From 777676721a1da92db7ce74e52c31120935593ae5 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Matej=20Va=C5=A1ek?= Date: Thu, 18 Jul 2024 19:23:41 +0200 Subject: [PATCH] Fix PaC detection for Red Hat's Sandbox cluster MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit The sandbox cluster installs PaC cm into tekton-pipelines NS. Signed-off-by: Matej VaĊĦek --- pkg/pipelines/tekton/pac/pac.go | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/pkg/pipelines/tekton/pac/pac.go b/pkg/pipelines/tekton/pac/pac.go index 69b38f380..97d7b06a1 100644 --- a/pkg/pipelines/tekton/pac/pac.go +++ b/pkg/pipelines/tekton/pac/pac.go @@ -44,7 +44,7 @@ func DetectPACInstallation(ctx context.Context) (bool, string, error) { installed = true // First search namespaces that usually contains PaC, this check may be done even by unprivileged user. - for _, suspectedNS := range []string{"pipelines-as-code", "openshift-pipelines"} { + for _, suspectedNS := range []string{"pipelines-as-code", "openshift-pipelines", "tekton-pipelines"} { _, e := clientK8s.CoreV1().ConfigMaps(suspectedNS).Get(ctx, infoConfigMap, metav1.GetOptions{}) if e == nil { return installed, suspectedNS, nil