- Issued:
- 2018-09-17
- Updated:
- 2018-09-17
RHBA-2018:2716 - Bug Fix Advisory
Synopsis
openstack-heat bug fix advisory
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated OpenStack Orchestration packages that resolve various issues are
now available for Red Hat OpenStack Platform 10.0 (Newton) for RHEL 7.
Description
Red Hat OpenStack Platform provides the facilities for building, deploying,
and monitoring a private or public infrastructure-as-a-service (IaaS) cloud
running on commonly available physical hardware. This advisory includes
packages for:
- OpenStack Orchestration service
OpenStack Orchestration (heat) is a template-driven engine used to specify
and deploy configurations for Compute, Storage, and OpenStack Networking.
It can also be used to automate post-deployment actions, which in turn
allows automated provisioning of infrastructure, services, and
applications. Orchestration can also be integrated with Telemetry alarms to
implement auto-scaling for certain infrastructure resources.
Changes to the openstack-heat component:
- Previously, Heat resources such as 'WaitConditionHandle' generated passwords in the format of 32 hexadecimal digits. These passwords did not pass regular expression password validation standards.
With this update, Heat resources generate passwords as random 32 characture strings that contain at least one uppercase letter, one lowercase letter, one digit, and one of the following characters: '!@#%^&*'. The new passwords pass any regular expression validation standards. (BZ#1556946)
- With this enhancement, the OS::Aodh::EventAlarm Heat resource type is now included in RHEL-OSP 10. This enhancement provides a Heat interface to allow users to define alarms that can be evaluated based on events that other OpenStack services emit. For example; service update, create, or delete events. (BZ#1559116)
- Previously, if a user deleted a port in a deployed heat stack, there was no option to recreate the port with the heat CLI, and recreating the whole stack was not possible due to total service unavailability.
With this update, users can mark deleted port resources as unhealthy in heat, and replace these deleted ports with a stack update. (BZ#1600411)
- With this update, users can update a stack with a non-English local.
Solution
Before applying this update, ensure all previously released errata relevant
to your system have been applied.
Red Hat OpenStack Platform 10 runs on Red Hat Enterprise Linux 7.5.
The Red Hat OpenStack Platform 10 Release Notes contain the following:
- An explanation of the way in which the provided components interact to
form a working cloud computing environment.
- Technology Previews, Recommended Practices, and Known Issues.
- The channels required for Red Hat OpenStack Platform 10, including which
channels need to be enabled and disabled.
The Release Notes are available at:
https://access.redhat.com/documentation/en/red-hat-openstack-platform/10/paged/release-notes
This update is available through 'yum update' on systems registered through
Red Hat Subscription Manager. For more information about Red Hat
Subscription Manager, see:
https://access.redhat.com/documentation/en-US/Red_Hat_Subscription_Management/1/html/RHSM/index.html
Affected Products
- Red Hat OpenStack 10 x86_64
Fixes
- BZ - 1445484 - Set IN_PROGRESS resources as FAILED when heat engine is restarted
- BZ - 1556946 - Suboptimal wait_condition_handle password generator
- BZ - 1559116 - OS::Aodh::EventAlarm resource does not exist in RHOSP 10
- BZ - 1600411 - stack correct option in case of resource deletion (neutron ports) in a deployed heat stack
- BZ - 1602782 - Trace when deploying a heat template...
CVEs
(none)
References
(none)
Red Hat OpenStack 10
SRPM | |
---|---|
openstack-heat-7.0.6-4.el7ost.src.rpm | SHA-256: 5e89a2b98cb227bf51f3d737f0aaa3c55bfea1496040bed2157068b818f66019 |
x86_64 | |
openstack-heat-api-7.0.6-4.el7ost.noarch.rpm | SHA-256: bd04bcffe227672a3ec9eff0f7470beb9f3664a550431524b3df71f00e54b3d7 |
openstack-heat-api-cfn-7.0.6-4.el7ost.noarch.rpm | SHA-256: 084433458eb1f86f4fcc70d15097bd796608eddf4e06898f9e7a2e799e1bd4d7 |
openstack-heat-api-cloudwatch-7.0.6-4.el7ost.noarch.rpm | SHA-256: 31cc9bff7f70bc0d4a95b6b0bc95bacb2df77b1ed1172d2a09b66fd328877951 |
openstack-heat-common-7.0.6-4.el7ost.noarch.rpm | SHA-256: ad50312690bce61cfe11021c56dac1101ba71f8be95a1d7ab9d4780581a60555 |
openstack-heat-engine-7.0.6-4.el7ost.noarch.rpm | SHA-256: e548df5f50d21313c190c73fc49faa772da27208da023829a5b8be72776ce229 |
python-heat-tests-7.0.6-4.el7ost.noarch.rpm | SHA-256: f5b10617f1a193f1cf2905cb110826933c6cc23c4d3c7590d95c6fedf9382e4c |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.