- Issued:
- 2019-05-08
- Updated:
- 2019-05-08
RHEA-2019:1031 - Product Enhancement Advisory
Synopsis
ovirt-host-deploy bug fix and enhancement update
Type/Severity
Product Enhancement Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated ovirt-host-deploy packages that fix several bugs and add various enhancements are now available.
Description
The ovirt-host-deploy packages provide deployment implementation required for Red Hat Enterprise Virtualization Manager to deploy new hosts. The packages contain a Python library and Java library used by the Red Hat Enterprise Virtualization Manager package. These libraries are the core deployment logic.
Changes to the ovirt-host-deploy component:
- A VDSM yum plugin named 'vdsm.py' was added. Consequently, the Self-Hosted Engine setup imported the wrong vdsm module, causing it to fail. The name of the plugin was changed and now the Self-Hosted Engine setup completes successfully. (BZ#1583038)
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Virtualization Manager 4.3 x86_64
- Red Hat Virtualization 4 for RHEL 7 x86_64
- Red Hat Virtualization for IBM Power LE 4 for RHEL 7 ppc64le
Fixes
- BZ - 1583038 - [HE] Failed to deploy RHV-H on Hosted engine
- BZ - 1623380 - Build ovirt-host-deploy for RHEL 7 RHV 4.3
CVEs
(none)
References
(none)
Red Hat Virtualization Manager 4.3
SRPM | |
---|---|
ovirt-host-deploy-1.8.0-1.el7ev.src.rpm | SHA-256: 17a64fca1106df4896ae454d78e70473ee537eeb182cb5d7e02f799393e1ca54 |
x86_64 | |
ovirt-host-deploy-common-1.8.0-1.el7ev.noarch.rpm | SHA-256: 64ed49018ebd6f647477a46d1bd23db1caaf3fd8ef6f80ec29d5b4b6fd3712cc |
ovirt-host-deploy-java-1.8.0-1.el7ev.noarch.rpm | SHA-256: 71c7578794581fc73bf547b8c340ebde7562c7f7b7da501219778fad92dca734 |
python2-ovirt-host-deploy-1.8.0-1.el7ev.noarch.rpm | SHA-256: 888e07f1e492fb2a5d20e83fec7c024f269d1a3e543223bbe4b619887057985d |
Red Hat Virtualization 4 for RHEL 7
SRPM | |
---|---|
ovirt-host-deploy-1.8.0-1.el7ev.src.rpm | SHA-256: 17a64fca1106df4896ae454d78e70473ee537eeb182cb5d7e02f799393e1ca54 |
x86_64 | |
ovirt-host-deploy-common-1.8.0-1.el7ev.noarch.rpm | SHA-256: 64ed49018ebd6f647477a46d1bd23db1caaf3fd8ef6f80ec29d5b4b6fd3712cc |
ovirt-host-deploy-java-1.8.0-1.el7ev.noarch.rpm | SHA-256: 71c7578794581fc73bf547b8c340ebde7562c7f7b7da501219778fad92dca734 |
ovirt-host-deploy-javadoc-1.8.0-1.el7ev.noarch.rpm | SHA-256: 96d3dceaaca84fd082d4a18b7de4a19629739c2eff6de489fde77d7e3db4a668 |
python2-ovirt-host-deploy-1.8.0-1.el7ev.noarch.rpm | SHA-256: 888e07f1e492fb2a5d20e83fec7c024f269d1a3e543223bbe4b619887057985d |
Red Hat Virtualization for IBM Power LE 4 for RHEL 7
SRPM | |
---|---|
ovirt-host-deploy-1.8.0-1.el7ev.src.rpm | SHA-256: 17a64fca1106df4896ae454d78e70473ee537eeb182cb5d7e02f799393e1ca54 |
ppc64le | |
ovirt-host-deploy-common-1.8.0-1.el7ev.noarch.rpm | SHA-256: 64ed49018ebd6f647477a46d1bd23db1caaf3fd8ef6f80ec29d5b4b6fd3712cc |
ovirt-host-deploy-common-1.8.0-1.el7ev.noarch.rpm | SHA-256: 64ed49018ebd6f647477a46d1bd23db1caaf3fd8ef6f80ec29d5b4b6fd3712cc |
ovirt-host-deploy-java-1.8.0-1.el7ev.noarch.rpm | SHA-256: 71c7578794581fc73bf547b8c340ebde7562c7f7b7da501219778fad92dca734 |
ovirt-host-deploy-java-1.8.0-1.el7ev.noarch.rpm | SHA-256: 71c7578794581fc73bf547b8c340ebde7562c7f7b7da501219778fad92dca734 |
ovirt-host-deploy-javadoc-1.8.0-1.el7ev.noarch.rpm | SHA-256: 96d3dceaaca84fd082d4a18b7de4a19629739c2eff6de489fde77d7e3db4a668 |
ovirt-host-deploy-javadoc-1.8.0-1.el7ev.noarch.rpm | SHA-256: 96d3dceaaca84fd082d4a18b7de4a19629739c2eff6de489fde77d7e3db4a668 |
python2-ovirt-host-deploy-1.8.0-1.el7ev.noarch.rpm | SHA-256: 888e07f1e492fb2a5d20e83fec7c024f269d1a3e543223bbe4b619887057985d |
python2-ovirt-host-deploy-1.8.0-1.el7ev.noarch.rpm | SHA-256: 888e07f1e492fb2a5d20e83fec7c024f269d1a3e543223bbe4b619887057985d |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.