Skip to content

Commit 1cfde2d

Browse files
feat: remove acm-version check for acm-alerting ui feature
1 parent c5b39c1 commit 1cfde2d

File tree

10 files changed

+22
-88
lines changed

10 files changed

+22
-88
lines changed

bundle/manifests/observability-operator.clusterserviceversion.yaml

Lines changed: 0 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -498,14 +498,6 @@ spec:
498498
verbs:
499499
- get
500500
- update
501-
- apiGroups:
502-
- operator.open-cluster-management.io
503-
resources:
504-
- multiclusterhubs
505-
verbs:
506-
- get
507-
- list
508-
- watch
509501
- apiGroups:
510502
- operator.openshift.io
511503
resources:

deploy/operator/observability-operator-cluster-role.yaml

Lines changed: 0 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -223,14 +223,6 @@ rules:
223223
verbs:
224224
- get
225225
- update
226-
- apiGroups:
227-
- operator.open-cluster-management.io
228-
resources:
229-
- multiclusterhubs
230-
verbs:
231-
- get
232-
- list
233-
- watch
234226
- apiGroups:
235227
- operator.openshift.io
236228
resources:

go.mod

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,6 @@ require (
1313
github.com/prometheus/common v0.60.1
1414
github.com/rhobs/obo-prometheus-operator v0.77.1-rhobs1
1515
github.com/rhobs/obo-prometheus-operator/pkg/apis/monitoring v0.77.1-rhobs1
16-
github.com/stolostron/multiclusterhub-operator v0.0.0-20240626140553-4f1ed6be3b84
1716
go.uber.org/zap v1.27.0
1817
golang.org/x/exp v0.0.0-20240909161429-701f63a606c0
1918
golang.org/x/mod v0.22.0

