Uploaded image for project: 'Red Hat OpenShift Dev Spaces (formerly CodeReady Workspaces) '
  1. Red Hat OpenShift Dev Spaces (formerly CodeReady Workspaces)
  2. CRW-992

/v3/plugins/eclipse/che-machine-exec-plugin/7.14.3/meta.yaml was not found error

XMLWordPrintable

    • Hide

      1. Log into OCP 3.11/4.4 instance
      2. Download crwctl/2.2.0-CI-quay.0cdc6ae linux-x64 node-v10.19.0 https://codeready-workspaces-jenkins.rhev-ci-vms.eng.rdu2.redhat.com/job/crwctl_master/25139/artifact/codeready-workspaces-chectl/dist/channels/latest/crwctl-linux-x64.tar.gz
      3. Install CRW by command:

      crwctl server:start --os-oauth --che-operator-image=quay.io/crw/crw-2-rhel8-operator:latest --listr-renderer=verbose -n mmusiien-crw-using-crwctl-oauth
      

      4. Go to CRW and try to open workspace.

      Show
      1. Log into OCP 3.11/4.4 instance 2. Download crwctl/2.2.0-CI-quay.0cdc6ae linux-x64 node-v10.19.0 https://codeready-workspaces-jenkins.rhev-ci-vms.eng.rdu2.redhat.com/job/crwctl_master/25139/artifact/codeready-workspaces-chectl/dist/channels/latest/crwctl-linux-x64.tar.gz 3. Install CRW by command: crwctl server:start --os-oauth --che- operator -image=quay.io/crw/crw-2-rhel8- operator :latest --listr-renderer=verbose -n mmusiien-crw-using-crwctl-oauth 4. Go to CRW and try to open workspace.

      There was start workspace error when install CRW from OperatorHub, or by using crwctl:

      pulling image "quay.io/crw/pluginbroker-metadata-rhel8:latest"
      Successfully pulled image "quay.io/crw/pluginbroker-metadata-rhel8:latest"
      Created container
      Started container
      Starting plugin metadata broker
      Failed to download plugin meta: failed to fetch plugin meta.yaml from URL 'https://plugin-registry-mmusiien-crw-using-crwctl-oauth.apps.ocp311.crw/v3/plugins/eclipse/che-machine-exec-plugin/7.14.3/meta.yaml': Downloading https://plugin-registry-mmusiien-crw-using-crwctl-oauth.apps.ocp311.crw/v3/plugins/eclipse/che-machine-exec-plugin/7.14.3/meta.yaml failed. Status code 404. Response body: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
      <html><head>
      <title>404 Not Found</title>
      </head><body>
      <h1>Not Found</h1>
      <p>The requested URL /v3/plugins/eclipse/che-machine-exec-plugin/7.14.3/meta.yaml was not found on this server.</p>
      </body></html>
      
      Error: Failed to run the workspace: "Plugins installation process failed. Error: Plugin brokering process for workspace workspacef2ydxwg8hici88zq failed with error: Failed to download plugin meta: failed to fetch plugin meta.yaml from URL 'https://plugin-registry-mmusiien-crw-using-crwctl-oauth.apps.ocp311.crw/v3/plugins/eclipse/che-machine-exec-plugin/7.14.3/meta.yaml': Downloading https://plugin-registry-mmusiien-crw-using-crwctl-oauth.apps.ocp311.crw/v3/plugins/eclipse/che-machine-exec-plugin/7.14.3/meta.yaml failed. Status code 404. Response body: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
      <html><head>
      <title>404 Not Found</title>
      </head><body>
      <h1>Not Found</h1>
      <p>The requested URL /v3/plugins/eclipse/che-machine-exec-plugin/7.14.3/meta.yaml was not found on this server.</p>
      </body></html>
      

      There was no 7.14.3 in plugin registry

      -------------------------
      Start of workspace from CRW 2.2.0.RC installed by the next command was successful:

      crwctl server:start --che-operator-cr-yaml=/mnt/hudson_workspace/workspace/install-crw-using-crwctl/custom-resource.yaml --che-operator-image=quay.io/crw/crw-2-rhel8-operator:latest --listr-renderer=verbose -n crw-crwctl-tls-oauth
      

      where custom-resource.yaml was the following:

      custom-resource.yaml
      #
      #  Copyright (c) 2012-2019 Red Hat, Inc.
      #    This program and the accompanying materials are made
      #    available under the terms of the Eclipse Public License 2.0
      #    which is available at https://www.eclipse.org/legal/epl-2.0/
      #
      #  SPDX-License-Identifier: EPL-2.0
      #
      #  Contributors:
      #    Red Hat, Inc. - initial API and implementation
      
      # CR is based on https://raw.githubusercontent.com/redhat-developer/codeready-workspaces-chectl/master/docs/custom-resource.yaml
      
      apiVersion: org.eclipse.che/v1
      kind: CheCluster
      metadata:
        name: codeready-workspaces
      spec:
        server:
          # server image used in Che deployment
          cheImage: 'quay.io/crw/server-rhel8'
          # image pull policy used in Che deployment
          cheImageTag: 'latest'
          # image:tag used in Devfile registry deployment
          devfileRegistryImage: 'quay.io/crw/devfileregistry-rhel8:latest'
          # image:tag used in plugin registry deployment
          pluginRegistryImage: 'quay.io/crw/pluginregistry-rhel8:latest'
          # defaults to `che`. When set to `codeready`, CodeReady Workspaces is deployed
          # the difference is in images, labels, exec commands
          cheFlavor: 'codeready'
          # specifies a custom cluster role to user for the Che workspaces
          # Uses the default roles if left blank.
          cheWorkspaceClusterRole: ''
          # when set to true the operator will attempt to get a secret in OpenShift router namespace
          # to add it to Java trust store of Che server. Requires cluster-admin privileges for operator service account
          selfSignedCert: true
          # Name of the config-map with public certificates to add to Java trust store of the Che server.
          serverTrustStoreConfigMapName: ''
          gitSelfSignedCert: false
          # TLS mode for Che. Make sure you either have public cert, or set selfSignedCert to true
          tlsSupport: true
          # protocol+hostname of a proxy server. Automatically added as JAVA_OPTS and https(s)_proxy
          # to Che server and workspaces containers
          proxyURL: ''
          # port of a proxy server
          proxyPort: ''
          # username for a proxy server
          proxyUser: ''
          # password for a proxy user
          proxyPassword: ''
          # a list of non-proxy hosts. Use | as delimiter, eg localhost|my.host.com|123.42.12.32
          nonProxyHosts: ''
          # sets mem request for server deployment. Defaults to 512Mi
          serverMemoryRequest: ''
          # sets mem limit for server deployment. Defaults to 1Gi
          serverMemoryLimit: ''
          # sets default namespace where new workspaces will be created
          workspaceNamespaceDefault: ''
          # defines if user is able to specify namespace different from the default
          allowUserDefinedWorkspaceNamespaces: false
          customCheProperties:
            CHE_LIMITS_USER_WORKSPACES_RUN_COUNT: '-1'
            CHE_WORKSPACE_AGENT_DEV_INACTIVE__STOP__TIMEOUT__MS: '900000'
            CHE_DOCKER_ALWAYS__PULL__IMAGE: 'true'
            CHE_WORKSPACE_PLUGIN__BROKER_METADATA_IMAGE: 'quay.io/crw/pluginbroker-metadata-rhel8:latest'
            CHE_WORKSPACE_PLUGIN__BROKER_ARTIFACTS_IMAGE: 'quay.io/crw/pluginbroker-artifacts-rhel8:latest'
            CHE_SERVER_SECURE__EXPOSER_JWTPROXY_IMAGE: 'quay.io/crw/jwtproxy-rhel8:latest'
            CHE_FACTORY_DEFAULT__EDITOR: 'eclipse/che-theia/latest'
            CHE_FACTORY_DEFAULT__PLUGINS: 'eclipse/che-machine-exec-plugin/latest'
            CHE_WORKSPACE_DEVFILE_DEFAULT__EDITOR: 'eclipse/che-theia/latest'
            CHE_WORKSPACE_DEVFILE_DEFAULT__EDITOR_PLUGINS: 'eclipse/che-machine-exec-plugin/latest'
      
