diff --git a/pkg/apis/kops/validation/validation.go b/pkg/apis/kops/validation/validation.go index 2b3578a0ba..593ac88854 100644 --- a/pkg/apis/kops/validation/validation.go +++ b/pkg/apis/kops/validation/validation.go @@ -829,9 +829,6 @@ func validateKubeAPIServer(v *kops.KubeAPIServerConfig, c *kops.Cluster, fldPath } } - if c.IsKubernetesLT("1.22") && len(v.AdditionalServiceAccountIssuers) > 0 { - allErrs = append(allErrs, field.Forbidden(fldPath.Child("additionalServiceAccountIssuers"), "additionalServiceAccountIssuers requires Kubernetes 1.22+")) - } return allErrs } diff --git a/pkg/apis/kops/validation/validation_test.go b/pkg/apis/kops/validation/validation_test.go index 8fb3e0637a..a6292a9102 100644 --- a/pkg/apis/kops/validation/validation_test.go +++ b/pkg/apis/kops/validation/validation_test.go @@ -310,23 +310,6 @@ func TestValidateKubeAPIServer(t *testing.T) { }, ExpectedErrors: []string{"Unsupported value::KubeAPIServer.logFormat"}, }, - { - Input: kops.KubeAPIServerConfig{ - AdditionalServiceAccountIssuers: []string{"https://foo.bar"}, - }, - Cluster: &kops.Cluster{ - Spec: kops.ClusterSpec{ - Authorization: &kops.AuthorizationSpec{ - RBAC: &kops.RBACAuthorizationSpec{}, - }, - KubernetesVersion: "1.21.0", - CloudProvider: kops.CloudProviderSpec{ - AWS: &kops.AWSSpec{}, - }, - }, - }, - ExpectedErrors: []string{"Forbidden::KubeAPIServer.additionalServiceAccountIssuers"}, - }, } for _, g := range grid { if g.Cluster == nil {