Skip to content

Commit cd5f208

Browse files
authored
Merge pull request kubernetes#126698 from enj/enj/i/del_kms_v2_gates
Remove KMSv2 and KMSv2KDF feature gates
2 parents 8b96d92 + 6398b8a commit cd5f208

File tree

7 files changed

+1
-50
lines changed

7 files changed

+1
-50
lines changed

pkg/features/kube_features.go

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1274,10 +1274,6 @@ var defaultKubernetesFeatureGates = map[featuregate.Feature]featuregate.FeatureS
12741274

12751275
genericfeatures.KMSv1: {Default: false, PreRelease: featuregate.Deprecated},
12761276

1277-
genericfeatures.KMSv2: {Default: true, PreRelease: featuregate.GA, LockToDefault: true}, // remove in 1.31
1278-
1279-
genericfeatures.KMSv2KDF: {Default: true, PreRelease: featuregate.GA, LockToDefault: true}, // remove in 1.31
1280-
12811277
genericfeatures.MutatingAdmissionPolicy: {Default: false, PreRelease: featuregate.Alpha},
12821278

12831279
genericfeatures.OpenAPIEnums: {Default: true, PreRelease: featuregate.Beta},

staging/src/k8s.io/apiserver/pkg/features/kube_features.go

Lines changed: 0 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -137,23 +137,6 @@ const (
137137
// Enables KMS v1 API for encryption at rest.
138138
KMSv1 featuregate.Feature = "KMSv1"
139139

140-
// owner: @aramase
141-
// kep: https://kep.k8s.io/3299
142-
// alpha: v1.25
143-
// beta: v1.27
144-
// stable: v1.29
145-
//
146-
// Enables KMS v2 API for encryption at rest.
147-
KMSv2 featuregate.Feature = "KMSv2"
148-
149-
// owner: @enj
150-
// kep: https://kep.k8s.io/3299
151-
// beta: v1.28
152-
// stable: v1.29
153-
//
154-
// Enables the use of derived encryption keys with KMS v2.
155-
KMSv2KDF featuregate.Feature = "KMSv2KDF"
156-
157140
// owner: @alexzielenski, @cici37, @jiahuif
158141
// kep: https://kep.k8s.io/3962
159142
// alpha: v1.30
@@ -380,10 +363,6 @@ var defaultKubernetesFeatureGates = map[featuregate.Feature]featuregate.FeatureS
380363

381364
KMSv1: {Default: false, PreRelease: featuregate.Deprecated},
382365

383-
KMSv2: {Default: true, PreRelease: featuregate.GA, LockToDefault: true}, // remove in 1.31
384-
385-
KMSv2KDF: {Default: true, PreRelease: featuregate.GA, LockToDefault: true}, // remove in 1.31
386-
387366
OpenAPIEnums: {Default: true, PreRelease: featuregate.Beta},
388367

389368
RemainingItemCount: {Default: true, PreRelease: featuregate.GA, LockToDefault: true}, // remove in 1.32

staging/src/k8s.io/apiserver/pkg/server/options/encryptionconfig/config.go

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -760,10 +760,6 @@ func kmsPrefixTransformer(ctx context.Context, config *apiserver.KMSConfiguratio
760760
}, nil
761761

762762
case kmsAPIVersionV2:
763-
if !utilfeature.DefaultFeatureGate.Enabled(features.KMSv2) {
764-
return storagevalue.PrefixTransformer{}, nil, nil, fmt.Errorf("could not configure KMSv2 plugin %q, KMSv2 feature is not enabled", kmsName)
765-
}
766-
767763
envelopeService, err := EnvelopeKMSv2ServiceFactory(ctx, config.Endpoint, config.Name, config.Timeout.Duration)
768764
if err != nil {
769765
return storagevalue.PrefixTransformer{}, nil, nil, fmt.Errorf("could not configure KMSv2-Plugin's probe %q, error: %w", kmsName, err)

staging/src/k8s.io/apiserver/pkg/server/options/encryptionconfig/config_test.go

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -391,15 +391,13 @@ func TestKMSvsEnablement(t *testing.T) {
391391
}
392392
tts := []struct {
393393
name string
394-
kmsv2Enabled bool
395394
expectedErr string
396395
expectedTimeout time.Duration
397396
config apiserver.EncryptionConfiguration
398397
wantV2Used bool
399398
}{
400399
{
401-
name: "with kmsv1 and kmsv2, KMSv2=true",
402-
kmsv2Enabled: true,
400+
name: "with kmsv1 and kmsv2, KMSv2=true",
403401
config: apiserver.EncryptionConfiguration{
404402
Resources: []apiserver.ResourceConfiguration{
405403
{
@@ -441,8 +439,6 @@ func TestKMSvsEnablement(t *testing.T) {
441439
// Just testing KMSv2 feature flag
442440
featuregatetesting.SetFeatureGateDuringTest(t, utilfeature.DefaultFeatureGate, features.KMSv1, true)
443441

444-
featuregatetesting.SetFeatureGateDuringTest(t, utilfeature.DefaultFeatureGate, features.KMSv2, tt.kmsv2Enabled)
445-
446442
ctx, cancel := context.WithCancel(context.Background())
447443
cancel() // cancel this upfront so the kms v2 checks do not block
448444

test/e2e/testing-manifests/auth/encrypt/kind.yaml

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,6 @@ nodes:
2626
apiServer:
2727
extraArgs:
2828
encryption-provider-config: "/etc/kubernetes/encryption-config.yaml"
29-
feature-gates: "KMSv2=true"
3029
v: "5"
3130
extraVolumes:
3231
- name: encryption-config

test/featuregates_linter/test_data/unversioned_feature_list.yaml

Lines changed: 0 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -376,18 +376,6 @@
376376
lockToDefault: false
377377
preRelease: Deprecated
378378
version: ""
379-
- name: KMSv2
380-
versionedSpecs:
381-
- default: true
382-
lockToDefault: true
383-
preRelease: GA
384-
version: ""
385-
- name: KMSv2KDF
386-
versionedSpecs:
387-
- default: true
388-
lockToDefault: true
389-
preRelease: GA
390-
version: ""
391379
- name: KubeletCgroupDriverFromCRI
392380
versionedSpecs:
393381
- default: true

test/integration/controlplane/transformation/kmsv2_transformation_test.go

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -168,9 +168,6 @@ func TestDefaultValues(t *testing.T) {
168168
if encryptionconfig.GetKDF() != true {
169169
t.Fatalf("without updating the feature flags, default value of KMSv2KDF should be enabled.")
170170
}
171-
if utilfeature.DefaultFeatureGate.Enabled(features.KMSv2) != true {
172-
t.Fatalf("without updating the feature flags, default value of KMSv2 should be enabled.")
173-
}
174171
if utilfeature.DefaultFeatureGate.Enabled(features.KMSv1) != false {
175172
t.Fatalf("without updating the feature flags, default value of KMSv1 should be disabled.")
176173
}

0 commit comments

Comments
 (0)