- Issued:
- 2014-01-21
- Updated:
- 2014-01-21
RHEA-2014:0066 - Product Enhancement Advisory
Synopsis
otopi bug fix and enhancement update
Type/Severity
Product Enhancement Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated otopi packages that fix several bugs and add various enhancements are
now available.
Description
otppi is a standalone plugin based installation framework to be used to setup
system components. The plugin nature provides simplicity to add new installation
functionality without the complexity of the state and transaction management.
There is a new upgrade to otopi-1.1.0
The following bugs were fixed and enhancements included:
- 2013-10-07 - Version 1.1.2
- network: firewalld: fix service deletion.
- core: fix suppress environment variable logic.
- dialog: cli: fix exception show.
2013-09-07 - Version 1.1.1
- core: do not load plugins from empty directories.
- core: support binary file transaction.
- packagers: yum: support disable transaction rollback.
2013-08-26 - Version 1.1.0
- core: support non unicode command output.
- core: support more complex sequence relationships.
- packagers: yum: do not enable if running non root.
- packagers: yum: selinux: do not change type to rpm_t.
- packagers: yum: rollback complex transaction successfully.
- packagers: yum: workaround non-standard encoding of yum.i18n.
- packagers: yum: optionally do not expire yum cache.
- java: do not fail to set null environment.
- dialog: fix handling of empty string notes.
- dialog: support tuples for note like list.
- build: re-introduce external gettext packaging.
- services: openrc: do not fail set startup if service missing.
- network: add firewalld support. (#995053)
Users should upgrade to this updated otopi package, which resolves these issues.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258
Affected Products
- Red Hat Virtualization 3.3 x86_64
Fixes
- BZ - 995053 - [RFE] upgrade to otopi-1.1.0
CVEs
(none)
References
(none)
Red Hat Virtualization 3.3
SRPM | |
---|---|
otopi-1.1.2-1.el6ev.src.rpm | SHA-256: f2e25051dc467dbc28ac495a5464daaf84b1d8b7d8fc314ac111a34a7bf4ae91 |
x86_64 | |
otopi-1.1.2-1.el6ev.noarch.rpm | SHA-256: 039743e9d8410ace5793b19d3ee8589b5bbaba3b8cd89e7aeb36952d463a5d43 |
otopi-devel-1.1.2-1.el6ev.noarch.rpm | SHA-256: 3248a9fedbe22135ffa52acbd0d704ebf8ee23b221d51be97bbd839bc5b26e39 |
otopi-java-1.1.2-1.el6ev.noarch.rpm | SHA-256: 07429d318d9ce387e36c5d1c08c2f3af8c4ada219c8e3569d21e30ba8589d401 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.