go.sum

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -45,8 +45,8 @@ github.com/efficientgo/core v1.0.0-rc.2 h1:7j62qHLnrZqO3V3UA0AqOGd5d5aXV3AX6m/NZ
4545
github.com/efficientgo/core v1.0.0-rc.2/go.mod h1:FfGdkzWarkuzOlY04VY+bGfb1lWrjaL6x/GLcQ4vJps=
4646
github.com/emicklei/go-restful/v3 v3.12.1 h1:PJMDIM/ak7btuL8Ex0iYET9hxM3CI2sjZtzpL63nKAU=
4747
github.com/emicklei/go-restful/v3 v3.12.1/go.mod h1:6n3XBCmQQb25CM2LCACGz8ukIrRry+4bhvbpWn3mrbc=
48-
github.com/evanphx/json-patch v5.7.0+incompatible h1:vgGkfT/9f8zE6tvSCe74nfpAVDQ2tG6yudJd8LBksgI=
49-
github.com/evanphx/json-patch v5.7.0+incompatible/go.mod h1:50XU6AFN0ol/bzJsmQLiYLvXMP4fmwYFNcr97nuDLSk=
48+
github.com/evanphx/json-patch v5.6.0+incompatible h1:jBYDEEiFBPxA0v50tFdvOzQQTCvpL6mnFh5mB2/l16U=
49+
github.com/evanphx/json-patch v5.6.0+incompatible/go.mod h1:50XU6AFN0ol/bzJsmQLiYLvXMP4fmwYFNcr97nuDLSk=
5050
github.com/evanphx/json-patch/v5 v5.9.0 h1:kcBlZQbplgElYIlo/n1hJbls2z/1awpXxpRi0/FOJfg=
5151
github.com/evanphx/json-patch/v5 v5.9.0/go.mod h1:VNkHZ/282BpEyt/tObQO8s5CMPmYYq14uClGH4abBuQ=
5252
github.com/facette/natsort v0.0.0-20181210072756-2cd4dd1e2dcb h1:IT4JYU7k4ikYg1SCxNI1/Tieq/NFvh6dzLdgi7eu0tM=
@@ -91,7 +91,6 @@ github.com/go-openapi/swag v0.23.0/go.mod h1:esZ8ITTYEsH1V2trKHjAN8Ai7xHb8RV+YSZ
9191
github.com/go-openapi/validate v0.24.0 h1:LdfDKwNbpB6Vn40xhTdNZAnfLECL81w+VX3BumrGD58=
9292
github.com/go-openapi/validate v0.24.0/go.mod h1:iyeX1sEufmv3nPbBdX3ieNviWnOZaJ1+zquzJEf2BAQ=
9393
github.com/go-stack/stack v1.8.0/go.mod h1:v0f6uXyyMGvRgIKkXu+yp6POWl0qKG85gN/melR3HDY=
94-
github.com/go-task/slim-sprig v0.0.0-20230315185526-52ccab3ef572 h1:tfuBGBXKqDEevZMzYi5KSi8KkcZtzBcTgAUUtapy0OI=
9594
github.com/go-task/slim-sprig/v3 v3.0.0 h1:sUs3vkvUymDpBKi3qH1YSqBQk9+9D/8M2mN1vB6EwHI=
9695
github.com/go-task/slim-sprig/v3 v3.0.0/go.mod h1:W848ghGpv3Qj3dhTPRyJypKRiqCdHZiAzKg9hl15HA8=
9796
github.com/gogo/protobuf v1.1.1/go.mod h1:r8qH/GZQm5c6nD/R0oafs1akxWv10x8SbQlK7atdtwQ=
@@ -244,8 +243,6 @@ github.com/spf13/cobra v1.8.1 h1:e5/vxKd/rZsfSJMUX1agtjeTDf+qv1/JdBF8gg5k9ZM=
244243
github.com/spf13/cobra v1.8.1/go.mod h1:wHxEcudfqmLYa8iTfL+OuZPbBZkmvliBWKIezN3kD9Y=
245244
github.com/spf13/pflag v1.0.5 h1:iy+VFUOCP1a+8yFto/drg2CJ5u0yRoB7fZw3DKv/JXA=
246245
github.com/spf13/pflag v1.0.5/go.mod h1:McXfInJRrz4CZXVZOBLb0bTZqETkiAhM9Iw0y3An2Bg=
247-
github.com/stolostron/multiclusterhub-operator v0.0.0-20240626140553-4f1ed6be3b84 h1:kjoi1qzaohRJSzdtZVmLhxJsi9nQmpitjwwp83QcTF8=
248-
github.com/stolostron/multiclusterhub-operator v0.0.0-20240626140553-4f1ed6be3b84/go.mod h1:fVXNVgAb4lcyAurs9qi3UG5bkpRCO2hYmEkj9s9++MY=
249246
github.com/stretchr/objx v0.1.0/go.mod h1:HFkY916IF+rwdDfMAkV7OtwuqBVzrE8GR6GFx+wExME=
250247
github.com/stretchr/objx v0.1.1/go.mod h1:HFkY916IF+rwdDfMAkV7OtwuqBVzrE8GR6GFx+wExME=
251248
github.com/stretchr/testify v1.2.2/go.mod h1:a8OnRcib4nhh0OaRAV+Yts87kKdq0PP7pXfy6kDkUVs=

pkg/controllers/uiplugin/compatibility_matrix_test.go

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,6 @@ func TestLookupImageAndFeatures(t *testing.T) {
4747
for _, tc := range []struct {
4848
pluginType uiv1alpha1.UIPluginType
4949
clusterVersion string
50-
acmVersion string
5150
expectedKey string
5251
expectedErr error
5352
expectedFeatures []string
@@ -201,7 +200,6 @@ func TestLookupImageAndFeatures(t *testing.T) {
201200
{
202201
pluginType: uiv1alpha1.TypeMonitoring,
203202
clusterVersion: "v4.14.0-0.nightly-2024-06-06-064349",
204-
acmVersion: "v2.11.3",
205203
expectedKey: "ui-monitoring",
206204
expectedFeatures: []string{},
207205
expectedErr: nil,

pkg/controllers/uiplugin/controller.go

Lines changed: 1 addition & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -3,15 +3,13 @@ package uiplugin
33
import (
44
"context"
55
"slices"
6-
"strings"
76
"time"
87

98
"github.com/go-logr/logr"
109
configv1 "github.com/openshift/api/config/v1"
1110
osv1 "github.com/openshift/api/console/v1"
1211
osv1alpha1 "github.com/openshift/api/console/v1alpha1"
1312
operatorv1 "github.com/openshift/api/operator/v1"
14-
mchv1 "github.com/stolostron/multiclusterhub-operator/api/v1"
1513
appsv1 "k8s.io/api/apps/v1"
1614
v1 "k8s.io/api/core/v1"
1715
rbacv1 "k8s.io/api/rbac/v1"
@@ -75,9 +73,6 @@ const (
7573
// RBAC for distributed tracing
7674
// +kubebuilder:rbac:groups=tempo.grafana.com,resources=tempostacks;tempomonolithics,verbs=list
7775

