Release notes and known issues
Release notes and known issues for Red Hat OpenShift Dev Spaces 3.8
Abstract
Making open source more inclusive Copy linkLink copied to clipboard!
Red Hat is committed to replacing problematic language in our code, documentation, and web properties. We are beginning with these four terms: master, slave, blacklist, and whitelist. Because of the enormity of this endeavor, these changes will be implemented gradually over several upcoming releases. For more details, see our CTO Chris Wright’s message.
Chapter 1. About Red Hat OpenShift Dev Spaces Copy linkLink copied to clipboard!
Red Hat OpenShift Dev Spaces provides web-based development environments on Red Hat OpenShift with an enterprise-level setup:
- Cloud Development Environments (CDE) server
- IDEs such as Microsoft Visual Studio Code - Open Source and JetBrains IntelliJ IDEA Community (Technology Preview)
- Containerized environments with popular programming languages, frameworks, and Red Hat technologies
Red Hat OpenShift Dev Spaces is well-suited for container-based development.
Red Hat OpenShift Dev Spaces 3.8 is based on Eclipse Che 7.72.
1.1. Supported platforms Copy linkLink copied to clipboard!
OpenShift Dev Spaces runs on OpenShift 4.10–4.13 on the following CPU architectures:
-
AMD64 and Intel 64 (
x86_64) -
IBM Power (
ppc64le) and IBM Z (s390x)
Additional resources
1.2. Support policy Copy linkLink copied to clipboard!
For Red Hat OpenShift Dev Spaces 3.8, Red Hat will provide support for deployment, configuration, and use of the product.
Additional resources
1.3. Differences between Red Hat OpenShift Dev Spaces and Eclipse Che Copy linkLink copied to clipboard!
There are some differences between Red Hat OpenShift Dev Spaces and the upstream project on which it is based, Eclipse Che:
- OpenShift Dev Spaces is supported only on Red Hat OpenShift.
- OpenShift Dev Spaces is based on Red Hat Enterprise Linux and is regularly updated to include the latest security fixes.
- OpenShift Dev Spaces provides devfiles for working with languages and technologies such as Quarkus, Lombok, NodeJS, Python, DotNet, Golang, C/C++, and PHP. You can find the latest sample projects in the devspaces-devfileregistry container image sources.
- OpenShift Dev Spaces uses OpenShift OAuth for user login and management.
Red Hat provides licensing and packaging to ensure enterprise-level support for OpenShift Dev Spaces.
Chapter 2. New features and enhancements Copy linkLink copied to clipboard!
2.1. Support building a custom devfile registry from a Bitbucket server Copy linkLink copied to clipboard!
With this update, admins can create a custom devfile registry from a clone of the devfile registry Git repository that is hosted on Bitbucket.
Additional resources
2.2. Users can configure Git personal access tokens in User Preferences Copy linkLink copied to clipboard!
With this update, the User Preferences menu features a Personal Access Token tab. You can use the tab to manage GitHub, GitLab, Bitbucket, and Microsoft Azure DevOps personal access tokens. This applies to tokens created from the OpenShift Dev Spaces Dashboard UI as well as those created manually, using a Kubernetes secret.
Additional resources
2.3. Managing workspaces $HOME directory persistence Copy linkLink copied to clipboard!
This release features two CheCluster CRs fields for managing persistences related to workspaces $HOME directory:
-
The
spec.devEnvironments.persistUserHomefield contains configuration settings related to the persistence of /home/user/ in workspaces. -
The
spec.devEnvironments.persistUserHome.enableddetermines whether /home/user/ will persist in workspaces. The persistence of these values is disabled by default.
Additional resources
2.4. Overriding OpenShift cluster-wide proxy settings with DevWorkspace operator configuration Copy linkLink copied to clipboard!
Previously, trusted TLS certificates configured in OpenShift Dev Spaces were ignored if an OpenShift cluster-wide proxy was configured. With this update, you can configure DevWorkspace operator to avoid this undesired behavior.
Additional resources
2.5. Commands imported from a parent devfile available as Microsoft Visual Studio Code - Open Source tasks Copy linkLink copied to clipboard!
With this update, commands defined in the parent devfile are now available in Microsoft Visual Studio Code - Open Source as tasks.
