-
Bug
-
Resolution: Unresolved
-
Minor
-
None
-
4.16
-
None
-
Quality / Stability / Reliability
-
False
-
-
None
-
None
-
None
-
None
-
None
-
None
-
None
-
None
-
None
-
None
-
None
-
None
-
None
-
None
Description of problem:
Examples using deprecated option: ``` rosa create operator-roles --hosted-cp --prefix=$OPERATOR_ROLES_PREFIX --oidc-config-id=$OIDC_ID --installer-role-arn arn:aws:iam::${AWS_ACCOUNT_ID}:role/${ACCOUNT_ROLES_PREFIX}-HCP-ROSA-Installer-Role ``` the option `--installer-role-arn` has been replaced by `--role-arn` ./rosa create operator-roles --help Create cluster-specific operator IAM roles based on your cluster configuration.Usage: rosa create operator-roles [flags]Aliases: operator-roles, operatorrolesExamples: # Create default operator roles for cluster named "mycluster" rosa create operator-roles --cluster=mycluster # Create operator roles with a specific permissions boundary rosa create operator-roles -c mycluster --permissions-boundary arn:aws:iam::123456789012:policy/perm-boundaryFlags: -c, --cluster string Name or ID of the cluster. -f, --force-policy-creation Forces creation of policies skipping compatibility check -h, --help help for operator-roles --hosted-cp Indicates whether to create the hosted control planes operator roles when using --prefix option. -i, --interactive Enable interactive mode. -m, --mode string How to perform the operation. Valid options are: auto: Resource changes will be automatic applied using the current AWS account manual: Commands necessary to modify AWS resources will be output to be run manually --oidc-config-id string Registered OIDC configuration ID to add its issuer URL as the trusted relationship to the operator roles. Not to be used alongside --cluster flag. --permissions-boundary string The ARN of the policy that is used to set the permissions boundary for the operator roles. --prefix string User-defined prefix for generated AWS operator policies. Not to be used alongside --cluster flag. --role-arn string Installer role ARN supplied to retrieve operator policy prefix and path. Not to be used alongside --cluster flag. --shared-vpc-role-arn string AWS IAM role ARN with a policy attached, granting permissions necessary to create and manage Route 53 DNS records in private Route 53 hosted zone associated with intended shared VPC. -y, --yes Automatically answer yes to confirm operation.Global Flags: --color string Surround certain characters with escape sequences to display them in color on the terminal. Allowed options are [auto never always] (default "auto") --debug Enable debug mode. --profile string Use a specific AWS profile from your credential file. --region string Use a specific AWS region, overriding the AWS_REGION environment variable. (DEPRECATED: Region flag will be removed from this command in future versions)
Version-Release number of selected component (if applicable):
How reproducible:
Steps to Reproduce:
1. 2. 3.
Actual results:
Expected results:
Additional info: