-
Bug
-
Resolution: Unresolved
-
Minor
-
None
-
4.16
-
None
-
Quality / Stability / Reliability
-
False
-
-
None
-
None
-
None
-
None
-
None
-
None
-
None
-
None
-
None
-
None
-
None
-
None
-
None
-
None
Description of problem:
Examples using deprecated option:
```
rosa create operator-roles --hosted-cp --prefix=$OPERATOR_ROLES_PREFIX --oidc-config-id=$OIDC_ID --installer-role-arn arn:aws:iam::${AWS_ACCOUNT_ID}:role/${ACCOUNT_ROLES_PREFIX}-HCP-ROSA-Installer-Role
```
the option `--installer-role-arn` has been replaced by `--role-arn`
./rosa create operator-roles --help
Create cluster-specific operator IAM roles based on your cluster configuration.Usage:
rosa create operator-roles [flags]Aliases:
operator-roles, operatorrolesExamples:
# Create default operator roles for cluster named "mycluster"
rosa create operator-roles --cluster=mycluster # Create operator roles with a specific permissions boundary
rosa create operator-roles -c mycluster --permissions-boundary arn:aws:iam::123456789012:policy/perm-boundaryFlags:
-c, --cluster string Name or ID of the cluster.
-f, --force-policy-creation Forces creation of policies skipping compatibility check
-h, --help help for operator-roles
--hosted-cp Indicates whether to create the hosted control planes operator roles when using --prefix option.
-i, --interactive Enable interactive mode.
-m, --mode string How to perform the operation. Valid options are:
auto: Resource changes will be automatic applied using the current AWS account
manual: Commands necessary to modify AWS resources will be output to be run manually
--oidc-config-id string Registered OIDC configuration ID to add its issuer URL as the trusted relationship to the operator roles. Not to be used alongside --cluster flag.
--permissions-boundary string The ARN of the policy that is used to set the permissions boundary for the operator roles.
--prefix string User-defined prefix for generated AWS operator policies. Not to be used alongside --cluster flag.
--role-arn string Installer role ARN supplied to retrieve operator policy prefix and path. Not to be used alongside --cluster flag.
--shared-vpc-role-arn string AWS IAM role ARN with a policy attached, granting permissions necessary to create and manage Route 53 DNS records in private Route 53 hosted zone associated with intended shared VPC.
-y, --yes Automatically answer yes to confirm operation.Global Flags:
--color string Surround certain characters with escape sequences to display them in color on the terminal. Allowed options are [auto never always] (default "auto")
--debug Enable debug mode.
--profile string Use a specific AWS profile from your credential file.
--region string Use a specific AWS region, overriding the AWS_REGION environment variable. (DEPRECATED: Region flag will be removed from this command in future versions)
Version-Release number of selected component (if applicable):
How reproducible:
Steps to Reproduce:
1.
2.
3.
Actual results:
Expected results:
Additional info: