- Issued:
- 2017-01-04
- Updated:
- 2017-01-04
RHBA-2017:0017 - Bug Fix Advisory
Synopsis
Red Hat OpenShift Enterprise 2.2.11 bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Red Hat OpenShift Enterprise release 2.2.11 is now available with updated
packages that fix several bugs and add various enhancements.
Description
OpenShift Enterprise by Red Hat is the company's cloud computing
Platform-as-a-Service (PaaS) solution designed for on-premise or
private cloud deployments.
This update fixes the following bugs:
- The routing daemon (RD) can now be configured with multiple F5 BIG-IP hosts. During F5 configurations, the RD tries to connect to the first configured host. If it fails, it retries each successive host until it connects to a host or exhausts its host list. The RD now correctly sends a NACK response to ActiveMQ when operations fail. ActiveMQ redelivers the message, causing the RD to retry. The RD's communication with ActiveMQ, logging of errors, and handling of error responses from F5 BIG-IP improved. This enables the RD to continue operation with the F5 BIG-IP cluster even if the RD loses contact with the cluster, improving the RD's behavior when multiple instances are run in a clustered configuration. The RD is more resilient against losing contact with individual F5 BIG-IP hosts in a cluster of F5 BIG-IP hosts and functions better when run in a clustered configuration. The RD elicits fewer error responses from F5 BIG-IP and provides better logs, making error diagnosis easier. (BZ#1227472)
- Users can now allow the provided database connection helper functions mysql(), psql(), and mongo() to be overwritten. This allows users to overwrite the helper functions to easily connect to external databases. Users can now define mysql(), psql(), and mongo() functions in their $OPENSHIFT_DATA_DIR/.bash_profile, which can be used within an SSH connection to a gear. (BZ#1258033)
- HAProxy cookies were inconsistently named. Requests to an HA application were not always being routed to the correct gear. This fix changes the cookie naming logic so that the cookie name reflects which back-end gear is handling the request. As a result, all back-end HAProxy gears should now return the same cookie name and the requests should be properly routed to the correct back-end gear. (BZ#1377433)
- EWS Tomcat 7 can now be configured on nodes to use either EWS 2 or EWS 3 channels, allowing an administrator an option of what EWS version the EWS 2 cartridge deploys. This option was enabled to allow administrators to take advantage of the EWS 3 lifecycle and security or bug updates that it receives compared to the maintenance lifecycle that EWS 2 is currently receiving. Administrators have options or can mix and match EWS versions (with node profiles) on what Tomcat version is installed when an EWS 2 cartridge is created. (BZ#1394328)
- The new version of PIP (7.1.0) no longer accepted insecure (HTTP) mirrors. Also, PIP attempted to create and then write files into the .cache directory, which users do not have permission to create post-installation. As a result, Python dependencies failed to be installed.
The default PyPi mirror URL is now updated to use a secure connection (HTTPS). The directory .cache is created during installation in advance so it can be used later by PIP. With this fix, Python dependencies can be fetched from the PyPi mirror and installed properly. (BZ#1401120)
- When using a gear's UUID in the logical volume name, a grep in the oo-accept node caused oo-accept-node to fail. The grep was fixed with this update. Using the gear UUID in the logical volume name no longer causes oo-accept-node to fail. (BZ#1401124)
- Previously, moving a gear with many aliases reloaded Apache for each alias. The excess aliases caused the gear move to timeout and fail. With this fix, a gear move will now update Apache once with an array of of aliases instead of updating after each alias. (BZ#1401132)
- Previously, node-proxy did not specify to use cipher order, so the order did not matter when using a custom cipher order. This fix makes the node-proxy honor the cipher order. Custom cipher orders will now take the cipher order in account when choosing a cipher. (BZ#1401133)
All OpenShift Enterprise 2 users are advised to upgrade to these updated
packages.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
See the OpenShift Enterprise 2.2 Release Notes, which will be updated
shortly for release 2.2.11, for important instructions on how to fully
apply this asynchronous errata update:
This update is available via the Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258.
