Skip to content

NO-JIRA: add two more encryption rotation scenarios#2218

Open
tjungblu wants to merge 1 commit into
openshift:masterfrom
tjungblu:rotation_tests
Open

NO-JIRA: add two more encryption rotation scenarios#2218
tjungblu wants to merge 1 commit into
openshift:masterfrom
tjungblu:rotation_tests

Conversation

@tjungblu
Copy link
Copy Markdown
Contributor

@tjungblu tjungblu commented May 12, 2026

This adds two new encryption tests:

  • Forced rotation during first migration
  • Forced rotation during a rotation

Summary by CodeRabbit

  • Tests
    • Added operator condition–based detection for encryption migration progress with a secret-polling fallback
    • Added rotation scenarios to validate behavior during active migrations (first-migration and overlapping-rotation cases)
    • Added helpers to verify encryption stability and track key rotations
    • Enhanced test flow to apply APIServer encryption settings immediately before waiting for migration completion

@openshift-ci-robot
Copy link
Copy Markdown

@tjungblu: This pull request explicitly references no jira issue.

Details

In response to this:

This adds two new encryption tests:

  • Forced rotation during first migration
  • Forced rotation during a rotation

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@openshift-ci-robot openshift-ci-robot added the jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. label May 12, 2026
@openshift-ci openshift-ci Bot added the do-not-merge/work-in-progress Indicates that a PR should not merge because it is a work in progress. label May 12, 2026
@openshift-ci
Copy link
Copy Markdown
Contributor

openshift-ci Bot commented May 12, 2026

Skipping CI for Draft Pull Request.
If you want CI signal for your change, please convert it to an actual PR.
You can still manually trigger a test run with /test all

Comment on lines +225 to +230
// TODO(thomas): wire up a hook to define this from a provider configuration
// TODO(thomas): when we're on KMS provider we can grab the keyId from an annotation
// TODO(thomas): a new rotation controller can update the annotation for KMS

// TODO(thomas): alternative, when we detect a new KeyId, we can also remove the migrated-* annotations,
// that way the controller will definitely try to reconcile it again.
Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'll remove that, sorry

@coderabbitai
Copy link
Copy Markdown

coderabbitai Bot commented May 12, 2026

Note

Reviews paused

It looks like this branch is under active development. To avoid overwhelming you with review comments due to an influx of new commits, CodeRabbit has automatically paused this review. You can configure this behavior by changing the reviews.auto_review.auto_pause_after_reviewed_commits setting.

Use the following commands to manage reviews:

  • @coderabbitai resume to resume automatic reviews.
  • @coderabbitai review to trigger a single review.

Use the checkboxes below for quick actions:

  • ▶️ Resume reviews
  • 🔍 Trigger review

Walkthrough

Adds a shared operator-condition callback, APIServer encryption apply and cleanup helpers, polling utilities to wait for stable encryption and count rotations, an operator-observed migration-in-progress detector, and two rotation-during-migration test scenarios.

Changes

Encryption migration and rotation testing

Layer / File(s) Summary
Operator conditions callback and imports
test/library/encryption/helpers.go, test/library/encryption/perf_scenarios.go
GetOperatorConditionsFuncType is defined in helpers.go with operatorv1 import; duplicate local type and import removed from perf_scenarios.go.
APIServer apply and rotation cleanup
test/library/encryption/helpers.go
ApplyAPIServerEncryptionType applies APIServer encryption spec (runs provider Setup when present) and ClearForcedKeyRotationReason clears encryption.reason; SetAndWaitForEncryptionType updated to apply APIServer spec before waiting.
Encryption stability polling
test/library/encryption/helpers.go
WaitUntilEncryptionStable polls latest write-key secret until mode equals expected encryption type and all target group resources are present in migrated metadata.
Rotation counting helpers
test/library/encryption/helpers.go
WaitForNRotations verifies the latest write-key secret numeric suffix equals baseline + n; EncryptionWriteKeySecretID extracts that numeric suffix.
Operator-observed in-progress detection
test/library/encryption/helpers.go
WaitForEncryptionMigrationInProgressWindow waits for an operator EncryptionMigrationControllerProgressing condition with Status=True, Reason="Migrating" when getOp is provided, otherwise falls back to secret-metadata observation; returns whether stacking window was observed.
Rotation scenarios & cleanup wiring
test/library/encryption/scenarios.go
RotationScenario gains GetOperatorConditionsFunc; TestEncryptionRotation defers ClearForcedKeyRotationReason; adds TestEncryptionRotationDuringFirstMigration and TestEncryptionRotationDuringOngoingRotation which detect operator-observed migration windows and exercise overlapping rotations.

Estimated code review effort

🎯 4 (Complex) | ⏱️ ~45 minutes

Possibly related PRs

  • openshift/library-go#2225: Shares EncryptionProvider setup propagation that this PR consumes in ApplyAPIServerEncryptionType.

Suggested labels

approved, lgtm

Suggested reviewers

  • dgrisonnet
  • p0lyn0mial
🚥 Pre-merge checks | ✅ 4 | ❌ 8

❌ Failed checks (1 warning, 7 inconclusive)

Check name Status Explanation Resolution
Docstring Coverage ⚠️ Warning Docstring coverage is 66.67% which is insufficient. The required threshold is 80.00%. Write docstrings for the functions missing them to satisfy the coverage threshold.
Stable And Deterministic Test Names ❓ Inconclusive Repository clone failed, so this custom check could not run with code access. Retry the review run. If this persists, inspect pre-merge custom-check logs for infrastructure or agent runtime failures.
Test Structure And Quality ❓ Inconclusive Repository clone failed, so this custom check could not run with code access. Retry the review run. If this persists, inspect pre-merge custom-check logs for infrastructure or agent runtime failures.
Microshift Test Compatibility ❓ Inconclusive Repository clone failed, so this custom check could not run with code access. Retry the review run. If this persists, inspect pre-merge custom-check logs for infrastructure or agent runtime failures.
Single Node Openshift (Sno) Test Compatibility ❓ Inconclusive Repository clone failed, so this custom check could not run with code access. Retry the review run. If this persists, inspect pre-merge custom-check logs for infrastructure or agent runtime failures.
Topology-Aware Scheduling Compatibility ❓ Inconclusive Repository clone failed, so this custom check could not run with code access. Retry the review run. If this persists, inspect pre-merge custom-check logs for infrastructure or agent runtime failures.
Ote Binary Stdout Contract ❓ Inconclusive Repository clone failed, so this custom check could not run with code access. Retry the review run. If this persists, inspect pre-merge custom-check logs for infrastructure or agent runtime failures.
Ipv6 And Disconnected Network Test Compatibility ❓ Inconclusive Repository clone failed, so this custom check could not run with code access. Retry the review run. If this persists, inspect pre-merge custom-check logs for infrastructure or agent runtime failures.
✅ Passed checks (4 passed)
Check name Status Explanation
Description Check ✅ Passed Check skipped - CodeRabbit’s high-level summary is enabled.
Title check ✅ Passed The title accurately summarizes the primary change: adding two new encryption rotation test scenarios.
Linked Issues check ✅ Passed Check skipped because no linked issues were found for this pull request.
Out of Scope Changes check ✅ Passed Check skipped because no linked issues were found for this pull request.

✏️ Tip: You can configure your own custom pre-merge checks in the settings.

✨ Finishing Touches
🧪 Generate unit tests (beta)
  • Create PR with unit tests

Comment @coderabbitai help to get the list of available commands and usage tips.

@tjungblu tjungblu force-pushed the rotation_tests branch 2 times, most recently from 7e6ba8f to 9f815c4 Compare May 13, 2026 08:13
tjungblu added a commit to tjungblu/cluster-kube-apiserver-operator that referenced this pull request May 13, 2026
from library-go openshift/library-go#2218

Signed-off-by: Thomas Jungblut <tjungblu@redhat.com>
Copy link
Copy Markdown
Contributor

@p0lyn0mial p0lyn0mial left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I did a first quick pass. I’d like to clarify the scope. Are we creating new cases that will support all providers, or just KMS?

t.Skipf("initial migration finished before an in-progress window was observed; set GetOperatorConditionsFunc or use a cluster where migration stays visible longer")
}

require.NoError(e, ForceKeyRotation(e, scenario.UnsupportedConfigFunc, fmt.Sprintf("test-rotation-during-first-migration-%s", rand.String(4))))
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

ForceKeyRotation has no effect on KMS. What is out plan here ? Do we want to run the new scenarios for all encryption providers ?

Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

ForceKeyRotation will be implemented differently later on

// ClearForcedKeyRotationReason clears encryption.reason under UnsupportedConfigOverrides (same merge path as
// ForceKeyRotation). Call when a test finishes so the next test in sequence does not inherit a non-empty
// reason and the key controller does not keep seeing an external rotation request.
func ClearForcedKeyRotationReason(t testing.TB, updateUnsupportedConfig UpdateUnsupportedConfigFunc) error {
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

instead of a new fn why no to change teh ForceKeyRotation to register a cleanup routine via t.Cleanup ?

Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

why would I couple those two functionalities together? what if I just want to force a key rotation and not cleanup?

Comment thread test/library/encryption/scenarios.go Outdated

require.NoError(e, ForceKeyRotation(e, scenario.UnsupportedConfigFunc, fmt.Sprintf("test-rotation-during-first-migration-%s", rand.String(4))))
// n=2: one write-key revision from turning encryption on, one from ForceKeyRotation.
WaitForNRotations(e, clientSet.Kube, scenario.EncryptionProvider, scenario.TargetGRs, ns, labelSelector, prevMeta, 2)
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

also for KMS, rotation will not create a new key.

Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

yep, so this would be implemented differently in KMS - I assume this would use this API that you and Ben cobbled together so far

@openshift-ci openshift-ci Bot added the needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. label May 14, 2026
@tjungblu tjungblu marked this pull request as ready for review May 15, 2026 07:56
@tjungblu tjungblu force-pushed the rotation_tests branch 3 times, most recently from 0cadc78 to dc56c5c Compare May 15, 2026 08:07
Copy link
Copy Markdown

@coderabbitai coderabbitai Bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 2

🤖 Prompt for all review comments with AI agents
Verify each finding against current code. Fix only still-valid issues, skip the
rest with a brief reason, keep changes minimal, and validate.

Inline comments:
In `@test/library/encryption/helpers.go`:
- Around line 399-416: The operator-condition branch currently returns true for
any Migrating condition; change the loop that scans conds (inside the wait.Poll
using getOp) to also verify the expectedWriteKey is the target of that
migration: only treat a condition as success if c.Type ==
encryptionMigrationControllerProgressingType && c.Status ==
operatorv1.ConditionTrue && c.Reason == "Migrating" AND (expectedWriteKey == ""
OR the condition text contains expectedWriteKey). In practice, update the
condition check in the loop to inspect the condition's message/text (e.g.,
c.Message) for expectedWriteKey and only return true when it matches; keep the
existing fallback to secret metadata polling and the t.Logf call unchanged.
- Around line 339-355: WaitUntilEncryptionStable compares meta.Mode to the raw
expectedMode which can be the zero-value; normalize empty expectedMode to the
canonical defaultEncryptionMode before polling so callers passing "" don’t hang.
In WaitUntilEncryptionStable set wantMode := string(expectedMode) and if
wantMode == "" assign wantMode = defaultEncryptionMode (same mapping used by
WaitForEncryptionKeyBasedOn) so the meta.Mode comparison and
allTargetGRsMigrated checks use the normalized mode.
🪄 Autofix (Beta)

Fix all unresolved CodeRabbit comments on this PR:

  • Push a commit to this branch (recommended)
  • Create a new PR with the fixes

ℹ️ Review info
⚙️ Run configuration

Configuration used: Repository: openshift/coderabbit/.coderabbit.yaml

Review profile: CHILL

Plan: Enterprise

Run ID: 62d417f5-06d3-4c1f-95cd-58e2149b95b8

📥 Commits

Reviewing files that changed from the base of the PR and between 9f815c4 and dc56c5c.

📒 Files selected for processing (3)
  • test/library/encryption/helpers.go
  • test/library/encryption/perf_scenarios.go
  • test/library/encryption/scenarios.go
💤 Files with no reviewable changes (1)
  • test/library/encryption/perf_scenarios.go
🚧 Files skipped from review as they are similar to previous changes (1)
  • test/library/encryption/scenarios.go

Comment on lines +339 to +355
func WaitUntilEncryptionStable(t testing.TB, kube kubernetes.Interface, expectedMode configv1.EncryptionType, targetGRs []schema.GroupResource, namespace, labelSelector string) {
t.Helper()
wantMode := string(expectedMode)
err := wait.Poll(waitPollInterval, waitPollTimeout, func() (bool, error) {
meta, err := GetLastKeyMeta(t, kube, namespace, labelSelector)
if err != nil {
return false, err
}
if meta.Mode != wantMode {
return false, nil
}
if !allTargetGRsMigrated(meta, targetGRs) {
return false, nil
}
return true, nil
})
require.NoError(t, err)
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⚠️ Potential issue | 🟠 Major | ⚡ Quick win

Normalize empty expectedMode to identity before polling.

WaitForEncryptionKeyBasedOn already maps "" to defaultEncryptionMode, but this helper compares meta.Mode to "" directly. Any caller that passes the zero-value encryption type will sit here until timeout, and WaitForNRotations inherits that behavior.

Suggested fix
 func WaitUntilEncryptionStable(t testing.TB, kube kubernetes.Interface, expectedMode configv1.EncryptionType, targetGRs []schema.GroupResource, namespace, labelSelector string) {
 	t.Helper()
 	wantMode := string(expectedMode)
+	if wantMode == "" {
+		wantMode = defaultEncryptionMode
+	}
 	err := wait.Poll(waitPollInterval, waitPollTimeout, func() (bool, error) {
 		meta, err := GetLastKeyMeta(t, kube, namespace, labelSelector)
 		if err != nil {
 			return false, err
📝 Committable suggestion

‼️ IMPORTANT
Carefully review the code before committing. Ensure that it accurately replaces the highlighted code, contains no missing lines, and has no issues with indentation. Thoroughly test & benchmark the code to ensure it meets the requirements.

Suggested change
func WaitUntilEncryptionStable(t testing.TB, kube kubernetes.Interface, expectedMode configv1.EncryptionType, targetGRs []schema.GroupResource, namespace, labelSelector string) {
t.Helper()
wantMode := string(expectedMode)
err := wait.Poll(waitPollInterval, waitPollTimeout, func() (bool, error) {
meta, err := GetLastKeyMeta(t, kube, namespace, labelSelector)
if err != nil {
return false, err
}
if meta.Mode != wantMode {
return false, nil
}
if !allTargetGRsMigrated(meta, targetGRs) {
return false, nil
}
return true, nil
})
require.NoError(t, err)
func WaitUntilEncryptionStable(t testing.TB, kube kubernetes.Interface, expectedMode configv1.EncryptionType, targetGRs []schema.GroupResource, namespace, labelSelector string) {
t.Helper()
wantMode := string(expectedMode)
if wantMode == "" {
wantMode = defaultEncryptionMode
}
err := wait.Poll(waitPollInterval, waitPollTimeout, func() (bool, error) {
meta, err := GetLastKeyMeta(t, kube, namespace, labelSelector)
if err != nil {
return false, err
}
if meta.Mode != wantMode {
return false, nil
}
if !allTargetGRsMigrated(meta, targetGRs) {
return false, nil
}
return true, nil
})
require.NoError(t, err)
🤖 Prompt for AI Agents
Verify each finding against current code. Fix only still-valid issues, skip the
rest with a brief reason, keep changes minimal, and validate.

In `@test/library/encryption/helpers.go` around lines 339 - 355,
WaitUntilEncryptionStable compares meta.Mode to the raw expectedMode which can
be the zero-value; normalize empty expectedMode to the canonical
defaultEncryptionMode before polling so callers passing "" don’t hang. In
WaitUntilEncryptionStable set wantMode := string(expectedMode) and if wantMode
== "" assign wantMode = defaultEncryptionMode (same mapping used by
WaitForEncryptionKeyBasedOn) so the meta.Mode comparison and
allTargetGRsMigrated checks use the normalized mode.

Comment thread test/library/encryption/helpers.go
@openshift-ci openshift-ci Bot removed the needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. label May 15, 2026
tjungblu added a commit to tjungblu/cluster-kube-apiserver-operator that referenced this pull request May 15, 2026
from library-go openshift/library-go#2218

Signed-off-by: Thomas Jungblut <tjungblu@redhat.com>
tjungblu added a commit to tjungblu/cluster-kube-apiserver-operator that referenced this pull request May 15, 2026
from library-go openshift/library-go#2218

Signed-off-by: Thomas Jungblut <tjungblu@redhat.com>
tjungblu added a commit to tjungblu/cluster-kube-apiserver-operator that referenced this pull request May 15, 2026
from library-go openshift/library-go#2218

Signed-off-by: Thomas Jungblut <tjungblu@redhat.com>
This adds two new encryption tests:
* Forced rotation during first migration
* Forced rotation during a rotation

Signed-off-by: Thomas Jungblut <tjungblu@redhat.com>
@openshift-ci
Copy link
Copy Markdown
Contributor

openshift-ci Bot commented May 20, 2026

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: tjungblu
Once this PR has been reviewed and has the lgtm label, please assign p0lyn0mial for approval. For more information see the Code Review Process.

The full list of commands accepted by this bot can be found here.

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

tjungblu added a commit to tjungblu/cluster-kube-apiserver-operator that referenced this pull request May 20, 2026
from library-go openshift/library-go#2218

Signed-off-by: Thomas Jungblut <tjungblu@redhat.com>
tjungblu added a commit to tjungblu/cluster-kube-apiserver-operator that referenced this pull request May 20, 2026
from library-go openshift/library-go#2218

Signed-off-by: Thomas Jungblut <tjungblu@redhat.com>
@openshift-ci openshift-ci Bot removed the do-not-merge/work-in-progress Indicates that a PR should not merge because it is a work in progress. label May 20, 2026
Copy link
Copy Markdown

@coderabbitai coderabbitai Bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

♻️ Duplicate comments (2)
test/library/encryption/scenarios.go (1)

295-330: ⚠️ Potential issue | 🟠 Major | ⚡ Quick win

Guard these overlap scenarios against KMS.

Both tests assume ForceKeyRotation produces a new write-key secret and that WaitForNRotations can count suffix increments. That only matches the static-provider path, so a RotationScenario using EncryptionTypeKMS will fail or assert the wrong behavior here.

Suggested fix
 func TestEncryptionRotationDuringFirstMigration(t testing.TB, scenario RotationScenario) {
+	if scenario.EncryptionProvider.Type == configv1.EncryptionTypeKMS {
+		t.Skip("rotation overlap scenarios currently rely on write-key secret revisions, which are not valid for KMS")
+	}
+
 	ns := scenario.Namespace
 	labelSelector := scenario.LabelSelector
@@
 func TestEncryptionRotationDuringOngoingRotation(t testing.TB, scenario RotationScenario) {
+	if scenario.EncryptionProvider.Type == configv1.EncryptionTypeKMS {
+		t.Skip("rotation overlap scenarios currently rely on write-key secret revisions, which are not valid for KMS")
+	}
+
 	ns := scenario.Namespace
 	labelSelector := scenario.LabelSelector

Also applies to: 336-369

🤖 Prompt for AI Agents
Verify each finding against current code. Fix only still-valid issues, skip the
rest with a brief reason, keep changes minimal, and validate.

In `@test/library/encryption/scenarios.go` around lines 295 - 330,
TestEncryptionRotationDuringFirstMigration assumes ForceKeyRotation creates a
new write-key secret and that WaitForNRotations counts suffix increments, which
is only true for the static-provider path; guard this scenario against KMS by
checking the scenario.EncryptionProvider.Type (or scenario.TargetEncryptionType)
and skip or alter behavior when it equals EncryptionTypeKMS: either skip the
ForceKeyRotation + WaitForNRotations block for KMS scenarios or use a
KMS-appropriate assertion path; update
TestEncryptionRotationDuringFirstMigration (and the similar block at lines
336-369) to branch on EncryptionTypeKMS before calling ForceKeyRotation and
WaitForNRotations so KMS scenarios do not run static-provider assumptions.
test/library/encryption/helpers.go (1)

396-408: ⚠️ Potential issue | 🟠 Major | ⚡ Quick win

Tie the operator-condition window to expectedWriteKey.

This succeeds on any Migrating condition, so a stale or unrelated migration can satisfy the poll before the write key you want to stack on is active. That lets the overlap tests trigger the next rotation against the wrong window.

Suggested fix
 	if getOp != nil {
 		err := wait.Poll(2*time.Second, windowWait, func() (bool, error) {
+			meta, err := GetLastKeyMeta(t, kube, namespace, labelSelector)
+			if err != nil {
+				return false, err
+			}
+			if expectedWriteKey != "" && meta.Name != expectedWriteKey {
+				return false, nil
+			}
+			if allTargetGRsMigrated(meta, targetGRs) {
+				return false, nil
+			}
+
 			conds, err := getOp(t)
 			if err != nil {
 				return false, err
 			}
 			for _, c := range conds {
🤖 Prompt for AI Agents
Verify each finding against current code. Fix only still-valid issues, skip the
rest with a brief reason, keep changes minimal, and validate.

In `@test/library/encryption/helpers.go` around lines 396 - 408, The poll
currently returns true for any Condition of type
encryptionMigrationControllerProgressingType with Status True/Reason
"Migrating", which can match unrelated/stale migrations; update the closure used
in wait.Poll (the one calling getOp) to additionally verify that the progressing
condition pertains to the expectedWriteKey (compare against expectedWriteKey
using whatever field carries the target key—e.g., c.Message, c.ReasonDetail,
annotation or status field that encodes the write key) before returning true so
only the migration window for expectedWriteKey satisfies the poll; change only
the closure in the getOp poll logic to include this extra equality check.
🤖 Prompt for all review comments with AI agents
Verify each finding against current code. Fix only still-valid issues, skip the
rest with a brief reason, keep changes minimal, and validate.

Duplicate comments:
In `@test/library/encryption/helpers.go`:
- Around line 396-408: The poll currently returns true for any Condition of type
encryptionMigrationControllerProgressingType with Status True/Reason
"Migrating", which can match unrelated/stale migrations; update the closure used
in wait.Poll (the one calling getOp) to additionally verify that the progressing
condition pertains to the expectedWriteKey (compare against expectedWriteKey
using whatever field carries the target key—e.g., c.Message, c.ReasonDetail,
annotation or status field that encodes the write key) before returning true so
only the migration window for expectedWriteKey satisfies the poll; change only
the closure in the getOp poll logic to include this extra equality check.

In `@test/library/encryption/scenarios.go`:
- Around line 295-330: TestEncryptionRotationDuringFirstMigration assumes
ForceKeyRotation creates a new write-key secret and that WaitForNRotations
counts suffix increments, which is only true for the static-provider path; guard
this scenario against KMS by checking the scenario.EncryptionProvider.Type (or
scenario.TargetEncryptionType) and skip or alter behavior when it equals
EncryptionTypeKMS: either skip the ForceKeyRotation + WaitForNRotations block
for KMS scenarios or use a KMS-appropriate assertion path; update
TestEncryptionRotationDuringFirstMigration (and the similar block at lines
336-369) to branch on EncryptionTypeKMS before calling ForceKeyRotation and
WaitForNRotations so KMS scenarios do not run static-provider assumptions.

ℹ️ Review info
⚙️ Run configuration

Configuration used: Repository: openshift/coderabbit/.coderabbit.yaml

Review profile: CHILL

Plan: Enterprise

Run ID: afaf36a5-894b-4628-b69c-79ffe8ca314e

📥 Commits

Reviewing files that changed from the base of the PR and between dc56c5c and fea2dbe.

📒 Files selected for processing (3)
  • test/library/encryption/helpers.go
  • test/library/encryption/perf_scenarios.go
  • test/library/encryption/scenarios.go

@openshift-ci
Copy link
Copy Markdown
Contributor

openshift-ci Bot commented May 20, 2026

@tjungblu: all tests passed!

Full PR test history. Your PR dashboard.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

jira/valid-reference Indicates that this PR references a valid Jira ticket of any type.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants