Dieser Inhalt ist in der von Ihnen ausgewählten Sprache nicht verfügbar.

Chapter 2. New features and enhancements


2.1. che-code editor now supports Red Hat Universal Base Image 10

Previously, the che-code editor failed to start on workspaces that used a Red Hat Universal Base Image (UBI) 10. This issue is now resolved.

You can now use UBI 10-based images in the components section of a devfile. For example:

schemaVersion: 2.3.0
metadata:
  name: ubi10-minimal-demo
components:
  - name: tools
    container:
      image:  registry.access.redhat.com/ubi10-minimal@sha256:53de6ac7c3e830b0ddfc9867ff6a8092785bcf156ab4e63dfa9af83c880fd988
      args: ['tail', '-f', '/dev/null']
      endpoints:
        - exposure: public
          name: nodejs
          protocol: http
          targetPort: 3000
      memoryLimit: 2Gi
      memoryRequest: 256Mi
      mountSources: true
    attributes:
      controller.devfile.io/merge-contribution: true

You can find available UBI 10 images in the Red Hat Ecosystem Catalog.

Additional resources

2.2. New Universal Developer Base Image based on Red Hat UBI 10

There is a new udi-base base image based on Red Hat Universal Base Image (UBI) 10, providing a more recent operating system and access to updated packages for all workspaces.

Additional resources

2.3. devspaces-edit and devspaces-view ClusterRoles are pre-created

Starting from this release, Dev Spaces pre-creates two ClusterRoles during installation to simplify administration and GitOps integration. You can reference these roles directly in ClusterRoleBindings without needing to define them manually.

The new roles are:

  • devspaces-edit: Provides full administrative access to Dev Spaces resources.
  • devspaces-view: Provides read-only access to Dev Spaces resources.

For more information, see the documentation about Managing identities and authorizations.

Additional resources

2.4. Set CPU and memory limits in the Advanced Options menu

You can now set CPU and memory limits by using new input fields in the Advanced Options menu on the Dashboard.

Additional resources

2.5. Specify files to copy for user home persistence

When the spec.devEnvironments.persistUserHome feature is enabled, you can specify files to be copied from /home/tooling/ to /home/user/ instead of being symbolically linked. This is useful for configuration files that you want to edit and have the changes persist.

To specify which files to copy, create a .copy-files file in the /home/tooling/ directory of your Universal Developer Image (UDI). In your Dockerfile, add the names of the files to this list.

For example, to copy the .my-config file:

FROM quay.io/devfile/base-developer-image:ubi9-latest
...
RUN echo ".my-config" >> /home/tooling/.copy-files
...

Additional resources

2.6. External TLS configuration now supported for routes

You can now use external tools, such as cert-manager, to manage the TLS configuration for workspace routes. When this feature is enabled, the Dev Spaces operator does not revert any custom TLS settings that are applied to these resources.

To enable this feature, configure the externalTLSConfig field in the CheCluster custom resource:

spec:
  devEnvironments:
    networking:
      externalTLSConfig:
        // Enabled determines whether external TLS configuration is used.
        // If set to true, the operator will not set TLS config for route objects.
        // Instead, it ensures that any custom TLS configuration will not be reverted on synchronization.
        enabled: <bool>
        // Labels to be applied to route objects when external TLS is enabled.
        labels: <map[string]string>
        // Annotations to be applied to route objects when external TLS is enabled.
        annotations: <map[string]string>

Additional resources

2.7. User-setting ConfigMaps are now consolidated

To reduce the number of resources created in each user namespace, the following ConfigMaps are now consolidated into a single ConfigMap named che-user-settings:

  • che-editor-settings
  • che-idle-settings
  • che-proxy-settings

Additional resources

You can now configure default resource requests and limits for all workspace containers by using the new spec.devEnvironments.defaultContainerResources field in the CheCluster custom resource.

To configure the default resources, add the defaultContainerResources field:

spec:
  devEnrinoments:
    defaultContainerResources:
      limits:
        cpu: 200m
        memory: 200Mi
      requests:
        cpu: 100m
        memory: 100Mi

Additional resources

2.9. Specify a Git branch when importing from an SSH repository

When you create a workspace from a Git repository, you can now specify a branch for repositories that use an SSH URL. On the Import from Git page, use the new Git Branch field under Git Repo Options to enter the name of the branch.

Additional resources

2.10. Improved handling of duplicate workspaces from factory URLs

This release introduces smarter handling of factory URLs to prevent the accidental creation of duplicate workspaces.

When you create a workspace by using a factory URL from a Git repository:

  • If a single workspace from that repository already exists, it opens automatically.
  • If multiple workspaces from that repository exist, you are prompted to open an existing one or create a new one.

You can also use URL parameters for more direct control:

  • To force the creation of a new workspace, append ?new to the factory URL.
  • To open a specific workspace directly, append ?existing=<workspace-name> to the factory URL.

Additionally, for sample projects on the Create Workspace page, you can now use the Create New switch to control this behavior. When the switch is enabled, a new workspace is always created. When disabled, an existing workspace from that sample is reused if it exists.

For more information about using these parameters, see the documentation about Starting a workspace from a Git repository URL.

Additional resources

2.11. DevWorkspace Operator 0.37.0 released

This release includes the following key updates.

2.11.1. Add hostUsers field to the DevWorkspaceOperatorConfig

The DevWorkspace pod’s spec.hostUsers field can now be set in the DevWorkspaceOperatorConfig:

apiVersion: controller.devfile.io/v1alpha1
kind: DevWorkspaceOperatorConfig
metadata:
  name: devworkspace-operator-config
  namespace: openshift-operators
config:
  workspace:
    hostUsers: false

Setting the spec.hostUsers field to false is useful when leveraging user-namespaces for pods.

This field is only respected when the UserNamespacesSupport feature is enabled in the cluster. If the feature is disabled, setting hostUsers: false may lead to an endless workspace start loop.

2.11.2. Provide timeout for postStart events

A timeout can now be configured for postStart events to prevent workspace pods from being stuck in a terminating state:

apiVersion: controller.devfile.io/v1alpha1
kind: DevWorkspaceOperatorConfig
metadata:
  name: devworkspace-operator-config
  namespace: openshift-operators
config:
  workspace:
    postStartTimeout: 30s

By default, this timeout is disabled.

Additional resources

Red Hat logoGithubredditYoutubeTwitter

Lernen

Testen, kaufen und verkaufen

Communitys

Über Red Hat Dokumentation

Wir helfen Red Hat Benutzern, mit unseren Produkten und Diensten innovativ zu sein und ihre Ziele zu erreichen – mit Inhalten, denen sie vertrauen können. Entdecken Sie unsere neuesten Updates.

Mehr Inklusion in Open Source

Red Hat hat sich verpflichtet, problematische Sprache in unserem Code, unserer Dokumentation und unseren Web-Eigenschaften zu ersetzen. Weitere Einzelheiten finden Sie in Red Hat Blog.

Über Red Hat

Wir liefern gehärtete Lösungen, die es Unternehmen leichter machen, plattform- und umgebungsübergreifend zu arbeiten, vom zentralen Rechenzentrum bis zum Netzwerkrand.

Theme

© 2026 Red Hat
Nach oben