Additional resources
2.6. Simplified procedure to add a Git personal access token Copy linkLink copied to clipboard!
Previously, users had to provide a Git username when adding a personal access token. This step was redundant and caused errors. With this update, the step is removed from the procedure.
Additional resources
2.7. Specifying the devfile component that hosts an IDE Copy linkLink copied to clipboard!
By default, OpenShift Dev Spaces hosts the IDE (Microsoft Visual Studio - Open Source Code or JetBrains IntelliJ IDEA Community Edition) in the first container specified in a devfile. With this update, you can specify the component that will host the IDE using the attribute controller.devfile.io/merge-contribution: true.
In the following example, the IDE will be hosted in "component2":
Additional resources
2.8. Automatic Podman login to the OpenShift internal registry Copy linkLink copied to clipboard!
With this update, the TLS certificate of the OpenShift internal container registry is trusted by Podman. You can use Podman to pull images without adding the certificates manually.
Additional resources
2.9. Automatic update of existing workspace IDE after OpenShift Dev Spaces upgrade Copy linkLink copied to clipboard!
With this update, the IDE of existing workspaces will be updated automatically after an upgrade or whenever the definition of the IDE changes.
Additional resources
2.10. Workspace loading page shows detailed startup progress Copy linkLink copied to clipboard!
With this update, the "Waiting for a workspace to start" step on the workspace loading page features 7 subtasks. This enhancement provides better progress feedback and makes troubleshooting easier.
Additional resources
2.11. New DevWorkspace Operator metrics Copy linkLink copied to clipboard!
With this update, the following metrics are available in the OpenShift Console Operator metrics:
- workspace CPU and memory usage
- node CPU and memory usage
- number of running workspaces
Additional resources
Chapter 3. Bug fixes Copy linkLink copied to clipboard!
3.1. Fixed configuration of enforced containers for a workspace Copy linkLink copied to clipboard!
Before this update, as a result of a bug, administrators were unable to enforce a list of containers to add to all workspaces. With this update, to automatically include specific containers in all workspaces in OpenShift Dev Spaces, administrators can specify a URI to a devfile defining a container component in devEnvironments.defaultPlugins of the CheCluster Custom Resource.
Additional resources
3.2. Fixed workspaces startup from a branch that contains slashes (/) in the name Copy linkLink copied to clipboard!
Before this update, starting a workspace from a branch of a Git repository with a slash (/) resulted in a "devfile could not be found" error. With this update, the issue is solved.
Additional resources
3.3. Fixed CheCluster Custom Resource fields being overridden by the operator Copy linkLink copied to clipboard!
Before this fix, if an administrator customized some of the fields in the CheCluster Custom Resource (such as .spec.components.pluginRegistry.openVSXURL), the values could be overridden by the operator. With this update, the issue is fixed.
Additional resources
3.4. Adding a Microsoft Azure DevOps Personal Access Token from User Preferences menu Copy linkLink copied to clipboard!
Before this update, developers could not add their Microsoft Azure DevOps Personal Access Token from the User Preferences menu in OpenShift Dev Spaces Dashboard. With this update, the issue is fixed.
Additional resources
3.5. Fixed GitHub authentication errors in Microsoft Visual Studio Code - Open Source Copy linkLink copied to clipboard!
Before this update, when a developer tried to authenticate with GitHub (for example to clone a repository or to use a GitHub extension) with an expired GitHub token or without a token, the operation could fail due to an authorization error. With this update, when no valid GitHub token is found, the user is informed how to generate it.
Additional resources
3.6. Fixed git push when using an empty workspace in the IDE Copy linkLink copied to clipboard!
Before this update, when a developer started an empty workspace (not linked to a specific Git repository) or a OpenShift Dev Spaces sample, any consequent try to run git push would fail due to an authorization problem. This would occur even if the developer had pre-configured a personal access token for the Git service. With this update, pre-configured personal access tokens are mounted in empty workspaces and sample workspaces so that git push runs successfully.
Additional resources
Chapter 4. Technology Preview Copy linkLink copied to clipboard!
Technology Preview features provide early access to upcoming product innovations, enabling you to test functionality and provide feedback during the development process. However, these features are not fully supported under Red Hat Subscription Level Agreements, may not be functionally complete, and are not intended for production use. As Red Hat considers making future iterations of Technology Preview features generally available, we will attempt to resolve any issues that customers experience when using these features. See: Technology Preview support scope.
