-
Bug
-
Resolution: Done-Errata
-
Critical
-
4.15
This is a clone of issue OCPBUGS-32110. The following is the description of the original issue:
—
Description of problem:
When using OpenShift 4.15 on ROSA Hosted Control Planes, after disabling the ImageRegistry, the default secrets and service accounts are still being created. This functionality should not be occurring once the registry is removed: https://docs.openshift.com/rosa/nodes/pods/nodes-pods-secrets.html#auto-generated-sa-token-secrets_nodes-pods-secrets
Version-Release number of selected component (if applicable):
4.15
How reproducible:
Always
Steps to Reproduce:
1. Deploy ROSA 4.15 HCP Cluster 2. Set spec.managementState = "Removed" on the cluster.config.imageregistry.operator.openshift.io. The image registry will be removed 3. Create a new OpenShift Project 4. Observe the builder, default and deployer ServiceAccounts and their associated Secrets are still created
Actual results:
Expected results:
Additional info:
- clones
-
OCPBUGS-32110 ROSA HCP openshift-controller-manager controllers for image registry are not disabled when managementState is Removed
- Closed
- is blocked by
-
OCPBUGS-32110 ROSA HCP openshift-controller-manager controllers for image registry are not disabled when managementState is Removed
- Closed
- links to
-
RHBA-2024:2773 OpenShift Container Platform 4.15.z bug fix update