Uploaded image for project: 'Red Hat OpenShift Dev Spaces (formerly CodeReady Workspaces) '
  1. Red Hat OpenShift Dev Spaces (formerly CodeReady Workspaces)
  2. CRW-1273

crwctl/2.4.0-GA-redhat.1bc7df3 linux-x64 node-v10.19.0 installs CRW 2.3 on OCP 3.11 with operator installer

    XMLWordPrintable

Details

    • False
    • False
    • Undefined
    • Workaround Exists
    • Hide

      crwctl server:start --che-operator-cr-patch-yaml=cr-patch.yaml

      where cr-patch.yaml contents:

      spec:
        server:
          cheImage: 'registry.redhat.io/codeready-workspaces/server-rhel8'
          cheImageTag: '2.4'
          devfileRegistryImage: 'registry.redhat.io/codeready-workspaces/devfileregistry-rhel8:2.4'
          pluginRegistryImage: 'registry.redhat.io/codeready-workspaces/pluginregistry-rhel8:2.4'
          customCheProperties:
            CHE_WORKSPACE_PLUGIN__BROKER_METADATA_IMAGE: 'registry.redhat.io/codeready-workspaces/pluginbroker-metadata-rhel8:2.4'
            CHE_WORKSPACE_PLUGIN__BROKER_ARTIFACTS_IMAGE: 'registry.redhat.io/codeready-workspaces/pluginbroker-artifacts-rhel8:2.4'
            CHE_SERVER_SECURE__EXPOSER_JWTPROXY_IMAGE: 'registry.redhat.io/codeready-workspaces/jwtproxy-rhel8:2.4'
        auth:
          openShiftoAuth: true
      

       

      Show
      crwctl server:start --che-operator-cr-patch-yaml=cr-patch.yaml where cr-patch.yaml contents: spec: server: cheImage: 'registry.redhat.io/codeready-workspaces/server-rhel8' cheImageTag: '2.4' devfileRegistryImage: 'registry.redhat.io/codeready-workspaces/devfileregistry-rhel8:2.4' pluginRegistryImage: 'registry.redhat.io/codeready-workspaces/pluginregistry-rhel8:2.4' customCheProperties: CHE_WORKSPACE_PLUGIN__BROKER_METADATA_IMAGE: 'registry.redhat.io/codeready-workspaces/pluginbroker-metadata-rhel8:2.4' CHE_WORKSPACE_PLUGIN__BROKER_ARTIFACTS_IMAGE: 'registry.redhat.io/codeready-workspaces/pluginbroker-artifacts-rhel8:2.4' CHE_SERVER_SECURE__EXPOSER_JWTPROXY_IMAGE: 'registry.redhat.io/codeready-workspaces/jwtproxy-rhel8:2.4' auth: openShiftoAuth: true  

    Description

      crwctl/2.4.0-GA-redhat.1bc7df3 linux-x64 node-v10.19.0 installs CRW 2.3 by default on OCP 3.11 when use operator installer by default:

      [ndp@localhost crwctl]$ ./bin/crwctl server:start --chenamespace=ndp-test-24
      › Current Kubernetes context: 'crw-crwctl-tls-oauth/console-ocp311-crw:8443/admin'
       Installer type is set to: 'operator'
        ✔ Verify Kubernetes API...OK (it's OpenShift)
        ✔   Looking for an already existing CodeReady Workspaces instance
          ✔ Verify if CodeReady Workspaces is deployed into namespace "ndp-test-24"...it is not
        ✔   Openshift preflight checklist
          ✔ Verify if oc is installed...done.
          ✔ Verify if openshift is running...done.
          ✔ Check OpenShift version: Unknown
          ✔ Check Kubernetes version: Unknown.
        ✔ Verify Openshift oauth....done.
      CodeReady Workspaces logs will be available in '/tmp/crwctl-logs/1601977375843'
        ✔ Start following logs
          ✔ Start following Operator logs...done
          ✔ Start following CodeReady Workspaces logs...done
          ✔ Start following Postgres logs...done
          ✔ Start following Keycloak logs...done
          ✔ Start following Plugin registry logs...done
          ✔ Start following Devfile registry logs...done
        ✔ Start following events
          ✔ Start following namespace events...done
       ›   Warning: Consider using the more reliable 'OLM' installer when deploying a stable release of CodeReady Workspaces (--installer=olm).
        ✔   Running the CodeReady Workspaces operator
          ✔ Copying operator resources...done.
          ✔ Create Namespace (ndp-test-24)...done.
          ✔ Create ServiceAccount codeready-operator in namespace ndp-test-24...done.
          ✔ Create Role codeready-operator in namespace ndp-test-24...done.
          ✔ Create ClusterRole ndp-test-24-codeready-operator...done.
          ✔ Create RoleBinding codeready-operator in namespace ndp-test-24...done.
          ✔ Create ClusterRoleBinding ndp-test-24-codeready-operator...done.
          ✔ Create CRD checlusters.org.eclipse.che...It already exists.
          ✔ Waiting 5 seconds for the new Kubernetes resources to get flushed...done.
          ✔ Create deployment codeready-operator in namespace ndp-test-24...done.
          ✔ Create the Custom Resource of type checlusters.org.eclipse.che in the namespace ndp-test-24...done.
        ✔   Post installation checklist
          ✔ PostgreSQL pod bootstrap
            ✔ scheduling...done.
            ✔ downloading images...done.
            ✔ starting...done.
          ✔ Keycloak pod bootstrap
            ✔ scheduling...done.
            ✔ downloading images...done.
            ✔ starting...done.
          ✔ Devfile registry pod bootstrap
            ✔ scheduling...done.
            ✔ downloading images...done.
            ✔ starting...done.
          ✔ Plugin registry pod bootstrap
            ✔ scheduling...done.
            ✔ downloading images...done.
            ✔ starting...done.
          ✔ CodeReady Workspaces pod bootstrap
            ✔ scheduling...done.
            ✔ downloading images...done.
            ✔ starting...done.
          ✔ Retrieving CodeReady Workspaces server URL... https://codeready-ndp-test-24.apps.ocp311.crw
          ✔ CodeReady Workspaces status check
        ✔ Retrieving Keycloak admin credentials... admin:admin
        ✔ Retrieving Che self-signed CA certificate... is exported to /home/ndp/cheCA.crt
        ✔ Show important messages
          ✔ CodeReady Workspaces admin credentials are: "admin:admin". You will be asked to change default Che admin password on the first login.
          ✔ Autogenerated Keycloak credentials are: "admin:admin".
          ✔ ❗[MANUAL ACTION REQUIRED] Please add Che self-signed CA certificate into your browser: /home/ndp/cheCA.crt.
         Documentation how to add a CA certificate into a browser: https://www.eclipse.org/che/docs/che-7/installing-che-in-tls-mode-with-self-signed-certificates/#using-che-with-tls_installing-che-in-tls-mode-with-self-signed-certificates
      Command server:start has completed successfully.
      
