- Issued:
- 2021-08-11
- Updated:
- 2021-08-11
RHEA-2021:3139 - Product Enhancement Advisory
Synopsis
Web Terminal 1.3 release
Type/Severity
Product Enhancement Advisory
Topic
Web Terminal 1.3 has been released.
Description
Web Terminal provides a way to access a fully in-browser terminal emulator within the OpenShift Console. Command-line tools for interacting with the OpenShift cluster are pre-installed.
The Web Terminal 1.3 release provides the following fixes and new features:
- Web Terminal now depends on the newly released DevWorkspace Operator instead of relying on the embedded DevWorkspace controller inside of the Web Terminal Operator.
- Users can now mount their home directory to persist changes to their web terminals over multiple restarts.
- The following tools have been updated:
- oc 4.7.0 -> 4.8.2
- kubectl v1.20.1 -> v0.21.0-beta.1
- odo 2.0.4 -> 2.2.3
- knative 0.19.1 -> 0.21.0
- tekton 0.15.0 -> 0.17.2
- kubectx v0.9.3 -> v0.9.4
- kubens v0.9.3 -> v0.9.4
- rhoas 0.24.1 0.25.0
- submariner N/A -> 0.9.1
Solution
To start using Web Terminal, install the Web Terminal Operator from OpenShift OperatorHub on OpenShift Container Platform 4.5.3 or higher.
Affected Products
- Red Hat OpenShift Container Platform 4.7 for RHEL 8 x86_64
Fixes
- WTO-105 - Update tooling to ones which corresponds to OpenShift 4.8
- WTO-106 - Bundle Submariner's subctl CLI
- WTO-68 - [CPaaS QE Pipeline] Automate triggering of acceptance tests for productized WTO
- WTO-69 - Automate test cluster provisioning for productized WTO acceptance tests
- WTO-77 - DevWorkspace doesn't start once controller is reinstalled
- WTO-83 - Migrate to stable CRD and Webhooks API
CVEs
- CVE-2016-10228
- CVE-2017-14502
- CVE-2019-2708
- CVE-2019-3842
- CVE-2019-9169
- CVE-2019-13012
- CVE-2019-18276
- CVE-2019-25013
- CVE-2020-8231
- CVE-2020-8284
- CVE-2020-8285
- CVE-2020-8286
- CVE-2020-8927
- CVE-2020-9948
- CVE-2020-9951
- CVE-2020-9983
- CVE-2020-10543
- CVE-2020-10878
- CVE-2020-13434
- CVE-2020-13543
- CVE-2020-13584
- CVE-2020-13776
- CVE-2020-15358
- CVE-2020-24977
- CVE-2020-26116
- CVE-2020-27618
- CVE-2020-27619
- CVE-2020-28196
- CVE-2020-29361
- CVE-2020-29362
- CVE-2020-29363
- CVE-2021-1817
- CVE-2021-1820
- CVE-2021-1825
- CVE-2021-1826
- CVE-2021-3177
- CVE-2021-3326
- CVE-2021-3421
- CVE-2021-3516
- CVE-2021-3517
- CVE-2021-3518
- CVE-2021-3520
- CVE-2021-3537
- CVE-2021-3541
- CVE-2021-20271
- CVE-2021-23336
- CVE-2021-27219
- CVE-2021-30661
- CVE-2021-32690
- CVE-2021-33910
References
(none)
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.