- Issued:
- 2014-06-04
- Updated:
- 2014-06-04
RHBA-2014:0598 - Bug Fix Advisory
Synopsis
Red Hat OpenShift Enterprise 1.2.8 bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Red Hat OpenShift Enterprise release 1.2.8 is now available with updates to
packages that fix several bugs and introduce a feature enhancement. This update
adds necessary support for software dependencies that will change with the
upcoming release of Red Hat Software Collections (SCL) version 1.1.
Description
OpenShift Enterprise by Red Hat is the company's cloud computing
Platform-as-a-Service (PaaS) solution designed for on-premise or private cloud
deployments.
This update fixes the following bugs:
- When using unauthenticated DNS updates, the oo-accept-broker and
oo-register-dns commands would fail, even though the dns-nsupdate plug-in
already supported unauthenticated DNS. This bug fix updates the logic for both
commands to support unauthenticated DNS, and these commands no longer fail as a
result. (BZ#1007700)
- SSH keys with the name "." or ".." were misinterpreted by the REST API, and as
a result these keys could not be deleted. To avoid these deletion issues, this
bug fix updates the SSH key validation to prevent the addition of keys with
names beginning with ".". (BZ#1018642)
- After installing a custom or community cartridge using the oo-admin-cartridge
command and clearing the broker cache, the oo-accept-systems command reported
inconsistent cartridge lists between the broker and nodes. This was due to the
new cartridge receiving a problematic SELinux context during its installation
into the cartridge repository. This bug fix ensures that cartridges installed
using oo-admin-cartridge are relabeled using the default contexts, and
oo-accept-systems no longer reports inconsistent cartridge lists. (BZ#1053029)
This update also adds the following enhancement:
- This update adds necessary support for software dependencies that will change
with the upcoming release of Red Hat Software Collections (SCL) version 1.1 by
updating several OpenShift Enterprise components. (BZ#1093808)
All users of OpenShift Enterprise 1.2 are advised to upgrade to these updated
packages.
Solution
Before applying this update, make sure all previously released errata relevant
to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258.
After running the yum update command on each host and ensuring all packages have
been updated, restart the mcollective service on each node host:
# service mcollective restart
On the broker host, restart the broker service and, if installed, the console
service:
# service openshift-broker restart
# service openshift-console restart
Clear the broker cache and, if installed, the console cache:
# oo-admin-broker-cache --console
Affected Products
- Red Hat OpenShift Enterprise Infrastructure 1.2 x86_64
- Red Hat OpenShift Enterprise Application Node 1.2 x86_64
Fixes
- BZ - 1007700 - oo-accept-broker and oo-register-dns will fail when using unauthenticated DNS updates
- BZ - 1018642 - Failed to delete the ssh key with name "."
- BZ - 1093808 - LD_LIBRARY_PATH updates required for v8 collection change
CVEs
(none)
References
(none)
Red Hat OpenShift Enterprise Infrastructure 1.2
SRPM | |
---|---|
openshift-enterprise-upgrade-1.2.7.1-1.el6op.src.rpm | SHA-256: d3345a2be7094cee6bf0f88b7b4baaeb4f1db0ef8420d49d24b5b679dbc63843 |
openshift-origin-broker-1.5.10.1-1.el6op.src.rpm | SHA-256: 54e9fe317925cbc7eb25f6b59f7cc5bea0132b1013bd79039399a0bb19fd70c1 |
openshift-origin-broker-util-1.9.17.1-1.el6op.src.rpm | SHA-256: 1eed9b6967c52620d63a8b7be6cb3040ef1a87f786c2682cb516b9d4403e203e |
