f01ee964471dd3c48b37f9d213ec4694374d75c50f92c3e8ebf634eb70d9 |
| openshift-ansible-filter-plugins-3.4.142-1.git.0.b5b1a6a.el7.noarch.rpm | SHA-256: b8601e287df83f5ebd1329fed93f8541ab7204024a041c00eb4706f60f23ee87 |
| openshift-ansible-lookup-plugins-3.4.142-1.git.0.b5b1a6a.el7.noarch.rpm | SHA-256: 2f6874c430a8d5aa893b71f9ead14ffae1a981d3062c18ebe0f6ea63c49b1cc0 |
| openshift-ansible-playbooks-3.4.142-1.git.0.b5b1a6a.el7.noarch.rpm | SHA-256: cbba7cf7e8c2c533701ce4c042c81389a12a25bbdfb63a79d2aba59675a6747f |
| openshift-ansible-roles-3.4.142-1.git.0.b5b1a6a.el7.noarch.rpm | SHA-256: 8e1dabc961fa6ea6f03ed8597fd5e9981b2ba28085d559e83806e4cde967c170 |
Red Hat OpenShift Container Platform 3.3
| SRPM | |
|---|---|
| openshift-ansible-3.3.125-1.git.0.60aef4f.el7.src.rpm | SHA-256: 7475af8be47c518c081cb6cc2537e31246cd796e9ee3b6588a5fe29d74130748 |
| x86_64 | |
| atomic-openshift-utils-3.3.125-1.git.0.60aef4f.el7.noarch.rpm | SHA-256: 393160c37d2e222c8e15169611d2a09ccfa63e0cb03d6ae546608a35c35c2706 |
| openshift-ansible-3.3.125-1.git.0.60aef4f.el7.noarch.rpm | SHA-256: f71da0f48c9b059702161d2cdc27cffcb6ce57403c67a1a843de7cf0f82ff7b9 |
| openshift-ansible-callback-plugins-3.3.125-1.git.0.60aef4f.el7.noarch.rpm | SHA-256: 25ed6d1891ac1a700939a76c893e1b86e9b4e11180f4d1b62376fbb5bde21945 |
| openshift-ansible-docs-3.3.125-1.git.0.60aef4f.el7.noarch.rpm | SHA-256: 47fe0f4847935e6bf5e67f2cdcfc2fbad9c2781533facd252dc18b3453bd3792 |
| openshift-ansible-filter-plugins-3.3.125-1.git.0.60aef4f.el7.noarch.rpm | SHA-256: a4e23ebbd438a67201d600a45806a961f04cfe667b442ac8db4293319d0c67cf |
| openshift-ansible-lookup-plugins-3.3.125-1.git.0.60aef4f.el7.noarch.rpm | SHA-256: 08266517da37ec2c971d197ca069f63c2156fd1437dcb97188eaa498418b129a |
| openshift-ansible-playbooks-3.3.125-1.git.0.60aef4f.el7.noarch.rpm | SHA-256: 04c5c9d24fae32377300608c3b13746060ddeb22e35c553801d75384dbd88bbc |
| openshift-ansible-roles-3.3.125-1.git.0.60aef4f.el7.noarch.rpm | SHA-256: b71f0e58231bed95b40e86927e01e16f591c02388ca53d5d9932e3e5ecf96427 |
Red Hat OpenShift Container Platform 3.2
| SRPM | |
|---|---|
| openshift-ansible-3.2.65-1.git.0.3e894ed.el7.src.rpm | SHA-256: 40b1cc938099062597daea926982987c965e92b52b8f5c800ab58d975bfd8c93 |
| x86_64 | |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.