- Issued:
- 2014-07-14
- Updated:
- 2014-07-14
RHBA-2014:0878 - Bug Fix Advisory
Synopsis
Red Hat OpenShift Enterprise 2.1.3 bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Red Hat OpenShift Enterprise release 2.1.3 is now available with updates to
packages that fix several bugs and introduce a feature enhancement.
Description
OpenShift Enterprise by Red Hat is the company's cloud computing
Platform-as-a-Service (PaaS) solution designed for on-premise or private cloud
deployments.
This update fixes the following bugs:
- The PHP cartridge control script was not specific enough to guarantee that PHP
modules were loaded correctly. If installed PHP modules had similar names, in
some cases they were not detected when applications were started or stopped.
This bug fix improves the PHP cartridge control script so that PHP modules are
now detected and loaded correctly. (BZ#1114131)
- The PHP cartridge included .ini files for the standard set of modules
available in OpenShift Origin and OpenShift Online. However, OpenShift
Enterprise administrators can choose to install only a subset of these modules
and can also install modules that are not supported upstream. Therefore,
applications using PHP cartridges failed to load any modules that were not
actually installed or did not have corresponding .ini files packaged with the
cartridge, causing unexpected behavior and unnecessary error messages. This bug
fix updates the PHP cartridge to only load .ini files for modules which are
available in the OpenShift Enterprise deployment and to search for and load
additional modules from the system wide PHP installation as needed. Developers
can also choose to disable modules individually by setting environment variables
using the form "OPENSHIFT_PHP_<MODULE_NAME>_ENABLED=false". (BZ#1082963)
- Previously, if an application was deleted while the mmopenshift Rsyslog 7
plug-in was in use and a new application was later created with the same name,
it was possible for the new application to show the old application and gear
UUIDs in its logs. This was because the plug-in cached the UUID information but
did not properly clear the cache when the gears were destroyed. This bug fix
updates the plug-in to properly clear the cache when gears are destroyed. As a
result, logs no longer show the incorrect UUIDs. (BZ#1096155)
This update also adds the following enhancement:
- Previously, developers could not create application aliases that conflicted
with an existing application name or were in a form that could conflict with
future application names. These restrictions prevented problems when the front
end on the node had two destinations for the same URL on the same node but could
only route one. However, administrators that are aware of the need to prevent
alias conflicts using external means may want to remove these restrictions. This
enhancement allows administrations to add the PREVENT_ALIAS_COLLISION parameter
to the /etc/openshift/broker.conf file on the broker host and set it to "false"
to remove the alias restrictions. Ensure that you have a solution in place for
preventing alias conflicts before enabling this parameter. (BZ#1115158)
All OpenShift Enterprise users are advised to upgrade to these updated packages.
Solution
Before applying this update, make sure all previously released errata relevant
to your system have been applied.
See the OpenShift Enterprise 2.1 Release Notes, which will be updated shortly
for release 2.1.3, for important instructions on how to fully apply this
asynchronous errata update:
This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258.
Affected Products
- Red Hat OpenShift Enterprise Infrastructure 2.1 x86_64
- Red Hat OpenShift Enterprise Application Node 2.1 x86_64
Fixes
- BZ - 1082963 - Should not show warning messege when running 'php -S $OPENSHIFT_PHP_IP:8000' in php-5.4 app
- BZ - 1096155 - The rsyslog7 should check and update the cache
- BZ - 1114131 - Ambiguous match in php_config enable_modules function could prevent PHP modules from being enabled
- BZ - 1115158 - [RFE] option to relax alias validations
CVEs
(none)
References
(none)
Red Hat OpenShift Enterprise Infrastructure 2.1
SRPM | |
---|---|
openshift-enterprise-upgrade-2.1.3-1.el6op.src.rpm | SHA-256: e83bf4acd38c20bd03aac26efd1bbe7e76c7aad3abc05244fc797eba46f5b589 |
openshift-origin-broker-1.16.1.6-1.el6op.src.rpm | SHA-256: cc07c2be661bffa9cad8be5028905b28f0c567b90c6f83319b04f1586fd7737e |
openshift-origin-console-1.16.2.6-1.el6op.src.rpm | SHA-256: 6a742b442b60df90be0163fc1effd360e3b7a3ed56ab46bf887bc2fd8d4dc1c9 |
rsyslog7-7.4.7-5.7.el6op.src.rpm | SHA-256: 643a7edc8f37246d2494758579a2f4606531423f079a0b041c3706137fdbd105 |
rubygem-openshift-origin-controller-1.23.10.3-1.el6op.src.rpm | SHA-256: f7d6a1dc45d183f7ac2b6f8f51b3d21be4cbda75945a8cccce6572221283dbd3 |
x86_64 | |
openshift-enterprise-release-2.1.3-1.el6op.noarch.rpm | SHA-256: c5d170bb419c15e327f06856ad27230689461522dec90d93066ff36937b8cc24 |
openshift-enterprise-upgrade-broker-2.1.3-1.el6op.noarch.rpm | SHA-256: 78bbdd4ccaa5643002aea02f0ea4c385dc7150571e58d9bf1ea5b82c949f6108 |
openshift-enterprise-yum-validator-2.1.3-1.el6op.noarch.rpm | SHA-256: 1bc8c32e90c3ab36dc6134c13a3420e18c7fd18ae805b152f58ab0d2f5ceb162 |
openshift-origin-broker-1.16.1.6-1.el6op.noarch.rpm | SHA-256: 098838f15620b168de1006f84774d168b100dd3ee4e3761b7cb848be9e8802ad |
openshift-origin-console-1.16.2.6-1.el6op.noarch.rpm | SHA-256: bc3fff8badaae6af55f0176953f7a4b505a5802f45f7f95548e5e3d280dc8a78 |
rsyslog7-7.4.7-5.7.el6op.x86_64.rpm | SHA-256: c2df1d98a877293489b75c4278733ae22343ada1a384e70e254c1ebb3c4615a7 |
rsyslog7-crypto-7.4.7-5.7.el6op.x86_64.rpm | SHA-256: cb3466d8dbe5558004602778c1515d5d0e6c8307947d9e35c8b983b8ab951da4 |
rsyslog7-debuginfo-7.4.7-5.7.el6op.x86_64.rpm | SHA-256: 0c5ba488a14a73aa9e534f4c5f9831efba717631c50aa07df8d6acaf3914479b |
rsyslog7-gnutls-7.4.7-5.7.el6op.x86_64.rpm | SHA-256: 3980e7bab26f172e9495615ef04739f31bdfb68d8d11aba8158726350bbc533c |
rsyslog7-libdbi-7.4.7-5.7.el6op.x86_64.rpm | SHA-256: 13fc43d043306d4978fe3fa013b75c9c21e0a00a83a8e65e786074a6f523ff04 |
rsyslog7-mmjsonparse-7.4.7-5.7.el6op.x86_64.rpm | SHA-256: 17e489141fdb465a63dbcc85641bd1dc75eec6648a0caa836008ad6b661d169d |
rsyslog7-mmopenshift-7.4.7-5.7.el6op.x86_64.rpm | SHA-256: 9d9051f77699b4843f2b4bd8cbfa679333038ee7d941fae05e03c83e4a7e38fe |
rsyslog7-mysql-7.4.7-5.7.el6op.x86_64.rpm | SHA-256: 3aff63433eca7f58250e58238ee8f7ed96de2f214e1e9a017cca29373184fdde |
rsyslog7-pgsql-7.4.7-5.7.el6op.x86_64.rpm | SHA-256: 4c4744bb12cf3b0c45f145b607245872e8525a61471201702cc8b9cc5358b485 |
rsyslog7-snmp-7.4.7-5.7.el6op.x86_64.rpm | SHA-256: 3ba983ce67fce8fbfe92673d4bb0f8bb5314b30eeb6f093b12c2bb80c7a688e8 |
rubygem-openshift-origin-controller-1.23.10.3-1.el6op.noarch.rpm | SHA-256: 683af4e9ee330bc98670944b4600cdfbdcb5f79154bdbb92b7d4c600333ad203 |
Red Hat OpenShift Enterprise Application Node 2.1
SRPM | |
---|---|
openshift-enterprise-upgrade-2.1.3-1.el6op.src.rpm | SHA-256: e83bf4acd38c20bd03aac26efd1bbe7e76c7aad3abc05244fc797eba46f5b589 |
openshift-origin-cartridge-nodejs-1.24.3.4-1.el6op.src.rpm | SHA-256: 4372c727c4a9a0cac9f12bb430abbaf2ae967fb1e2f142c3ebaeca2a2381be4f |
openshift-origin-cartridge-php-1.23.3.7-1.el6op.src.rpm | SHA-256: b3284f50aec983933c25ffdcbe87561a37811a38f0db3c37bb138bb18e964e59 |
rsyslog7-7.4.7-5.7.el6op.src.rpm | SHA-256: 643a7edc8f37246d2494758579a2f4606531423f079a0b041c3706137fdbd105 |
x86_64 | |
openshift-enterprise-release-2.1.3-1.el6op.noarch.rpm | SHA-256: c5d170bb419c15e327f06856ad27230689461522dec90d93066ff36937b8cc24 |
openshift-enterprise-upgrade-node-2.1.3-1.el6op.noarch.rpm | SHA-256: 24a3f4c194ac0820405a8b86c4891308e6efea724f8318dda4c52d80f451236b |
openshift-enterprise-yum-validator-2.1.3-1.el6op.noarch.rpm | SHA-256: 1bc8c32e90c3ab36dc6134c13a3420e18c7fd18ae805b152f58ab0d2f5ceb162 |
openshift-origin-cartridge-nodejs-1.24.3.4-1.el6op.noarch.rpm | SHA-256: ed39b95fcfa587c0c71127e8ec92e746284388d016c721d13c23b5a6d896d2e7 |
openshift-origin-cartridge-php-1.23.3.7-1.el6op.noarch.rpm | SHA-256: 7c4ff7b68617cfa941ca3cebd43e43e5baafb7eca69e5389653c73db94add6f6 |
rsyslog7-7.4.7-5.7.el6op.x86_64.rpm | SHA-256: c2df1d98a877293489b75c4278733ae22343ada1a384e70e254c1ebb3c4615a7 |
rsyslog7-crypto-7.4.7-5.7.el6op.x86_64.rpm | SHA-256: cb3466d8dbe5558004602778c1515d5d0e6c8307947d9e35c8b983b8ab951da4 |
rsyslog7-debuginfo-7.4.7-5.7.el6op.x86_64.rpm | SHA-256: 0c5ba488a14a73aa9e534f4c5f9831efba717631c50aa07df8d6acaf3914479b |
rsyslog7-gnutls-7.4.7-5.7.el6op.x86_64.rpm | SHA-256: 3980e7bab26f172e9495615ef04739f31bdfb68d8d11aba8158726350bbc533c |
rsyslog7-libdbi-7.4.7-5.7.el6op.x86_64.rpm | SHA-256: 13fc43d043306d4978fe3fa013b75c9c21e0a00a83a8e65e786074a6f523ff04 |
rsyslog7-mmjsonparse-7.4.7-5.7.el6op.x86_64.rpm | SHA-256: 17e489141fdb465a63dbcc85641bd1dc75eec6648a0caa836008ad6b661d169d |
rsyslog7-mmopenshift-7.4.7-5.7.el6op.x86_64.rpm | SHA-256: 9d9051f77699b4843f2b4bd8cbfa679333038ee7d941fae05e03c83e4a7e38fe |
rsyslog7-mysql-7.4.7-5.7.el6op.x86_64.rpm | SHA-256: 3aff63433eca7f58250e58238ee8f7ed96de2f214e1e9a017cca29373184fdde |
rsyslog7-pgsql-7.4.7-5.7.el6op.x86_64.rpm | SHA-256: 4c4744bb12cf3b0c45f145b607245872e8525a61471201702cc8b9cc5358b485 |
rsyslog7-snmp-7.4.7-5.7.el6op.x86_64.rpm | SHA-256: 3ba983ce67fce8fbfe92673d4bb0f8bb5314b30eeb6f093b12c2bb80c7a688e8 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.