None.
Chapter 5. Deprecated functionalities Copy linkLink copied to clipboard!
None.
Chapter 6. Removed functionalities Copy linkLink copied to clipboard!
None.
Chapter 7. Known issues Copy linkLink copied to clipboard!
7.1. Microsoft Visual Studio Code - Open Source extensions not automatically installed Copy linkLink copied to clipboard!
There is a known issue where automatic installation of the recommended Microsoft Visual Studio Code - Open Source extensions fails if you’re using a Java or Ansible sample.
Workaround
- Refresh the workspace tab in the browser.
Additional resources
7.2. FIPS compliance update Copy linkLink copied to clipboard!
There’s a known issue with FIPS compliance that results in certain cryptographic modules not being FIPS-validated. Below is a list of requirements and limitations for using FIPS with OpenShift Dev Spaces:
Required cluster and operator updates
Update your Red Hat OpenShift Container Platform installation to the latest z-stream update for 4.11, 4.12, or 4.13 as appropriate. If you do not already have FIPS enabled, you will need to uninstall and reinstall.
Once the cluster is up and running, install OpenShift Dev Spaces 3.7.1 (3.7-264) and verify that the latest DevWorkspace operator bundle 0.21.2 (0.21-7) or newer is also installed and updated. See https://catalog.redhat.com/software/containers/devworkspace/devworkspace-operator-bundle/60ec9f48744684587e2186a3
Golang compiler in UDI image
The Universal Developer Image (UDI) container includes a golang compiler, which was built without the CGO_ENABLED=1 flag. The check-payload scanner ( https://github.com/openshift/check-payload ) will throw an error, but this can be safely ignored provided that anything you build with this compiler sets the correct flag CGO_ENABLED=1 and does NOT use extldflags -static or -tags no_openssl.
The resulting binaries can be scanned and should pass without error.
Statically linked binaries
You can find statically linked binaries not related to cryptography in these two containers:
- code-rhel8
- idea-rhel8.
As they are not related to cryptography, they do not affect FIPS compliance.
Helm support for FIPS
The UDI container includes the helm binary, which was not compiled with FIPS support. If you are in a FIPS environment do not use helm.
Additional resources
7.3. Incorrect user name and email in commit messages for some users Copy linkLink copied to clipboard!
There is currently a known issue for users who are using a Kubernetes Secret with their Git-provider credentials. The user name and email for Git operations in workspaces for those users are currently taken from the user-profile Secret of the <user>-devspaces namespace.
This known issue does not impact Git-provider OAuth that has been configured by administrators.
Workaround
In the editor terminal of the running workspace, run the following commands to set your commit author name and email:
git commit config --global user.name <your_name> git commit config --global user.email <your_email>
git commit config --global user.name <your_name> git commit config --global user.email <your_email>Copy to Clipboard Copied! Toggle word wrap Toggle overflow
Additional resources
7.4. Debugger does not work in the .NET sample Copy linkLink copied to clipboard!
Currently, the debugger in Microsoft Visual Studio Code - Open Source does not work in the .NET sample.
Workaround
Use a different image from the following sources:
Additional resources
Chapter 8. Frequently asked questions Copy linkLink copied to clipboard!
- Is it possible to deploy applications from OpenShift Dev Spaces to an OpenShift cluster?
-
The user must log in to the OpenShift cluster from their running workspace using
oc login. - For best performance, what is the recommended storage to use for Persistent Volumes used with OpenShift Dev Spaces?
- Use block storage.
- Is it possible to deploy more than one OpenShift Dev Spaces instance on the same cluster?
- Only one OpenShift Dev Spaces instance can be deployed per cluster.
- Is it possible to install OpenShift Dev Spaces offline (that is, disconnected from the internet)?
- See Installing Red Hat OpenShift Dev Spaces in restricted environments on OpenShift.
- Is it possible to use non-default certificates with OpenShift Dev Spaces?
- You can use self-signed or public certificates. See Importing untrusted TLS certificates.
- Is it possible to run multiple workspaces simultaneously?
- See Enabling users to run multiple workspaces simultaneously.