      codeready-operator environment variables
      apiVersion: apps/v1
      kind: Deployment
      metadata:
        annotations:
          deployment.kubernetes.io/revision: '1'
        creationTimestamp: '2020-10-06T09:42:48Z'
        generation: 1
        name: codeready-operator
        namespace: ndp-test-24
        resourceVersion: '2871644'
        selfLink: /apis/apps/v1/namespaces/ndp-test-24/deployments/codeready-operator
        uid: 4b98b68d-07b8-11eb-8a17-fa163eaaa706
      spec:
        progressDeadlineSeconds: 600
        replicas: 1
        revisionHistoryLimit: 10
        selector:
          matchLabels:
            app: codeready-operator
        strategy:
          rollingUpdate:
            maxSurge: 25%
            maxUnavailable: 25%
          type: RollingUpdate
        template:
          metadata:
            creationTimestamp: null
            labels:
              app: codeready-operator
          spec:
            containers:
              - command:
                  - /usr/local/bin/che-operator
                env:
                  - name: WATCH_NAMESPACE
                    valueFrom:
                      fieldRef:
                        apiVersion: v1
                        fieldPath: metadata.namespace
                  - name: POD_NAME
                    valueFrom:
                      fieldRef:
                        apiVersion: v1
                        fieldPath: metadata.name
                  - name: OPERATOR_NAME
                    value: codeready-operator
                  - name: CHE_VERSION
                    value: 2.3.0
                  - name: RELATED_IMAGE_che_server
                    value: 'registry.redhat.io/codeready-workspaces/server-rhel8:2.3'
                  - name: RELATED_IMAGE_plugin_registry
                    value: 'registry.redhat.io/codeready-workspaces/pluginregistry-rhel8:2.3'
                  - name: RELATED_IMAGE_devfile_registry
                    value: >-
                      registry.redhat.io/codeready-workspaces/devfileregistry-rhel8:2.3
                  - name: RELATED_IMAGE_pvc_jobs
                    value: 'registry.access.redhat.com/ubi8-minimal:8.2'
                  - name: RELATED_IMAGE_postgres
                    value: 'registry.redhat.io/rhel8/postgresql-96:1'
                  - name: RELATED_IMAGE_keycloak
                    value: 'registry.redhat.io/rh-sso-7/sso74-openshift-rhel8:7.4'
                  - name: RELATED_IMAGE_che_workspace_plugin_broker_metadata
                    value: >-
                      registry.redhat.io/codeready-workspaces/pluginbroker-metadata-rhel8:2.3
                  - name: RELATED_IMAGE_che_workspace_plugin_broker_artifacts
                    value: >-
                      registry.redhat.io/codeready-workspaces/pluginbroker-artifacts-rhel8:2.3
                  - name: RELATED_IMAGE_che_server_secure_exposer_jwt_proxy_image
                    value: 'registry.redhat.io/codeready-workspaces/jwtproxy-rhel8:2.3'
                  - name: CHE_FLAVOR
                    value: codeready
                  - name: CONSOLE_LINK_NAME
                    value: che
                  - name: CONSOLE_LINK_DISPLAY_NAME
                    value: CodeReady Workspaces
                  - name: CONSOLE_LINK_SECTION
                    value: Red Hat Applications
                  - name: CONSOLE_LINK_IMAGE
                    value: /dashboard/assets/branding/loader.svg
                  - name: CHE_IDENTITY_SECRET
                    value: che-identity-secret
                  - name: CHE_IDENTITY_POSTGRES_SECRET
                    value: che-identity-postgres-secret
                  - name: CHE_POSTGRES_SECRET
                    value: che-postgres-secret
                  - name: CHE_SERVER_TRUST_STORE_CONFIGMAP_NAME
                    value: ca-certs
                image: 'registry.redhat.io/codeready-workspaces/crw-2-rhel8-operator:2.4-5'
                imagePullPolicy: Always
                name: codeready-operator
                ports:
                  - containerPort: 60000
                    name: metrics
                    protocol: TCP
                resources: {}
                terminationMessagePath: /dev/termination-log
                terminationMessagePolicy: File
            dnsPolicy: ClusterFirst
            restartPolicy: Always
            schedulerName: default-scheduler
            securityContext: {}
            serviceAccount: codeready-operator
            serviceAccountName: codeready-operator
            terminationGracePeriodSeconds: 5
      status:
        availableReplicas: 1
        conditions:
          - lastTransitionTime: '2020-10-06T09:42:59Z'
            lastUpdateTime: '2020-10-06T09:42:59Z'
            message: Deployment has minimum availability.
            reason: MinimumReplicasAvailable
            status: 'True'
            type: Available
          - lastTransitionTime: '2020-10-06T09:42:48Z'
            lastUpdateTime: '2020-10-06T09:42:59Z'
            message: ReplicaSet "codeready-operator-68bd6cb957" has successfully progressed.
            reason: NewReplicaSetAvailable
            status: 'True'
            type: Progressing
        observedGeneration: 1
        readyReplicas: 1
        replicas: 1
        updatedReplicas: 1
      

      Attachments

        Issue Links

          Activity

            People

              abazko Anatolii Bazko
              dnochevn Dmytro Nochevnov
              Votes:
              0 Vote for this issue
              Watchers:
              3 Start watching this issue

              Dates

                Created:
                Updated:
                Resolved: