Fix PaC detection for Red Hat's Sandbox cluster (#2429)

The sandbox cluster installs PaC cm into tekton-pipelines NS.

Signed-off-by: Matej Vašek <matejvasek@gmail.com>
This commit is contained in:
Matej Vašek 2024-07-19 11:37:20 +02:00 committed by GitHub
parent c093c38239
commit aed23cf9a1
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
1 changed files with 1 additions and 1 deletions

View File

@ -44,7 +44,7 @@ func DetectPACInstallation(ctx context.Context) (bool, string, error) {
installed = true
// First search namespaces that usually contains PaC, this check may be done even by unprivileged user.
for _, suspectedNS := range []string{"pipelines-as-code", "openshift-pipelines"} {
for _, suspectedNS := range []string{"pipelines-as-code", "openshift-pipelines", "tekton-pipelines"} {
_, e := clientK8s.CoreV1().ConfigMaps(suspectedNS).Get(ctx, infoConfigMap, metav1.GetOptions{})
if e == nil {
return installed, suspectedNS, nil