        database:
          # when set to true, the operator skips deploying Postgres, and passes connection details of existing DB to Che server
          # otherwise a Postgres deployment is created
          externalDb: false
          # Postgres Database hostname that Che server uses to connect to. Defaults to postgres
          chePostgresHostName: ''
          # Postgres Database port that Che server uses to connect to. Defaults to 5432
          chePostgresPort: ''
          # Postgres user that Che server when making a db connection. Defaults to pgche
          chePostgresUser: ''
          # password of a postgres user. Auto-generated when left blank
          chePostgresPassword: ''
          # Postgres database name that Che server uses to connect to. Defaults to dbche
          chePostgresDb: ''
          # Postgres deployment in format image:tag. Defaults to registry.redhat.io/rhscl/postgresql-96-rhel7 (see pkg/deploy/defaults.go for latest tag)
          postgresImage: ''
      
        storage:
          # persistent volume claim strategy for Che server. Can be common (all workspaces PVCs in one volume),
          # per-workspace (one PVC per workspace for all declared volumes) and unique (one PVC per declared volume). Defaults to common
          pvcStrategy: 'per-workspace'
          # size of a persistent volume claim for workspaces. Defaults to 1Gi
          pvcClaimSize: '1Gi'
          # instruct Che server to launch a special pod to precreate a subpath in a PV
          preCreateSubPaths: true
          # image:tag for preCreateSubPaths jobs
          pvcJobsImage: ''
          # keep blank unless you need to use a non default storage class for Postgres PVC
          postgresPVCStorageClassName: ''
          # keep blank unless you need to use a non default storage class for workspace PVC(s)
          workspacePVCStorageClassName: ''
      
        auth:
          # instructs operator on whether or not to deploy Keycloak/RH SSO instance. When set to true provision connection details
          externalIdentityProvider: false
          # retrieved from respective route/ingress unless explicitly specified in CR (when ExternalKeycloak is true)
          identityProviderURL: ''
          # password for keycloak database user. Auto generated if left blank
          keycloakPostgresPassword: ''
          # desired admin username of Keycloak admin user (applicable only when externalIdentityProvider is false)
          identityProviderAdminUserName: 'admin'
          # desired password of Keycloak admin user (applicable only when externalIdentityProvider is false)
          identityProviderPassword: 'admin'
          # name of a keycloak realm. This realm will be created, when externalIdentityProvider is true, otherwise passed to Che server
          identityProviderRealm: ''
          # id of a keycloak client. This client will be created, when externalIdentityProvider is false, otherwise passed to Che server
          identityProviderClientId: ''
          # instructs an Operator to enable OpenShift v3 identity provider in Keycloak,
          # as well as create respective oAuthClient and configure Che configMap accordingly
          openShiftoAuth: true
          # name of oAuthClient used in OpenShift v3 identity provider in Keycloak realm. Auto generated if left blank
          oAuthClientName: ''
          # secret used in oAuthClient. Auto generated if left blank
          oAuthSecret: ''
          # image:tag used in Keycloak deployment
          identityProviderImage: ''
      
        metrics:
          # Enables '/metrics' endpoint of Che server.
          enable: false
      

              nickboldt Nick Boldt
              dnochevn Dmytro Nochevnov
              Votes:
              0 Vote for this issue
              Watchers:
              2 Start watching this issue

                Created:
                Updated:
                Resolved: