Updated cockpit packages that fix several bugs and add various enhancements arenow available for Red Hat Enterprise Linux 7 Extras.
Cockpit is a server administration interface that makes it easy to administerGNU/Linux servers through a web browser.The cockpit packages have been upgraded to upstream version 0.114, whichprovides a number of bug fixes and enhancements over the previous version. Mostnotable changes are:* The protocol of cockpit-bridge and Cockpit’s javascript API is now stable.Plugins written against the javascript API should not experience changes fromthis point on.* Red Hat subscriptions can now specify activation keys and organization.(BZ#1338680)* SSH Host keys are now shown on the system page. (BZ#1318414)* tuned is now disabled correctly when clearing a performance profile.(BZ#1330473)* Improved password score error messages are now displayed. (BZ#1330838)* An erroneous docker dependency has been removed from the cockpit package.(BZ#1349375)* Network configuration of the Ethernet Maximum Transmission Unit (MTU) is nowavailable. (BZ#1339552)* The “active-backup” mode is now used as the default for new network bonds.(BZ#1348066)* Network interfaces where NM_CONTROLLED=no is set are no longerdisplayed.(BZ#1330552)* The network on/off switch for unknown or unmanaged interfaces is now disabled.(BZ#1329954, BZ#1329956)Users of cockpit are advised to upgrade to these updated packages, which fixthese bugs and add these enhancements.
Before applying this update, make sure all previously released errata relevantto your system have been applied.For details on how to apply this update, refer to:https://access.redhat.com/articles/11258Red Hat Enterprise Linux Extras (v. 7)

    MD5: 2c79d1a8ed4def27131c52d8e41f5580SHA-256: 7ce44a1b9a3291839111481e195e5051cd63cbf601e83043bd390aea0f02abf9
    MD5: 51eb39dd6fc50446f0e6a9ab0fb74000SHA-256: 20fa6b18bc810a931355b08b94c8f29c56c7728629e0294fb6e9024b3ab26c8c
    MD5: c29f8c72784129a90b11028d3f64958dSHA-256: 3b2b223f25a0e5ab6f2463fc07322988c2e49f2e8b298ad594c277dc672bd675
    MD5: 090455db85b117cd4ef313e21b5cc0daSHA-256: 129afeb0b93ced26ad89d5606f4d0d0febb39cc2ae907298d742fa780b10acda
    MD5: 8ccd0fee5da8b7380a387a32251b7298SHA-256: 364e8457521fe04722fd1471a3725fee0a2ff0bba1ac402e64d7120ba0f6f533
    MD5: 7985bbd15f0f86dbd34731130695d6e2SHA-256: 997ab0e856200ca5e53e0dade9fad858286e9de3517b65580edd0c8480a07d42
    MD5: 3cc3a53332bd945f62f5d352e5df9f2aSHA-256: 9966415c34f4b225180dd1f0bcc378bd4f1f319ab2b113bd7be6cfdcd989677a
    MD5: 716c1db892a2f2d7bfdc1fa7869034eaSHA-256: 609f74fe7e5dc16ae114c65319af1e483e466a20458fa242fc6123f7dc55f200
    MD5: 1d1aa95a3a32ee77c4d197447f7319f5SHA-256: 1e1bc6455d55ccff28f929d8070f6470a210cce9ca3265226b6426367f1e659d
    MD5: cc1076d47cd4ed25c2c937da8fd29f96SHA-256: f94e498385eb0d146659f98252d3f48085c6871ec9bfaf78c3384d94e18c04d8
(The unlinked packages above are only available from the Red Hat Network)

1318414 – [RFE] [Cockpit] Ability to view the SSH host key1329954 – Bond can not click to on after created through cockpit1329956 – vlan can not click to on after created through cockpit and the original nic still can be configured1330473 – Disabled performance in cockpit doesn’t work in node1330552 – [RFE] Don’t allow editing NIC configurations if they are unmanaged/NM_CONTROLLED=no1330838 – [RFE] Should give more friendly info when password is not acceptable1331243 – Operating System and Hardware information display incomplete on UI system tab1336686 – Did not display the keys as prompted in authentication page1338680 – [RFE] Provide a way to fill activation key and Organization when subscribe to Satellite&SAM in node ng1339552 – [RFE] an option to set MTU for network interface1340749 – The pop-up info display of incomplete during click “create new account” button.1348066 – [CockPit] – The default bonding mode should be safe defaults – mode 4 – Dynamic link aggregation(802.3ad) or mode 1 – active-backup1349375 – Cockpit pulls in docker by default1353765 – Rebase Cockpit in RHEL Extras 7.2.6

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

Leave a Reply