Open cite opened 1 year ago
I have the exact same issue on 2.6.0, also running on the same cluster as the pods i'm trying to open a shell on. Same messages about hijacked connections.
argocd: v2.6.0+acc554f.dirty
BuildDate: 2023-02-07T01:29:54Z
GitCommit: acc554f3d99010e0353b498a595844b30090556f
GitTreeState: dirty
GoVersion: go1.19.5
Compiler: gc
Platform: darwin/arm64
argocd-server: v2.6.0+acc554f
BuildDate: 2023-02-06T21:17:26Z
GitCommit: acc554f3d99010e0353b498a595844b30090556f
GitTreeState: clean
GoVersion: go1.18.10
Compiler: gc
Platform: linux/amd64
After some testing it seems to occur only on alpine-based images. I tried setting exec.shells
to something like ash,sh,bash
to make sure ash was first but no dice.
We experience the same issue running version 2.5.10.
The issue is still present in 2.6.2.
This feature would be something very nice to have, so I'm waiting to see it alive :-)
Having the same issue when upgrading from version 2.4.13 to 2.5.15. It was working fine with 2.4.13
Having the same issue when upgrading from version 2.4.13 to 2.5.15. It was working fine with 2.4.13
And also not working with version 2.6.6
Encountering the same running v2.6.7+5bcd846. I suspect this is due to the ClusterRole argocd-server
is missing the create
permission on pod/exec
. See also these docs.
I'm applying this patch locally:
[
{
"op": "add",
"path": "/rules/-",
"value": {
"apiGroups": [
""
],
"resources": [
"pods/exec"
],
"verbs": [
"create"
]
}
}
]
(using https://raw.githubusercontent.com/argoproj/argo-cd/stable/manifests/ha/install.yaml with Kustomize)
Thanks @evenh! That was the missing piece.
We did configure the permissions as mentioned in the docs but the issue remains.
Same here, doesn't work. v2.6.7
I have same issue but my installation has delivered argocd through OpenShift Operator.
In logs I have:
2023/07/02 11:07:31 http: response.WriteHeader on hijacked connection from github.com/argoproj/argo-cd/v2/server/application.(*terminalHandler).ServeHTTP (terminal.go:245)
2023/07/02 11:07:31 http: response.Write on hijacked connection from fmt.Fprintln (print.go:285)
Encountering the same running v2.6.7+5bcd846. I suspect this is due to the ClusterRole
argocd-server
is missing thecreate
permission onpod/exec
. See also these docs.I'm applying this patch locally:
[ { "op": "add", "path": "/rules/-", "value": { "apiGroups": [ "" ], "resources": [ "pods/exec" ], "verbs": [ "create" ] } } ]
(using https://raw.githubusercontent.com/argoproj/argo-cd/stable/manifests/ha/install.yaml with Kustomize)
It seems not in our case, we already have this permission :
- apiGroups:
- ""
resources:
- pods/exec
verbs:
- create
Checklist:
argocd version
.Describe the bug
When trying to open a WebShell for Pods running on the same Kubernetes cluster that ArgoCD is running on, the shell never opens, instead we get a blank window with a blinking cursor. At the same time, the following messages are logged:
For other clusters that ArgoCD has access too, this is working as intended (the log also doesn't say anything about hijacking there).
Version