Affected Products
- Red Hat OpenShift Enterprise Infrastructure 2.2 x86_64
- Red Hat OpenShift Enterprise Application Node 2.2 x86_64
Fixes
- BZ - 1258033 - Allow the override of pre-defined function for database connections
- BZ - 1377433 - haproxy configuration in HA gears sets inconsistent cookie values, breaking session affinity
- BZ - 1394328 - [RFE] EWS 2 cartridge should be able to use EWS 3 binaries.
- BZ - 1401120 - pip permission error prevents installing on python-2.7 cartridge
- BZ - 1401124 - oo-accept-node reports missing quota if filesystem name contains gear uuid
- BZ - 1401132 - Moving gears with many aliases causes excessive number of apache reloads
CVEs
(none)
References
(none)
Red Hat OpenShift Enterprise Infrastructure 2.2
SRPM | |
---|---|
openshift-enterprise-upgrade-2.2.11-1.el6op.src.rpm | SHA-256: 684678600d7a39ada09613e3e8f2131ff1c0302d9e3041a187cebf76675ecaaa |
rubygem-openshift-origin-routing-daemon-0.26.7.4-1.el6op.src.rpm | SHA-256: c039f8d023321d8eed0c09b123b171f27c866860705d45aa05b85f82faedf346 |
x86_64 | |
openshift-enterprise-release-2.2.11-1.el6op.noarch.rpm | SHA-256: c211f0dd8c3efba9d8f2840a7e418f2096dbfbb47f13a8ec7cf7929e38e6162f |
openshift-enterprise-upgrade-broker-2.2.11-1.el6op.noarch.rpm | SHA-256: e9fac95a23aa696dfb4c1e4cc8cf33d5cabfb0d9ea4a7f29925936635b6f6078 |
openshift-enterprise-yum-validator-2.2.11-1.el6op.noarch.rpm | SHA-256: b867d00bda0f52d6ba6a98a74f4303c0df9b4b74405e0487131fb3180ec2150e |
rubygem-openshift-origin-routing-daemon-0.26.7.4-1.el6op.noarch.rpm | SHA-256: be88d6d1f339675e91ca18087c9af6825afbb26f9abc2570188fb715c83fe57c |
Red Hat OpenShift Enterprise Application Node 2.2
SRPM | |
---|---|
openshift-enterprise-upgrade-2.2.11-1.el6op.src.rpm | SHA-256: 684678600d7a39ada09613e3e8f2131ff1c0302d9e3041a187cebf76675ecaaa |
openshift-origin-cartridge-haproxy-1.31.7.1-1.el6op.src.rpm | SHA-256: 2929f1d04ea76635016830e108b098bbada8b45efc7bb53c73eb445ab77c830a |
openshift-origin-cartridge-python-1.34.4.1-1.el6op.src.rpm | SHA-256: 4d29292623e415e1d5775a3f7e097d7f6a6c315d66c2a29b68e806788180ce2d |
openshift-origin-msg-node-mcollective-1.30.3.1-1.el6op.src.rpm | SHA-256: 8894b0fdc2fb0a033626bbbd4e1ccb2eaeb3b3b8f9fb6b3d6c3904077f3d1d0c |
openshift-origin-node-proxy-1.26.4.1-1.el6op.src.rpm | SHA-256: 5be7a48d2364bc0448f88d6a63a5be81270902695d674466c3a36d8fc5c6062c |
openshift-origin-node-util-1.38.8.1-1.el6op.src.rpm | SHA-256: 832c41d74199362210989ef8c73b6e463f9116d23e3b934107f6135106e9e5a5 |
rubygem-openshift-origin-frontend-apache-mod-rewrite-0.8.2.1-1.el6op.src.rpm | SHA-256: c6fcb52c44e805b4a2d3bd52845d3aae477a15cc9b3eadea8db4d92cff6b9cb8 |