78-
// RBAC for monitoring
79-
// +kubebuilder:rbac:groups=operator.open-cluster-management.io,resources=multiclusterhubs,verbs=get;list;watch
80-
8176
// RBAC for logging view plugin
8277
// +kubebuilder:rbac:groups=loki.grafana.com,resources=application;infrastructure;audit,verbs=get
8378

@@ -214,19 +209,6 @@ func (rm resourceManager) Reconcile(ctx context.Context, req ctrl.Request) (ctrl
214209
}
215210
}
216211

217-
multiClusterHubList := &mchv1.MultiClusterHubList{}
218-
acmVersion := "acm version not found"
219-
err = rm.k8sClient.List(ctx, multiClusterHubList, &client.ListOptions{})
220-
221-
// Multiple MultiClusterHub's are undefined behavior
222-
if err == nil && len(multiClusterHubList.Items) == 1 {
223-
multiClusterHub := multiClusterHubList.Items[0]
224-
acmVersion = multiClusterHub.Status.CurrentVersion
225-
if !strings.HasPrefix(acmVersion, "v") {
226-
acmVersion = "v" + acmVersion
227-
}
228-
}
229-
230212
compatibilityInfo, err := lookupImageAndFeatures(plugin.Spec.Type, rm.clusterVersion)
231213
if err != nil {
232214
return ctrl.Result{}, err
@@ -251,7 +233,7 @@ func (rm resourceManager) Reconcile(ctx context.Context, req ctrl.Request) (ctrl
251233
return ctrl.Result{}, err
252234
}
253235

254-
pluginInfo, err := PluginInfoBuilder(ctx, rm.k8sClient, plugin, rm.pluginConf, compatibilityInfo, acmVersion, rm.clusterVersion)
236+
pluginInfo, err := PluginInfoBuilder(ctx, rm.k8sClient, plugin, rm.pluginConf, compatibilityInfo, rm.clusterVersion)
255237

256238
if err != nil {
257239
logger.Error(err, "failed to reconcile plugin")

pkg/controllers/uiplugin/monitoring.go

Lines changed: 4 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -18,23 +18,16 @@ import (
1818
Requirements for ACM enablement
1919
1. UIPlugin configuration requires acm.enabled, acm.thanosQuerier.Url, and acm.alertmanager.Url
2020
2. OpenShift Container Platform requirement: v4.14+
21-
3. Advanced Cluster Management: v2.11+
2221
*/
23-
func validateACMConfig(config *uiv1alpha1.MonitoringConfig, acmVersion string) bool {
22+
func validateACMConfig(config *uiv1alpha1.MonitoringConfig) bool {
2423
enabled := config.ACM.Enabled
2524

2625
// alertManager and thanosQuerier url configurations are required to enable 'acm-alerting'
2726
validAlertManagerUrl := config.ACM.Alertmanager.Url != ""
2827
validThanosQuerierUrl := config.ACM.ThanosQuerier.Url != ""
2928
isValidAcmAlertingConfig := validAlertManagerUrl && validThanosQuerierUrl
3029

31-
// "acm-alerting" feature is supported in ACM v2.11+
32-
if !strings.HasPrefix(acmVersion, "v") {
33-
acmVersion = "v" + acmVersion
34-
}
35-
minACMVersionMet := semver.Compare(acmVersion, "v2.11") >= 0
36-
37-
return isValidAcmAlertingConfig && enabled && minACMVersionMet
30+
return isValidAcmAlertingConfig && enabled
3831
}
3932

4033
func validatePersesConfig(config *uiv1alpha1.MonitoringConfig) bool {
@@ -188,7 +181,7 @@ func addAcmAlertingProxy(pluginInfo *UIPluginInfo, name string, namespace string
188181
)
189182
}
190183

191-
func createMonitoringPluginInfo(plugin *uiv1alpha1.UIPlugin, namespace, name, image string, features []string, acmVersion string, clusterVersion string) (*UIPluginInfo, error) {
184+
func createMonitoringPluginInfo(plugin *uiv1alpha1.UIPlugin, namespace, name, image string, features []string, clusterVersion string) (*UIPluginInfo, error) {
192185
config := plugin.Spec.Monitoring
193186
if config == nil {
194187
return nil, fmt.Errorf("monitoring configuration can not be empty for plugin type %s", plugin.Spec.Type)
@@ -198,7 +191,7 @@ func createMonitoringPluginInfo(plugin *uiv1alpha1.UIPlugin, namespace, name, im
198191
}
199192

