Ce contenu n'est pas disponible dans la langue sélectionnée.

Release Notes and Known Issues


Red Hat CodeReady Workspaces 2.9

Release Notes and Known Issues for Red Hat CodeReady Workspaces 2.9

Michal Maléř

Robert Kratky

Fabrice Flore-Thébault

Red Hat Developer Group Documentation Team

Abstract

Information about new and noteworthy features as well as known issues in Red Hat CodeReady Workspaces 2.9.

Making open source more inclusive

Red Hat is committed to replacing problematic language in our code, documentation, and web properties. We are beginning with these four terms: master, slave, blacklist, and whitelist. Because of the enormity of this endeavor, these changes will be implemented gradually over several upcoming releases. For more details, see our CTO Chris Wright’s message.

Chapter 1. About Red Hat CodeReady Workspaces

Red Hat CodeReady Workspaces is a web-based integrated development environment (IDE). CodeReady Workspaces runs in OpenShift and is well-suited for container-based development.

CodeReady Workspaces provides:

  • an enterprise-level cloud developer workspace server,
  • a browser-based IDE,
  • ready-to-use developer stacks for popular programming languages, frameworks, and Red Hat technologies.

Red Hat CodeReady Workspaces 2.9 is based on Eclipse Che 7.30.

1.1. Supported deployment environments

This section describes the availability and the supported installation methods of CodeReady Workspaces 2.9 on OpenShift Container Platform 4.6, 3.11, and OpenShift Dedicated.

Expand
Table 1.1. Supported deployment environments for CodeReady Workspaces 2.9 on OpenShift Container Platform and OpenShift Dedicated

Platform

Architecture

Deployment method

OpenShift Container Platform 3.11

AMD64 and Intel 64 (x86_64)

crwctl

OpenShift Container Platform 4.6

AMD64 and Intel 64 (x86_64)

OperatorHub, crwctl

OpenShift Container Platform 4.6

IBM Z (s390x)

OperatorHub, crwctl

OpenShift Container Platform 4.6

IBM Power Systems (ppc64le)

OperatorHub, crwctl

OpenShift Container Platform 4.7

AMD64 and Intel 64 (x86_64)

OperatorHub, crwctl

OpenShift Container Platform 4.7

IBM Z (s390x)

OperatorHub, crwctl

OpenShift Container Platform 4.7

IBM Power Systems (ppc64le)

OperatorHub, crwctl

OpenShift Dedicated 4.7

AMD64 and Intel 64 (x86_64)

Add-On

Note

Support for deploying CodeReady Workspaces on OpenShift Container Platform on IBM Z (s390x) is currently only available as a Technology Preview feature. Technology Preview features are not supported with Red Hat production service level agreements (SLAs) and might not be functionally complete. Red Hat does not recommend using them in production. These features provide early access to upcoming product features, enabling customers to test functionality and provide feedback during the development process. For details about the level of support for Technology Preview features, see Technology Preview Features Support Scope.

1.2. Support policy

For Red Hat CodeReady Workspaces 2.9, Red Hat will provide support for deployment, configuration, and use of the product.

CodeReady Workspaces 2.9 has been tested on Chrome version 90.0.4430.72 (Official Build) (64-bit).

The main differences between CodeReady Workspaces and Eclipse Che are:

  • CodeReady Workspaces is built on RHEL8 to ensure the latest security fixes are included, compared to Alpine distributions that take a longer time to update.
  • CodeReady Workspaces uses Red Hat Single Sign-On (RH-SSO) rather than the upstream project Keycloak.
  • CodeReady Workspaces provides a smaller supported subset of plug-ins compared to Che. CodeReady Workspaces provides devfiles for working with other Red Hat technologies such as EAP and Fuse.
  • CodeReady Workspaces is supported on OpenShift Container Platform and OpenShift Dedicated; Eclipse Che can run on other Kubernetes clusters.

