-
Bug
-
Resolution: Done-Errata
-
Critical
-
4.15
Description of problem:
When using OpenShift 4.15 on ROSA Hosted Control Planes, after disabling the ImageRegistry, the default secrets and service accounts are still being created. This functionality should not be occurring once the registry is removed: https://docs.openshift.com/rosa/nodes/pods/nodes-pods-secrets.html#auto-generated-sa-token-secrets_nodes-pods-secrets
Version-Release number of selected component (if applicable):
4.15
How reproducible:
Always
Steps to Reproduce:
1. Deploy ROSA 4.15 HCP Cluster 2. Set spec.managementState = "Removed" on the cluster.config.imageregistry.operator.openshift.io. The image registry will be removed 3. Create a new OpenShift Project 4. Observe the builder, default and deployer ServiceAccounts and their associated Secrets are still created
Actual results:
Expected results:
Additional info:
- blocks
-
OCPBUGS-33224 ROSA HCP openshift-controller-manager controllers for image registry are not disabled when managementState is Removed
- Closed
- is cloned by
-
OCPBUGS-33224 ROSA HCP openshift-controller-manager controllers for image registry are not disabled when managementState is Removed
- Closed
- is related to
-
OCPBUGS-35063 pull secret of namespace default service accounts are not created automatically when image registry re-enabled after disabled in ROSA HCP
- New
- links to
-
RHEA-2024:0041 OpenShift Container Platform 4.16.z bug fix update