200193
// Validate feature configuration and cluster conditions support enablement
201-
isValidAcmConfig := validateACMConfig(config, acmVersion)
194+
isValidAcmConfig := validateACMConfig(config)
202195
isValidPersesConfig := validatePersesConfig(config)
203196
isValidIncidentsConfig := validateIncidentsConfig(config, clusterVersion)
204197

pkg/controllers/uiplugin/monitoring_test.go

Lines changed: 13 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -290,17 +290,16 @@ func containsProxy(pluginInfo *UIPluginInfo) (bool, bool, bool) {
290290
}
291291

292292
var features = []string{}
293-
var acmVersion = "v2.11"
294293
var clusterVersion = "v4.18"
295294

296-
func getPluginInfo(plugin *uiv1alpha1.UIPlugin, features []string, clusterVersion string, acmVersion string) (*UIPluginInfo, error) {
297-
return createMonitoringPluginInfo(plugin, namespace, name, image, features, acmVersion, clusterVersion)
295+
func getPluginInfo(plugin *uiv1alpha1.UIPlugin, features []string, clusterVersion string) (*UIPluginInfo, error) {
296+
return createMonitoringPluginInfo(plugin, namespace, name, image, features, clusterVersion)
298297
}
299298

300299
func TestCreateMonitoringPluginInfo(t *testing.T) {
301300
/** Postive Test - ALL **/
302301
t.Run("Test createMonitoringPluginInfo with all monitoring configurations", func(t *testing.T) {
303-
pluginInfo, error := getPluginInfo(pluginConfigAll, features, clusterVersion, acmVersion)
302+
pluginInfo, error := getPluginInfo(pluginConfigAll, features, clusterVersion)
304303
assert.Assert(t, error == nil)
305304

306305
alertmanagerProxyFound, thanosProxyFound, persesProxyFound := containsProxy(pluginInfo)
@@ -316,7 +315,7 @@ func TestCreateMonitoringPluginInfo(t *testing.T) {
316315

317316
/** Postive Test - ACM **/
318317
t.Run("Test createMonitoringPluginInfo with AMC configuration only", func(t *testing.T) {
319-
pluginInfo, error := getPluginInfo(pluginConfigACM, features, clusterVersion, acmVersion)
318+
pluginInfo, error := getPluginInfo(pluginConfigACM, features, clusterVersion)
320319
assert.Assert(t, error == nil)
321320

322321
alertmanagerProxyFound, thanosProxyFound, persesProxyFound := containsProxy(pluginInfo)
@@ -330,25 +329,9 @@ func TestCreateMonitoringPluginInfo(t *testing.T) {
330329
assert.Assert(t, incidentsFlagFound == false)
331330
})
332331

333-
t.Run("Test validACMConfig() with valid and invalid acmVersions", func(t *testing.T) {
334-
335-
// UIPlugin monitoring ACM feature is only supported in v2.11+
336-
assert.Assert(t, validateACMConfig(pluginConfigACM.Spec.Monitoring, "v2.11.3") == true)
337-
assert.Assert(t, validateACMConfig(pluginConfigACM.Spec.Monitoring, "v2.11") == true)
338-
assert.Assert(t, validateACMConfig(pluginConfigACM.Spec.Monitoring, "2.11") == true)
339-
assert.Assert(t, validateACMConfig(pluginConfigACM.Spec.Monitoring, "v2.11") == true)
340-
341-
assert.Assert(t, validateACMConfig(pluginConfigACM.Spec.Monitoring, "2.10") == false)
342-
assert.Assert(t, validateACMConfig(pluginConfigACM.Spec.Monitoring, "v2.10") == false)
343-
assert.Assert(t, validateACMConfig(pluginConfigACM.Spec.Monitoring, "1.0.0") == false)
344-
assert.Assert(t, validateACMConfig(pluginConfigACM.Spec.Monitoring, "v1.0.0") == false)
345-
346-
assert.Assert(t, validateACMConfig(pluginConfigACM.Spec.Monitoring, "acm version not found") == false)
347-
})
348-
349332
/** Postive Test - Perses **/
350333
t.Run("Test createMonitoringPluginInfo with Perses configuration only", func(t *testing.T) {
351-
pluginInfo, error := getPluginInfo(pluginConfigPerses, features, clusterVersion, acmVersion)
334+
pluginInfo, error := getPluginInfo(pluginConfigPerses, features, clusterVersion)
352335
assert.Assert(t, error == nil)
353336

354337
alertmanagerProxyFound, thanosProxyFound, persesProxyFound := containsProxy(pluginInfo)
@@ -364,7 +347,7 @@ func TestCreateMonitoringPluginInfo(t *testing.T) {
364347
})
365348

366349
t.Run("Test createMonitoringPluginInfo with Perses default namespace and namespace", func(t *testing.T) {
367-
pluginInfo, error := getPluginInfo(pluginConfigPersesDefault, features, clusterVersion, acmVersion)
350+
pluginInfo, error := getPluginInfo(pluginConfigPersesDefault, features, clusterVersion)
368351
assert.Assert(t, error == nil)
369352

370353
alertmanagerProxyFound, thanosProxyFound, persesProxyFound := containsProxy(pluginInfo)
@@ -382,7 +365,7 @@ func TestCreateMonitoringPluginInfo(t *testing.T) {
382365
t.Run("Test createMonitoringPluginInfo with Perses default serviceName", func(t *testing.T) {
383366
// should not throw an error because serviceName is allowed to be empty
384367
// a default serviceName will be assigned
385-
pluginInfo, error := getPluginInfo(pluginConfigPersesDefaultServiceName, features, clusterVersion, acmVersion)
368+
pluginInfo, error := getPluginInfo(pluginConfigPersesDefaultServiceName, features, clusterVersion)
386369
assert.Assert(t, error == nil)
387370

388371
alertmanagerProxyFound, thanosProxyFound, persesProxyFound := containsProxy(pluginInfo)
@@ -399,7 +382,7 @@ func TestCreateMonitoringPluginInfo(t *testing.T) {
399382
t.Run("Test createMonitoringPluginInfo with Perses default namespace", func(t *testing.T) {
400383
// should not throw an error because namespace is allowed to be empty
401384
// a default namespace will be assigned
402-
pluginInfo, error := getPluginInfo(pluginConfigPersesDefaultNamespace, features, clusterVersion, acmVersion)
385+
pluginInfo, error := getPluginInfo(pluginConfigPersesDefaultNamespace, features, clusterVersion)
403386
assert.Assert(t, error == nil)
404387

405388
alertmanagerProxyFound, thanosProxyFound, persesProxyFound := containsProxy(pluginInfo)
@@ -415,7 +398,7 @@ func TestCreateMonitoringPluginInfo(t *testing.T) {
415398

416399
/** Postive Test - Incidients **/
417400
t.Run("Test createMonitoringPluginInfo with Incidents configuration only", func(t *testing.T) {
418-
pluginInfo, error := getPluginInfo(pluginConfigIncidents, features, clusterVersion, acmVersion)
401+
pluginInfo, error := getPluginInfo(pluginConfigIncidents, features, clusterVersion)
419402
assert.Assert(t, error == nil)
420403

421404
alertmanagerProxyFound, thanosProxyFound, persesProxyFound := containsProxy(pluginInfo)
@@ -456,30 +439,30 @@ func TestCreateMonitoringPluginInfo(t *testing.T) {
456439
/** Negative Tests - ACM **/
457440
t.Run("Test createMonitoringPluginInfo with missing URL from thanos", func(t *testing.T) {
458441
// this should throw an error because thanosQuerier.URL is not set
459-
pluginInfo, error := getPluginInfo(pluginConfigAlertmanager, features, clusterVersion, acmVersion)
442+
pluginInfo, error := getPluginInfo(pluginConfigAlertmanager, features, clusterVersion)
460443
assert.Assert(t, pluginInfo == nil)
461444
assert.Assert(t, error != nil)
462445
})
463446

464447
t.Run("Test createMonitoringPluginInfo with missing URL from alertmanager ", func(t *testing.T) {
465448
// this should throw an error because alertManager.URL is not set
466-
pluginInfo, error := getPluginInfo(pluginConfigThanos, features, clusterVersion, acmVersion)
449+
pluginInfo, error := getPluginInfo(pluginConfigThanos, features, clusterVersion)
467450
assert.Assert(t, pluginInfo == nil)
468451
assert.Assert(t, error != nil)
469452
})
470453

471454
/** Negative Tests - Perses **/
472455
t.Run("Test createMonitoringPluginInfo with missing Perses enabled field ", func(t *testing.T) {
473456
// this should throw an error because 'enabled: true' is not set
474-
pluginInfo, error := getPluginInfo(pluginConfigPersesEmpty, features, clusterVersion, acmVersion)
457+
pluginInfo, error := getPluginInfo(pluginConfigPersesEmpty, features, clusterVersion)
475458
assert.Assert(t, pluginInfo == nil)
476459
assert.Assert(t, error != nil)
477460
})
478461

479462
/** Negative Tests - ALL **/
480463
t.Run("Test createMonitoringPluginInfo with malform UIPlugin custom resource", func(t *testing.T) {
481464
// this should throw an error because UIPlugin doesn't include alertmanager, thanos, perses, or incidents
482-
pluginInfo, error := getPluginInfo(pluginMalformed, features, clusterVersion, acmVersion)
465+
pluginInfo, error := getPluginInfo(pluginMalformed, features, clusterVersion)
483466
assert.Assert(t, pluginInfo == nil)
484467
assert.Assert(t, error != nil)
485468
})

pkg/controllers/uiplugin/plugin_info_builder.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ var pluginTypeToConsoleName = map[uiv1alpha1.UIPluginType]string{
4040
uiv1alpha1.TypeLogging: "logging-view-plugin",
4141
}
4242

43-
func PluginInfoBuilder(ctx context.Context, k client.Client, plugin *uiv1alpha1.UIPlugin, pluginConf UIPluginsConfiguration, compatibilityInfo CompatibilityEntry, acmVersion string, clusterVersion string) (*UIPluginInfo, error) {
43+
func PluginInfoBuilder(ctx context.Context, k client.Client, plugin *uiv1alpha1.UIPlugin, pluginConf UIPluginsConfiguration, compatibilityInfo CompatibilityEntry, clusterVersion string) (*UIPluginInfo, error) {
4444
image := pluginConf.Images[compatibilityInfo.ImageKey]
4545
if image == "" {
4646
return nil, fmt.Errorf("no image provided for plugin type %s with key %s", plugin.Spec.Type, compatibilityInfo.ImageKey)
@@ -160,7 +160,7 @@ func PluginInfoBuilder(ctx context.Context, k client.Client, plugin *uiv1alpha1.
160160
return createLoggingPluginInfo(plugin, namespace, plugin.Name, image, compatibilityInfo.Features)
161161

162162
case uiv1alpha1.TypeMonitoring:
163-
return createMonitoringPluginInfo(plugin, namespace, plugin.Name, image, compatibilityInfo.Features, acmVersion, clusterVersion)
163+
return createMonitoringPluginInfo(plugin, namespace, plugin.Name, image, compatibilityInfo.Features, clusterVersion)
164164
}
165165

166166
return nil, fmt.Errorf("plugin type not supported: %s", plugin.Spec.Type)

pkg/operator/scheme.go

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,6 @@ import (
66
operatorv1 "github.com/openshift/api/operator/v1"
77
monv1 "github.com/prometheus-operator/prometheus-operator/pkg/apis/monitoring/v1"
88
monitoringv1 "github.com/rhobs/obo-prometheus-operator/pkg/apis/monitoring/v1"
9-
multiclusterhubv1 "github.com/stolostron/multiclusterhub-operator/api/v1"
109
corev1 "k8s.io/api/core/v1"
1110
apiextensionsv1 "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1"
1211
"k8s.io/apimachinery/pkg/runtime"
@@ -30,7 +29,6 @@ func NewScheme(cfg *OperatorConfiguration) *runtime.Scheme {
3029
utilruntime.Must(osv1.Install(scheme))
3130
utilruntime.Must(osv1alpha1.Install(scheme))
3231
utilruntime.Must(operatorv1.Install(scheme))
33-
utilruntime.Must(multiclusterhubv1.AddToScheme(scheme))
3432
utilruntime.Must(corev1.AddToScheme(scheme))
3533
utilruntime.Must(monv1.AddToScheme(scheme))
3634
}

0 commit comments

Comments
 (0)