@@ -1658,7 +1658,7 @@ there is a cache miss. With this bug fix, the replication controllers are scaled
1658
1658
properly.
1659
1659
(link:https://bugzilla.redhat.com/show_bug.cgi?id=1427992[*BZ#1427992*])
1660
1660
1661
- *Image *
1661
+ *Images *
1662
1662
1663
1663
* A .NET jenkins slave image for performing .NET CI/CD flows is now offered. This
1664
1664
makes it easier to build and test .NET code bases using Jenkins. A .NET slave
@@ -1671,7 +1671,7 @@ included.
1671
1671
1672
1672
* `importPolicy.insecure` is ignored in `oc import-image <imagestream:tag>` As a
1673
1673
result, re-import from an insecure registry fails because it expects a valid SSL
1674
- certificate. When the image stream tag exists, use its i`mportPolicy .insecure`.
1674
+ certificate. When the image stream tag exists, use its `importPolicy .insecure`.
1675
1675
With this bug fix, re-import succeeds.
1676
1676
(link:https://bugzilla.redhat.com/show_bug.cgi?id=1494231[*BZ#1494231*])
1677
1677
@@ -1992,7 +1992,7 @@ es_load_kibana_ui_objects user-name`. It exists inside the Elasticsearch and
1992
1992
ES-OPS pod, and must be run inside those pods. Additionally, it requires some
1993
1993
indices and other objects set up by the OpenShift Elasticsearch plug-in, so the
1994
1994
user must login to Kibana or Elasticsearch before using this script. This will
1995
- also add an index pattern for ` project.*` and load the necessary index pattern
1995
+ also add an index pattern for project.* and load the necessary index pattern
1996
1996
file. Kibana visualizations and dashboard gives administrators an easier way to
1997
1997
view Kubernetes/OpenShift related logs in the cluster, allowing admin users have
1998
1998
graphs and a dashboard to use to view logs from OpenShift pods and containers.
@@ -2551,9 +2551,180 @@ namespace terminating. As a result, deprovision fails, and both the APB
2551
2551
deprovision sandbox and target namespace were not deleted. Now, instead of
2552
2552
executing APB actions on namespace deletion, the records of the services to be
2553
2553
deprovisioned are cleaned up, allowing kubernetes to delete the resources
2554
- normally, meaning the target namespace is properly deleted by kubernetes .
2554
+ normally, meaning the target namespace is properly deleted by Kubernetes .
2555
2555
(link:https://bugzilla.redhat.com/show_bug.cgi?id=1476173[*BZ#1476173*])
2556
2556
2557
+ * The error message returned when a user does not have permission to modify a
2558
+ TemplateInstance is updated.
2559
+ (link:https://bugzilla.redhat.com/show_bug.cgi?id=1460145[*BZ#1460145*])
2560
+
2561
+ * Previously, only one annotation returned when both _expose_ and _base64-expose_
2562
+ annotations were defined in template (per bind request). This issue is fixed in
2563
+ the latest release.
2564
+ (link:https://bugzilla.redhat.com/show_bug.cgi?id=1463570[*BZ#1463570*])
2565
+
2566
+ * Previously, Ansible Playbook Bundles (APB) that have been removed from their
2567
+ container catalog, appeared in Ansible Service Broker (ASB) as valid options
2568
+ even after *bootstrap* was performed. This issue is fixed now.
2569
+ (link:https://bugzilla.redhat.com/show_bug.cgi?id=1463798[*BZ#1463798*])
2570
+
2571
+ * Previously, there were inconsistency between the serviceclass and the
2572
+ server-broker. After creating a broker, the controller-manager only fetched the
2573
+ catalog once. This resulted in inability to updates the serviceclass unless the
2574
+ broker was recreated. This is fixed now.
2575
+ (link:https://bugzilla.redhat.com/show_bug.cgi?id=1469448[*BZ#1469448*])
2576
+
2577
+ * Previously, the Ansible service broker would fail on provisioning because of
2578
+ incorrect permissions. This is now fixed and Ansible service broker now has the
2579
+ required permissions for creating new namespaces and dynamic service account in
2580
+ these new namespace to run APBs.
2581
+ (link:https://bugzilla.redhat.com/show_bug.cgi?id=1469485[*BZ#1469485*])
2582
+
2583
+ * The `oc version` command did not get OpenShift version against the ansible
2584
+ deployed service catalog environment. The version information is added the
2585
+ command now reports correct information.
2586
+ (link:https://bugzilla.redhat.com/show_bug.cgi?id=1471717[*BZ#1471717*])
2587
+
2588
+ * Previously, when the Ansible Service Broker started it could not communicate to
2589
+ the configured registry, and therefore got no information about APBs. This was
2590
+ because of a missing setting in the ansible service broker configuration. The
2591
+ `broker: bootstrap_on_startup: true` setting is now added in the configuration
2592
+ which resolves this issue.
2593
+ (link:https://bugzilla.redhat.com/show_bug.cgi?id=1471973[*BZ#1471973*])
2594
+
2595
+ * Previously, the ansible service broker container would fail if the dockerhub
2596
+ credentials were not supplied because the encryption script required them. It is
2597
+ now reconfigured to use RHCC adapter and the dockerhub credentials are optional.
2598
+ (link:https://bugzilla.redhat.com/show_bug.cgi?id=1464222[*BZ#1464222*])
2599
+
2600
+ * Previously, bad data was being returned from the bootstrapped registry. This was
2601
+ because the broker failed to bootstrap and it used to error out due to a null
2602
+ pointer de-reference. The broker now has logic to avoid de-referencing null
2603
+ pointers if the data is corrupted. This issue is now resolved and the broker
2604
+ skips image with bad data and continues with next one.
2605
+ (link:https://bugzilla.redhat.com/show_bug.cgi?id=1467905[*BZ#1467905*])
2606
+
2607
+ * The Service Broker Installer was setting incorrect configuration values for
2608
+ `launchapbonbind`, this is fixed and configuration value is now set as
2609
+ `launch_apb_on_bind`.
2610
+ (link:https://bugzilla.redhat.com/show_bug.cgi?id=1467948[*BZ#1467948*])
2611
+
2612
+ * The role for Service Accounts used by the Ansible Service Broker is updated. The
2613
+ Broker runs under `asb` service account set to `admin` through a
2614
+ _ClusterRoleBinding_ and APBs run under a temporary service account granted
2615
+ `edit` through a _RoleBinding_ in the target namespace.
2616
+ (link:https://bugzilla.redhat.com/show_bug.cgi?id=1470824[*BZ#1470824*])
2617
+
2618
+ *Storage*
2619
+
2620
+ * Creating a new persistent volume claim (PVC) using OpenStack Cinder storageclass
2621
+ resulted in the PVC being stuck in `Pending` state. This bug fix re-configured
2622
+ the cloud provider openstack.conf to use OpenStack Keystone V3. As a result,
2623
+ dynamic provisioning of new Cinder volumes works as documented.
2624
+ (link:https://bugzilla.redhat.com/show_bug.cgi?id=1491331[*BZ#1491331*])
2625
+
2626
+ * Previously, the Gophercloud library used by OpenShift to communicate with the
2627
+ OpenStack API did not accept HTTP status 300 in pagination. It was not possible
2628
+ to dynamically provision OpenStack Cinder volumes. This bug fix upgrades the
2629
+ Gophercloud library in the OpenShift vendor directory. As a result, dynamic
2630
+ provisioning of new Cinder volumes works as documented.
2631
+ (link:https://bugzilla.redhat.com/show_bug.cgi?id=1490768[*BZ#1490768*])
2632
+
2633
+ * Previously, the default bootstrap policy allowed basic users to “get” storage
2634
+ classes, but not “list” storage classes. Basic users would receive an error
2635
+ message after issuing the `oc get storagelcass storageclass_name` command. This
2636
+ bug fix modified the bootstrap policy. As a result, basic users can now issue
2637
+ the `oc get storagelcass storageclass_name` command to receive specific storage
2638
+ classes.
2639
+ (link:https://bugzilla.redhat.com/show_bug.cgi?id=1449608[*BZ#1449608*])
2640
+
2641
+ * Previously, the lack of cloud provider configuration in the admission plug-in
2642
+ caused persistent volume (PV) creation to fail when attempting to create the PV
2643
+ in a zone other than master. This bug fix enables static PV provisioning in
2644
+ multizone environments. As a result, users can now statically provision PVs in
2645
+ zones other than master.
2646
+ (link:https://bugzilla.redhat.com/show_bug.cgi?id=1454601[*BZ#1454601*])
2647
+
2648
+ * Previously, when creating storage classes, users could not specify the `fstype`.
2649
+ This bug fix allows specifying the desired `fstype` when dynamically
2650
+ provisioning volumes with storage classes. As a result, storage classes now
2651
+ support file system configuration when creating dynamically provisioned volumes.
2652
+ (link:https://bugzilla.redhat.com/show_bug.cgi?id=1469001[*BZ#1469001*])
2653
+
2654
+ * Previously, it was not possible to dynamically provision ScaleIO volumes if the
2655
+ ScaleIO volume plug-in was not enabled. This bug fix enables the ScaleIO volume
2656
+ plug-in in OpenShift Container Platform 3.7. As a result, it is now possible to
2657
+ dynamically provision ScaleIO volumes.
2658
+ (link:https://bugzilla.redhat.com/show_bug.cgi?id=1482274[*BZ#1482274*])
2659
+
2660
+ * When trying to mount/unmount, the FlexVolume plug-in’s file system previously
2661
+ assumed that SELinux was supported. This assumption instructed docker to relabel
2662
+ the volume. If the FlexVolume plugin's file system did not support file system
2663
+ relabeling, the container using the FlexVolume would fail to start. This bug fix
2664
+ added the `selinuxRelabel` capability, which allows FlexVolume plug-ins to
2665
+ report in their `init` call. As a result, FlexVolume plug-ins can now be
2666
+ configured to opt out of SELinux relabeling.
2667
+ (link:https://bugzilla.redhat.com/show_bug.cgi?id=1484899[*BZ#1484899*])
2668
+
2669
+ *Templates*
2670
+
2671
+ * Previously, the service catalog could not provide authentication when invoking
2672
+ the template service broker, which meant the template service broker API had to
2673
+ allow calls from unauthenticated clients. This bug fix allows the service
2674
+ catalog to use proper authentication to invoke the template service broker when
2675
+ issuing the `oc cluster up` command to run both. As a result, the template
2676
+ service broker APIs will now be secured, and will only be invokable by the
2677
+ service catalog (or another client with appropriate credentials).
2678
+ (link:https://bugzilla.redhat.com/show_bug.cgi?id=1470628[*BZ#1470628*])
2679
+
2680
+ *Upgrade*
2681
+
2682
+ * Previously, the master node upgrade took more disk space than was initially
2683
+ estimated. This caused the etcd member to report a `no space left on device`
2684
+ error message. This bug fix increased the estimation of disk space needed before
2685
+ the master node upgrade can start. As a result, a master node is properly
2686
+ upgraded with enough disk space left after the upgrade finishes.
2687
+ (link:https://bugzilla.redhat.com/show_bug.cgi?id=1489182[*BZ#1489182*])
2688
+
2689
+ * Previously, the upgrade playbooks incorrectly overwrote nondefault
2690
+ `admissionConfig` parameters while setting specific values required of the
2691
+ upgrade process. This bug fix removed this task as it is no longer necessary
2692
+ after upgrading from OpenShift Container Platform 3.4 to OpenShift Container
2693
+ Platform 3.5.
2694
+ (link:https://bugzilla.redhat.com/show_bug.cgi?id=1486054[*BZ#1486054*])
2695
+
2696
+ * Previously, the etcd v3 data migrated prior to the first etcd v2 snapshot being
2697
+ written. Without a v2 snapshot, the v3 data was not propagated properly to the
2698
+ remaining etcd members, which resulted in a loss of some v3 data. This bug fix
2699
+ checks to see if there is at least one v2 snapshot before etcd data migration
2700
+ proceeds. As a result, etcd v3 data is now properly distributed among all etcd
2701
+ members.
2702
+ (link:https://bugzilla.redhat.com/show_bug.cgi?id=1501752[*BZ#1501752*])
2703
+
2704
+ * When trying to upgrade OpenShift Container Platform with dedicated etcd from
2705
+ v3.6 to v3.7, the upgrade failed at the [Stop
2706
+ atomic-openshift-master-controllers] task due to the wrong hosts group. This bug
2707
+ fix corrected the host group to specify the masters group for controller
2708
+ restart. As a result, the upgrade now succeeds.
2709
+ (link:https://bugzilla.redhat.com/show_bug.cgi?id=1504515[*BZ#1504515*])
2710
+
2711
+ * Previously, if Ansible tags were used to evaluate some of the tasks in a set of
2712
+ playbooks, the conditional for including a task file was not properly evaluated.
2713
+ This caused the upgrade to fail. This bug fix allows the conditional to evaluate
2714
+ properly and skip running the task.
2715
+ (link:https://bugzilla.redhat.com/show_bug.cgi?id=1464025[*BZ#1464025*])
2716
+
2717
+ * Ansible playbooks now exit immediately when health checks fail. Previously, in
2718
+ some instances, a host failure would not result in the playbook exiting during
2719
+ failed health checks. This bug fix sets the `any_errors_fatal` play option to
2720
+ `true`, ensuring that the playbook exits as expected.
2721
+ (link:https://bugzilla.redhat.com/show_bug.cgi?id=1484324[*BZ#1484324*])
2722
+
2723
+ * Upgrades that made use of system reboots to restart services may have failed if
2724
+ hosts took longer than 5 minutes to restart. This bug fix increases the timeout
2725
+ to 10 minutes. As a result, the shutdown process is now faster.
2726
+ (link:https://bugzilla.redhat.com/show_bug.cgi?id=1455836[*BZ#1455836*])
2727
+
2557
2728
[[ocp-37-technology-preview]]
2558
2729
== Technology Preview Features
2559
2730
0 commit comments