openshift-origin-console-1.5.25.1-1.el6op.src.rpm | SHA-256: 4f6ed914002264f81756b98f4f2dd50bbf2461e9077b1b233953f78fc0fe7278 |
openshift-origin-util-scl-1.4.1.2-1.el6op.src.rpm | SHA-256: af9d66dfc706f77aaece7abff115ea70c0f69bec5aa588905512900bd8a6e1e3 |
rubygem-openshift-origin-common-1.8.18.1-1.el6op.src.rpm | SHA-256: 04666b44fca023f146e36ee1e25a2277a95becef6af8be82768b83c627b50de7 |
rubygem-openshift-origin-controller-1.9.16.3-1.el6op.src.rpm | SHA-256: 3c29c31a7d2339926623d8845ed4239ad38408f71aec8e2da586cfcc16e77727 |
x86_64 | |
openshift-enterprise-release-1.2.7.1-1.el6op.noarch.rpm | SHA-256: 98b41293bd2096026bd5ce1643b811bec7356a036eb4de5bdc57ded8ad8f694c |
openshift-enterprise-upgrade-broker-1.2.7.1-1.el6op.noarch.rpm | SHA-256: 1331fcb12df7427f0eaf71efccc19a639835dbbbf15966783025eb6013bd10ea |
openshift-enterprise-yum-validator-1.2.7.1-1.el6op.noarch.rpm | SHA-256: a07376508cb4712a06d5e2713bc4cdf1389e7a72f0d7c68ea2fd690008de4400 |
openshift-origin-broker-1.5.10.1-1.el6op.noarch.rpm | SHA-256: 3e5face06210b2c5cdc23060a1a6ee44339429bc30e99e09f540afabe143f06b |
openshift-origin-broker-util-1.9.17.1-1.el6op.noarch.rpm | SHA-256: e60cb31c877ec36d2d524c4bd55479e31e4706cba5fa77a16ee7637ccccff7f5 |
openshift-origin-console-1.5.25.1-1.el6op.noarch.rpm | SHA-256: b4b45806deb5813b1e5180b718477dd245c238a8dc4cbe476972bfc64690b684 |
openshift-origin-util-scl-1.4.1.2-1.el6op.noarch.rpm | SHA-256: b524f18a29f7be6cad97433b8413480a79ed5a26ef74dce470151e922644b4be |
rubygem-openshift-origin-common-1.8.18.1-1.el6op.noarch.rpm | SHA-256: efae019fb01e1a88c5c119318fc89dd956ce376701cdbfd8fc93ddad1ef08f67 |
rubygem-openshift-origin-controller-1.9.16.3-1.el6op.noarch.rpm | SHA-256: aac2e491e484e62f531478450904f230e40007be42ece2549ffc43b3368f28a1 |
Red Hat OpenShift Enterprise Application Node 1.2
SRPM | |
---|---|
openshift-enterprise-upgrade-1.2.7.1-1.el6op.src.rpm | SHA-256: d3345a2be7094cee6bf0f88b7b4baaeb4f1db0ef8420d49d24b5b679dbc63843 |
openshift-origin-cartridge-ruby-0.4.10.5-1.el6op.src.rpm | SHA-256: 6c266ce200520963177c8cb2bb8065f9482692d2ff41ba5a20a7120d1f93b121 |
openshift-origin-util-scl-1.4.1.2-1.el6op.src.rpm | SHA-256: af9d66dfc706f77aaece7abff115ea70c0f69bec5aa588905512900bd8a6e1e3 |
rubygem-openshift-origin-common-1.8.18.1-1.el6op.src.rpm | SHA-256: 04666b44fca023f146e36ee1e25a2277a95becef6af8be82768b83c627b50de7 |
rubygem-openshift-origin-node-1.9.14.7-1.el6op.src.rpm | SHA-256: 2004121cf4a7b79e961ffe21205b5a9a05403255ddec4b2f71716264014702e8 |
x86_64 | |
openshift-enterprise-release-1.2.7.1-1.el6op.noarch.rpm | SHA-256: 98b41293bd2096026bd5ce1643b811bec7356a036eb4de5bdc57ded8ad8f694c |
openshift-enterprise-upgrade-node-1.2.7.1-1.el6op.noarch.rpm | SHA-256: 5c38570f33586a32abf6c8da473a20eca0e161ce313b4939c55f63ae4bd62eed |
openshift-enterprise-yum-validator-1.2.7.1-1.el6op.noarch.rpm | SHA-256: a07376508cb4712a06d5e2713bc4cdf1389e7a72f0d7c68ea2fd690008de4400 |
openshift-origin-cartridge-ruby-0.4.10.5-1.el6op.noarch.rpm | SHA-256: 58fc47a071981d23ec336b094d88315c635f1a1611a3f47d41dd34dd935f2b8d |
openshift-origin-util-scl-1.4.1.2-1.el6op.noarch.rpm | SHA-256: b524f18a29f7be6cad97433b8413480a79ed5a26ef74dce470151e922644b4be |
rubygem-openshift-origin-common-1.8.18.1-1.el6op.noarch.rpm | SHA-256: efae019fb01e1a88c5c119318fc89dd956ce376701cdbfd8fc93ddad1ef08f67 |
rubygem-openshift-origin-node-1.9.14.7-1.el6op.noarch.rpm | SHA-256: 00170bf61138617a85c48645761f01e98c8e7ce2305db331df86e95f41ab78fe |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.