Red Hat provides licensing, packaging, and support. Therefore CodeReady Workspaces is considered a more stable product than the upstream Eclipse Che project.

Chapter 2. Notable enhancements

An OpenShift CRD and Controller is handling workspace containers, rather than CodeReady Workspaces server. This transfer of responsibility enables a better orchestration. To manage the workspaces, OpenShift native tools and APIs are available, rather than a CodeReady Workspaces-server REST API using services of a custom CRD.

It enables:

  • A delegation to the OpenShift authentication using RBAC and persistence using ETCD key-value store.
  • Easy provisioning of CodeReady Workspaces workspaces using OpenShift APIs
  • More advanced workspace control, such as the configuration of a workspace based on users' geographic location or automatically disabling plug-ins deteriorating workspaces performances.

Additional resources

2.2. Improved start-up time using the Image Puller

The Image Puller can pre-download any CodeReady Workspaces image on all the nodes of an OpenShift cluster. The operator-metadata image doesn’t need pre-pulling and is not supported.

Additional resources

2.3. Tech-preview support of Devfile 2.0 specification

The Devfile allows for the definition of development environments in a repeatable and shareable manner. The specification continues to evolve as more tools, such as odo, adopt Devfiles and expand their usage. We are progressively introducing support in CodeReady Workspaces for the Devfile v2.x to allow for the following:

  • increased interoperability between tools
  • a simpler experience defining workspaces
  • new implementation possibilities with the DevWorkspace engine With Devfile v2.x, IDE plug-ins are no longer a core component and are instead included and managed by references to external files.
  • In CodeReady Workspaces 2.9, Che-Theia plug-ins can not be included in the devfile version 2.0-based workspace. This capability will be added in a subsequent release which includes support for the Devfile v2.1 specification.
  • Workspaces based on devfile version 1 remain fully supported.
  • The support for Devfile 2.0 is disabled by default. To enable this support, set spec.devWorkspace.enable: true in the CheCluster Custom Resource.
  • CodeReady Workspaces 2.9 requires new containers for enabling the devfile 2.0 support:

Additional resources

2.4. Upgrade VS Code YAML plug-in to 0.14.0

The VS Code YAML plug-in has been updated to version 0.14.0.

Additional resources

2.5. Deprecate the VS Code Asciidoctor plug-in

The VS Code Asciidoctor plug-in has been deprecated and will be removed in the future release.

Additional resources

Memory limits are handled at the plug-in and devfile levels. The globalMemory limits have been removed from the meta.yaml files inside the devfile registry.

Additional resources

The che-machine-exec and remote-runtime-injector plug-ins have defined resource limits.

Additional resources

2.8. Upgrade VS Code Language support for Camel K to 0.0.24

The VS Code Language support for Camel K has been updated to version 0.0.24.

Additional resources

Users can pull images from private registries.

Additional resources

2.10. Multi-root mode by default

Some VS Code extensions must run in Multi-root mode. CodeReady Workspaces sets the Multi-root mode for all new workspaces.

To turn on the Multi-root mode in workspaces created in an earlier version, set the multiRoot parameter in the devfile:

attributes:
  multiRoot: 'on'
Copy to Clipboard Toggle word wrap

Additional resources

All namespace strategies except the per-user strategy are deprecated and will be unsupported with a future release.

This change:

  • Improves security.
  • Gives administrators better control over resources that are assigned to users by using namespace quotas.
  • Eliminates of the need to duplicate sensitive information using Kubernetes secrets, as with the per-workspace strategy.

Additional resources

2.12. Accessing GitLab private repositories from a factory URL

To access and authenticate a private GitLab repository using a factory URL pointer:

  1. Store a personal access token as a secret in the CodeReady Workspaces user namespace.
  2. Use a factory URL pointer to access and authenticate the private GitLab repository.

Additional resources

CodeReady Workspaces optionally collects Red Hat telemetry data from extensions that support it.

Additional resources

Upon starting a workspace whose devfile uses Git with SSH to clone a sample project, CodeReady Workspaces prompts you to provide an SSH key.

Additional resources

2.15. GitLab public repository support in a factory URL

CodeReady Workspaces supports workspace creation using a GitLab-based factory URL.

Additional resources

2.16. Support for Mermaid diagrams and flowcharts

The Bierner Markdown plug-in enables users to render Mermaid diagrams and flowchart graphs directly using Che-Theia Markdown preview.

Additional resources

2.17. The dashboard is running in a dedicated container

The dashboard is running in a dedicated container rather than in the CodeReady Workspaces server container.

Additional resources

2.18. The VS Code extensions update

  • cobol-language-support to v0.19.0
  • hlasm-language-support to v0.13.0
  • COBOL Control Flow to v0.4.0.

Additional resources

Chapter 3. Bug fixes

3.1. Fixes for Sonarlint plug-in

The Sonarlint plug-in is fully functional and works as expected.

Additional resources

3.2. Node.js workspaces starting properly

CodeReady Workspaces 2.8 Node.js workspaces no longer fails to start after migration to the latest version.

Additional resources

3.3. Fixes for Java plug-ins

All Java plug-ins (Java11, Java8, and Java) initialize as expected.

Additional resources

3.4. SSH key pairs support

CodeReady Workspaces supports the ability to upload SSH keys that are password protected. When a workspace starts, the existing encrypted SSH keys are registered by the SSH agent.

Additional resources

The command Generate a new JWT authentication secret key of the PHP Laravel with MySQL getting started sample has been fixed. CodeReady Workspaces generates the JWT authentication secret key properly.

Additional resources

CodeReady Workspaces no longer fails to update when using external keycloak authentication.

Additional resources

Chapter 4. Known issues

Delve, a debugger for the Go programming language, is not available for IBM Z and IBM Power Systems architecture. Therefore, debugging features cannot be activated in the Go workspace in CodeReady Workspaces 2.9. An attempt to activate this feature results in the Failed to continue error message.

Workaround

  • Delve debugger is not available for IBM Z and IBM Power Systems architectures, therefore cannot be used.

Additional resources

In a workspace created using the default Go devfile, some features fail because additional tools are missing. For instance, Auto-complete is unavailable.

Procedure

  1. Run the CodeReady Workspaces instance in a non-restricted environment.
  2. Install the required module using the Install button of the pop-up window in the IDE.

Additional resources

The failure caused by a lack of OpenShift Container Platform cluster resources is accompanied by a misleading error message:

Your session has expired. Please, log in to CodeReady Workspaces again to get access to your OpenShift account.
Copy to Clipboard Toggle word wrap

This message will be fixed in the upcoming release.

Workaround

  • Provide more resources to the OpenShift Container Platform cluster.

Additional resources

If you start a task from My workspace multiple times, the task doesn’t end properly. The IDE displays a spinning-wheel icon as a replacement for the "✓" marker. As a consequence, the subsequent task execution can’t be started.

Workaround

  • Execute a task in the My workspace environment once.

Additional resources

4.5. Get-Started devfiles have incorrect source location

Get-Started devfiles have incorrect source location after the switch from multi-host to single-host exposure strategy.

Additional resources

When building the devfile registry, the build process updates the devfiles to set the source location of the artifact archives. When specifying multiple registries, the build process doesn’t update the archive source location in the devfiles properly.

Example 4.1. Deployment using multiple registries

The Developer Sandbox enables the community registry and the CodeReady Workspaces registry.

Workaround

  • Build the registries specifying one unique registry.

Additional resources

The crwctl binaries don’t run on IBM Z and IBM Power Systems. These platforms are available uniquely as targets to deploy CodeReady Workspaces to.

Workaround

  • Run crwctl from a supported platform.

Additional resources

4.8. Unsupported devfiles on IBM Z and IBM Power Systems

These devfiles are not supported on IBM Z and IBM Power Systems:

  • EAP for OpenJDK 8
  • .Net
  • Fuse

Workaround

  • Don’t use unsupported languages on IBM Z and IBM Power Systems.

Additional resources

Support for deploying CodeReady Workspaces on OpenShift Container Platform on IBM Power Systems and IBM Z is available as a Technology Preview feature. Technology Preview features are not supported with Red Hat production service level agreements (SLAs) and might not be functionally complete. Red Hat does not suggest using them in production. These features provide early access to upcoming product features, enabling customers to test functionality and provide feedback during the development process.

Additional resources

The activation of the VS Code Tooling for Apache Camel K by Red Hat plug-in fails with the message:

 Activating extension `Tooling for Apache Camel K by Red Hat` failed: Dependent extension `redhat.vscode-commons` is not installed.
Copy to Clipboard Toggle word wrap

Additional resources

Chapter 5. Frequently asked questions

Is it possible to deploy applications to an OpenShift cluster from CodeReady Workspaces?
Yes. The user must log in to the OpenShift cluster from their running workspace using oc login.
For best performance, what is the recommended storage to use for Persistent Volumes used with CodeReady Workspaces?
Use block storage.
Is it possible to deploy more than one CodeReady Workspaces instance on the same cluster?
It is not recommended. This feature is subject to removal in a future release.
Is it possible to install CodeReady Workspaces offline (that is, disconnected from the internet)?
Yes. See Installing CodeReady Workspaces in restricted environments.
Is it possible to use non-default certificates with CodeReady Workspaces?
Yes, you can use self-signed or public certificates. See Installing CodeReady Workspaces on OpenShift Container Platform 3.11.
Is it possible to run multiple workspaces simultaneously?
Yes. See Configuring the number of workspaces a user can run.
What specific changes have been implemented for IBM Power Systems?

The memory limit for some plug-ins has been increased, to give Pods sufficient RAM to run.

Expand
Table 5.1. Example memory limits differences between IBM Power System and other architectures
Plug-inIBM Power SystemOther architectures

Che-Theia editor

2G

512M

OpenShift connector

2.5G

1.5G

Legal Notice

Copyright © 2021 Red Hat, Inc.
The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/. In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version.
Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law.
Red Hat, Red Hat Enterprise Linux, the Shadowman logo, the Red Hat logo, JBoss, OpenShift, Fedora, the Infinity logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries.
Linux® is the registered trademark of Linus Torvalds in the United States and other countries.
Java® is a registered trademark of Oracle and/or its affiliates.
XFS® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries.
MySQL® is a registered trademark of MySQL AB in the United States, the European Union and other countries.
Node.js® is an official trademark of Joyent. Red Hat is not formally related to or endorsed by the official Joyent Node.js open source or commercial project.
The OpenStack® Word Mark and OpenStack logo are either registered trademarks/service marks or trademarks/service marks of the OpenStack Foundation, in the United States and other countries and are used with the OpenStack Foundation's permission. We are not affiliated with, endorsed or sponsored by the OpenStack Foundation, or the OpenStack community.
All other trademarks are the property of their respective owners.
Red Hat logoGithubredditYoutubeTwitter

Apprendre

Essayez, achetez et vendez

Communautés

À propos de la documentation Red Hat

Nous aidons les utilisateurs de Red Hat à innover et à atteindre leurs objectifs grâce à nos produits et services avec un contenu auquel ils peuvent faire confiance. Découvrez nos récentes mises à jour.

Rendre l’open source plus inclusif

Red Hat s'engage à remplacer le langage problématique dans notre code, notre documentation et nos propriétés Web. Pour plus de détails, consultez le Blog Red Hat.

À propos de Red Hat

Nous proposons des solutions renforcées qui facilitent le travail des entreprises sur plusieurs plates-formes et environnements, du centre de données central à la périphérie du réseau.

Theme

© 2026 Red Hat
Retour au début