rubygem-openshift-origin-frontend-apache-vhost-0.13.3.1-1.el6op.src.rpm | SHA-256: 09b5e3a38406ed813841204b7247faa840cdf9e5bc031b1acf4ae4e6ddf3ebb1 |
rubygem-openshift-origin-frontend-haproxy-sni-proxy-0.5.3.1-1.el6op.src.rpm | SHA-256: d8e741d5123a3b4702c431f61e2e4f19415268f15536c8aeb4d4148a113f0fda |
rubygem-openshift-origin-frontend-nodejs-websocket-0.4.2.1-1.el6op.src.rpm | SHA-256: 9e414c68803f45a0ec50a0a7f700bb80c168401ca3038310c45f624e33eb6354 |
rubygem-openshift-origin-node-1.38.7.1-1.el6op.src.rpm | SHA-256: aeddbeafb1f58d2b2349ad5fa97fe3f5188bf5b905e0938aa3169bfe0746fdde |
x86_64 | |
openshift-enterprise-release-2.2.11-1.el6op.noarch.rpm | SHA-256: c211f0dd8c3efba9d8f2840a7e418f2096dbfbb47f13a8ec7cf7929e38e6162f |
openshift-enterprise-upgrade-node-2.2.11-1.el6op.noarch.rpm | SHA-256: 2182ab628c84f5bdcc4fff537aadd260894787a2c2a47d2501912b7190b8ea4d |
openshift-enterprise-yum-validator-2.2.11-1.el6op.noarch.rpm | SHA-256: b867d00bda0f52d6ba6a98a74f4303c0df9b4b74405e0487131fb3180ec2150e |
openshift-origin-cartridge-haproxy-1.31.7.1-1.el6op.noarch.rpm | SHA-256: 51eccf1effbf4e287e5d7d22432c5c17e94ee5b03a082e40a38811a29fffb34f |
openshift-origin-cartridge-python-1.34.4.1-1.el6op.noarch.rpm | SHA-256: d1d081769812ca7ff3a109144639e5f0fdfa6879354959e1a4907b21316565d1 |
openshift-origin-msg-node-mcollective-1.30.3.1-1.el6op.noarch.rpm | SHA-256: 3571f7067485b72a67d8de2d6f22ddc06bb8e09128047011cb1c54084eb9e6d4 |
openshift-origin-node-proxy-1.26.4.1-1.el6op.noarch.rpm | SHA-256: 2d0fe749cbedb32b5feaa5c871bf38c6cad7f27a90cea0f8466f774974781166 |
openshift-origin-node-util-1.38.8.1-1.el6op.noarch.rpm | SHA-256: ab960e297a55df5a662793af11e6b540ebab93df6c3edb32610597afbecaacc8 |
rubygem-openshift-origin-frontend-apache-mod-rewrite-0.8.2.1-1.el6op.noarch.rpm | SHA-256: 22362fee3fa68b4ad59ed0a883948d5561d425b67a3396438e408c6df3bbab56 |
rubygem-openshift-origin-frontend-apache-vhost-0.13.3.1-1.el6op.noarch.rpm | SHA-256: 307fc8948cbbad0548562b7dfd01c7cc976346f9974c30f63801a6ae5925f540 |
rubygem-openshift-origin-frontend-haproxy-sni-proxy-0.5.3.1-1.el6op.noarch.rpm | SHA-256: 2139ed1ff65db053d722c9a61c0490d5a1e3457bc05b7a746bb1e398c60786cb |
rubygem-openshift-origin-frontend-nodejs-websocket-0.4.2.1-1.el6op.noarch.rpm | SHA-256: adad2d5496b14a6310eb947e4d07eecc2f892a4c8a6223473718ad006bcc761b |
rubygem-openshift-origin-node-1.38.7.1-1.el6op.noarch.rpm | SHA-256: 3e1c1250766b63670687ff4ae1e8327229e82b738057bb22758544a24cdc3fc2 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.