{
    "apiVersion": "v1",
    "items": [
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-04T13:18:12Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "kyverno",
                    "generate.kyverno.io/policy-name": "init-ns-integration",
                    "generate.kyverno.io/policy-namespace": "",
                    "generate.kyverno.io/rule-name": "create-konflux-integration-runner-rolebinding",
                    "generate.kyverno.io/trigger-group": "",
                    "generate.kyverno.io/trigger-kind": "Namespace",
                    "generate.kyverno.io/trigger-namespace": "",
                    "generate.kyverno.io/trigger-uid": "15330f69-b2fd-497d-8ba4-295dfadcb62f",
                    "generate.kyverno.io/trigger-version": "v1"
                },
                "name": "konflux-integration-runner-rolebinding",
                "namespace": "build-e2e-pvmk",
                "resourceVersion": "9203",
                "uid": "73e11e73-0d41-4adc-bcdb-489b994de6c0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "konflux-integration-runner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "konflux-integration-runner",
                    "namespace": "build-e2e-pvmk"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-04T13:18:12Z",
                "name": "user2-konflux-admin",
                "namespace": "build-e2e-pvmk",
                "resourceVersion": "9208",
                "uid": "f87d5251-2602-4b98-8c49-c7b7cb60423b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "konflux-admin-user-actions"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "user2@konflux.dev"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{},\"name\":\"build-pipeline-config-read-only-binding\",\"namespace\":\"build-service\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"build-service-build-pipeline-config-read-only\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"system:authenticated\"}]}\n"
                },
                "creationTimestamp": "2026-05-04T13:09:15Z",
                "name": "build-pipeline-config-read-only-binding",
                "namespace": "build-service",
                "resourceVersion": "4543",
                "uid": "fe92a87f-805b-4ccb-a7d2-cfee6a94c7bd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "build-service-build-pipeline-config-read-only"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{},\"labels\":{\"app.kubernetes.io/managed-by\":\"kustomize\",\"app.kubernetes.io/name\":\"build-service\"},\"name\":\"build-service-leader-election-rolebinding\",\"namespace\":\"build-service\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"build-service-leader-election-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"build-service-controller-manager\",\"namespace\":\"build-service\"}]}\n"
                },
                "creationTimestamp": "2026-05-04T13:09:15Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "kustomize",
                    "app.kubernetes.io/name": "build-service"
                },
                "name": "build-service-leader-election-rolebinding",
                "namespace": "build-service",
                "resourceVersion": "4544",
                "uid": "ef99e55f-336d-49f4-b8b6-47b066057d3a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "build-service-leader-election-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "build-service-controller-manager",
                    "namespace": "build-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "helm.sh/hook": "post-install",
                    "helm.sh/hook-delete-policy": "before-hook-creation,hook-succeeded",
                    "helm.sh/hook-weight": "-5",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"helm.sh/hook\":\"post-install\",\"helm.sh/hook-delete-policy\":\"before-hook-creation,hook-succeeded\",\"helm.sh/hook-weight\":\"-5\"},\"labels\":{\"app\":\"startupapicheck\",\"app.kubernetes.io/component\":\"startupapicheck\",\"app.kubernetes.io/instance\":\"cert-manager\",\"app.kubernetes.io/managed-by\":\"Helm\",\"app.kubernetes.io/name\":\"startupapicheck\",\"app.kubernetes.io/version\":\"v1.19.4\",\"helm.sh/chart\":\"cert-manager-v1.19.4\"},\"name\":\"cert-manager-startupapicheck:create-cert\",\"namespace\":\"cert-manager\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"cert-manager-startupapicheck:create-cert\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"cert-manager-startupapicheck\",\"namespace\":\"cert-manager\"}]}\n"
                },
                "creationTimestamp": "2026-05-04T13:05:09Z",
                "labels": {
                    "app": "startupapicheck",
                    "app.kubernetes.io/component": "startupapicheck",
                    "app.kubernetes.io/instance": "cert-manager",
                    "app.kubernetes.io/managed-by": "Helm",
                    "app.kubernetes.io/name": "startupapicheck",
                    "app.kubernetes.io/version": "v1.19.4",
                    "helm.sh/chart": "cert-manager-v1.19.4"
                },
                "name": "cert-manager-startupapicheck:create-cert",
                "namespace": "cert-manager",
                "resourceVersion": "1040",
                "uid": "a49ef0da-8ce5-4dc8-96c4-ad2256f8d50b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "cert-manager-startupapicheck:create-cert"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cert-manager-startupapicheck",
                    "namespace": "cert-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{},\"labels\":{\"app\":\"cert-manager\",\"app.kubernetes.io/component\":\"controller\",\"app.kubernetes.io/instance\":\"cert-manager\",\"app.kubernetes.io/managed-by\":\"Helm\",\"app.kubernetes.io/name\":\"cert-manager\",\"app.kubernetes.io/version\":\"v1.19.4\",\"helm.sh/chart\":\"cert-manager-v1.19.4\"},\"name\":\"cert-manager-tokenrequest\",\"namespace\":\"cert-manager\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"cert-manager-tokenrequest\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"cert-manager\",\"namespace\":\"cert-manager\"}]}\n"
                },
                "creationTimestamp": "2026-05-04T13:05:09Z",
                "labels": {
                    "app": "cert-manager",
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/instance": "cert-manager",
                    "app.kubernetes.io/managed-by": "Helm",
                    "app.kubernetes.io/name": "cert-manager",
                    "app.kubernetes.io/version": "v1.19.4",
                    "helm.sh/chart": "cert-manager-v1.19.4"
                },
                "name": "cert-manager-tokenrequest",
                "namespace": "cert-manager",
                "resourceVersion": "1041",
                "uid": "d0efb5f6-cf7c-49dc-be89-ce5dd5ce57aa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "cert-manager-tokenrequest"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cert-manager",
                    "namespace": "cert-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{},\"labels\":{\"app\":\"webhook\",\"app.kubernetes.io/component\":\"webhook\",\"app.kubernetes.io/instance\":\"cert-manager\",\"app.kubernetes.io/managed-by\":\"Helm\",\"app.kubernetes.io/name\":\"webhook\",\"app.kubernetes.io/version\":\"v1.19.4\",\"helm.sh/chart\":\"cert-manager-v1.19.4\"},\"name\":\"cert-manager-webhook:dynamic-serving\",\"namespace\":\"cert-manager\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"cert-manager-webhook:dynamic-serving\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"cert-manager-webhook\",\"namespace\":\"cert-manager\"}]}\n"
                },
                "creationTimestamp": "2026-05-04T13:05:09Z",
                "labels": {
                    "app": "webhook",
                    "app.kubernetes.io/component": "webhook",
                    "app.kubernetes.io/instance": "cert-manager",
                    "app.kubernetes.io/managed-by": "Helm",
                    "app.kubernetes.io/name": "webhook",
                    "app.kubernetes.io/version": "v1.19.4",
                    "helm.sh/chart": "cert-manager-v1.19.4"
                },
                "name": "cert-manager-webhook:dynamic-serving",
                "namespace": "cert-manager",
                "resourceVersion": "1042",
                "uid": "39416e56-a83d-48e9-b6f4-965bc769db99"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "cert-manager-webhook:dynamic-serving"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cert-manager-webhook",
                    "namespace": "cert-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{},\"labels\":{\"app.kubernetes.io/instance\":\"trust-manager\",\"app.kubernetes.io/managed-by\":\"Helm\",\"app.kubernetes.io/name\":\"trust-manager\",\"app.kubernetes.io/version\":\"v0.21.0\",\"helm.sh/chart\":\"trust-manager-v0.21.0\"},\"name\":\"trust-manager\",\"namespace\":\"cert-manager\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"trust-manager\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"trust-manager\",\"namespace\":\"cert-manager\"}]}\n"
                },
                "creationTimestamp": "2026-05-04T13:05:26Z",
                "labels": {
                    "app.kubernetes.io/instance": "trust-manager",
                    "app.kubernetes.io/managed-by": "Helm",
                    "app.kubernetes.io/name": "trust-manager",
                    "app.kubernetes.io/version": "v0.21.0",
                    "helm.sh/chart": "trust-manager-v0.21.0"
                },
                "name": "trust-manager",
                "namespace": "cert-manager",
                "resourceVersion": "1182",
                "uid": "a2746272-2496-4a96-9896-b5d6dae03f97"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "trust-manager"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "trust-manager",
                    "namespace": "cert-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{},\"labels\":{\"app.kubernetes.io/instance\":\"trust-manager\",\"app.kubernetes.io/managed-by\":\"Helm\",\"app.kubernetes.io/name\":\"trust-manager\",\"app.kubernetes.io/version\":\"v0.21.0\",\"helm.sh/chart\":\"trust-manager-v0.21.0\"},\"name\":\"trust-manager:leaderelection\",\"namespace\":\"cert-manager\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"trust-manager:leaderelection\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"trust-manager\",\"namespace\":\"cert-manager\"}]}\n"
                },
                "creationTimestamp": "2026-05-04T13:05:26Z",
                "labels": {
                    "app.kubernetes.io/instance": "trust-manager",
                    "app.kubernetes.io/managed-by": "Helm",
                    "app.kubernetes.io/name": "trust-manager",
                    "app.kubernetes.io/version": "v0.21.0",
                    "helm.sh/chart": "trust-manager-v0.21.0"
                },
                "name": "trust-manager:leaderelection",
                "namespace": "cert-manager",
                "resourceVersion": "1183",
                "uid": "ba20bddb-5bee-4329-a7e0-81ac17c0f78d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "trust-manager:leaderelection"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "trust-manager",
                    "namespace": "cert-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{},\"name\":\"public-ec-cm\",\"namespace\":\"enterprise-contract-service\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"enterprisecontract-configmap-viewer-role\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"system:authenticated\"}]}\n"
                },
                "creationTimestamp": "2026-05-04T13:08:52Z",
                "name": "public-ec-cm",
                "namespace": "enterprise-contract-service",
                "resourceVersion": "4219",
                "uid": "e0c50f30-cff6-4ce9-8a6b-19fc4080a6f0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "enterprisecontract-configmap-viewer-role"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{},\"name\":\"public-ecp\",\"namespace\":\"enterprise-contract-service\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"enterprisecontractpolicy-viewer-role\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"system:authenticated\"}]}\n"
                },
                "creationTimestamp": "2026-05-04T13:08:52Z",
                "name": "public-ecp",
                "namespace": "enterprise-contract-service",
                "resourceVersion": "4226",
                "uid": "a8437df8-b17f-47fd-853f-98911cea04de"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "enterprisecontractpolicy-viewer-role"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{},\"labels\":{\"app.kubernetes.io/managed-by\":\"kustomize\",\"app.kubernetes.io/name\":\"image-controller\"},\"name\":\"image-controller-leader-election-rolebinding\",\"namespace\":\"image-controller\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"image-controller-leader-election-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"image-controller-controller-manager\",\"namespace\":\"image-controller\"}]}\n"
                },
                "creationTimestamp": "2026-05-04T13:11:09Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "kustomize",
                    "app.kubernetes.io/name": "image-controller"
                },
                "name": "image-controller-leader-election-rolebinding",
                "namespace": "image-controller",
                "resourceVersion": "5737",
                "uid": "303868fb-10e0-4808-9846-4ec5e6fc9a9c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "image-controller-leader-election-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "image-controller-controller-manager",
                    "namespace": "image-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{},\"name\":\"integration-service-leader-election-rolebinding\",\"namespace\":\"integration-service\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"integration-service-leader-election-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"integration-service-controller-manager\",\"namespace\":\"integration-service\"}]}\n"
                },
                "creationTimestamp": "2026-05-04T13:09:26Z",
                "name": "integration-service-leader-election-rolebinding",
                "namespace": "integration-service",
                "resourceVersion": "4684",
                "uid": "03e6933d-8828-4069-a739-846d4de8008d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "integration-service-leader-election-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "integration-service-controller-manager",
                    "namespace": "integration-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{},\"name\":\"konflux-public-info-view-rb\",\"namespace\":\"konflux-info\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"konflux-public-info-view-role\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"system:authenticated\"}]}\n"
                },
                "creationTimestamp": "2026-05-04T13:08:36Z",
                "name": "konflux-public-info-view-rb",
                "namespace": "konflux-info",
                "resourceVersion": "4006",
                "uid": "653cf026-0f6b-47d4-aa72-c80921a5bfdd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "konflux-public-info-view-role"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-04T13:01:14Z",
                "name": "kubeadm:bootstrap-signer-clusterinfo",
                "namespace": "kube-public",
                "resourceVersion": "220",
                "uid": "4c3c26ed-d92c-4d6c-8cfd-e1b5d4957698"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "kubeadm:bootstrap-signer-clusterinfo"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:anonymous"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-04T13:01:13Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:bootstrap-signer",
                "namespace": "kube-public",
                "resourceVersion": "196",
                "uid": "bb0f024e-98e7-4301-924b-244b6f6f0047"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "system:controller:bootstrap-signer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "bootstrap-signer",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{},\"labels\":{\"app\":\"cainjector\",\"app.kubernetes.io/component\":\"cainjector\",\"app.kubernetes.io/instance\":\"cert-manager\",\"app.kubernetes.io/managed-by\":\"Helm\",\"app.kubernetes.io/name\":\"cainjector\",\"app.kubernetes.io/version\":\"v1.19.4\",\"helm.sh/chart\":\"cert-manager-v1.19.4\"},\"name\":\"cert-manager-cainjector:leaderelection\",\"namespace\":\"kube-system\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"cert-manager-cainjector:leaderelection\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"cert-manager-cainjector\",\"namespace\":\"cert-manager\"}]}\n"
                },
                "creationTimestamp": "2026-05-04T13:05:09Z",
                "labels": {
                    "app": "cainjector",
                    "app.kubernetes.io/component": "cainjector",
                    "app.kubernetes.io/instance": "cert-manager",
                    "app.kubernetes.io/managed-by": "Helm",
                    "app.kubernetes.io/name": "cainjector",
                    "app.kubernetes.io/version": "v1.19.4",
                    "helm.sh/chart": "cert-manager-v1.19.4"
                },
                "name": "cert-manager-cainjector:leaderelection",
                "namespace": "kube-system",
                "resourceVersion": "1044",
                "uid": "704d323a-d701-4aed-b5ad-ccde34f5d2ff"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "cert-manager-cainjector:leaderelection"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cert-manager-cainjector",
                    "namespace": "cert-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{},\"labels\":{\"app\":\"cert-manager\",\"app.kubernetes.io/component\":\"controller\",\"app.kubernetes.io/instance\":\"cert-manager\",\"app.kubernetes.io/managed-by\":\"Helm\",\"app.kubernetes.io/name\":\"cert-manager\",\"app.kubernetes.io/version\":\"v1.19.4\",\"helm.sh/chart\":\"cert-manager-v1.19.4\"},\"name\":\"cert-manager:leaderelection\",\"namespace\":\"kube-system\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"cert-manager:leaderelection\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"cert-manager\",\"namespace\":\"cert-manager\"}]}\n"
                },
                "creationTimestamp": "2026-05-04T13:05:09Z",
                "labels": {
                    "app": "cert-manager",
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/instance": "cert-manager",
                    "app.kubernetes.io/managed-by": "Helm",
                    "app.kubernetes.io/name": "cert-manager",
                    "app.kubernetes.io/version": "v1.19.4",
                    "helm.sh/chart": "cert-manager-v1.19.4"
                },
                "name": "cert-manager:leaderelection",
                "namespace": "kube-system",
                "resourceVersion": "1045",
                "uid": "09cec998-a5ba-41ce-b47e-0116e9ec9e9a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "cert-manager:leaderelection"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cert-manager",
                    "namespace": "cert-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-04T13:01:15Z",
                "name": "kube-proxy",
                "namespace": "kube-system",
                "resourceVersion": "253",
                "uid": "be3ea637-d236-4e53-bf70-bb6d27f179ce"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "kube-proxy"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:bootstrappers:kubeadm:default-node-token"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-04T13:01:13Z",
                "name": "kubeadm:kubelet-config",
                "namespace": "kube-system",
                "resourceVersion": "209",
                "uid": "9461ecdb-30da-4387-9494-2a51c6363b6a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "kubeadm:kubelet-config"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:nodes"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:bootstrappers:kubeadm:default-node-token"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-04T13:01:13Z",
                "name": "kubeadm:nodes-kubeadm-config",
                "namespace": "kube-system",
                "resourceVersion": "206",
                "uid": "6a193160-a412-4039-ba8c-076ea2de3a6b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "kubeadm:nodes-kubeadm-config"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:bootstrappers:kubeadm:default-node-token"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:nodes"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{},\"labels\":{\"k8s-app\":\"metrics-server\"},\"name\":\"metrics-server-auth-reader\",\"namespace\":\"kube-system\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"extension-apiserver-authentication-reader\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"metrics-server\",\"namespace\":\"kube-system\"}]}\n"
                },
                "creationTimestamp": "2026-05-04T13:01:45Z",
                "labels": {
                    "k8s-app": "metrics-server"
                },
                "name": "metrics-server-auth-reader",
                "namespace": "kube-system",
                "resourceVersion": "525",
                "uid": "4d38ee63-1e31-42cf-b963-e415ab9e42a6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "extension-apiserver-authentication-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "metrics-server",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-04T13:01:13Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system::extension-apiserver-authentication-reader",
                "namespace": "kube-system",
                "resourceVersion": "189",
                "uid": "5204ea6b-cfa0-49ee-8dce-74ab203aafa4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "extension-apiserver-authentication-reader"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:kube-controller-manager"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:kube-scheduler"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-04T13:01:13Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system::leader-locking-kube-controller-manager",
                "namespace": "kube-system",
                "resourceVersion": "190",
                "uid": "25800591-6b08-4e50-bbcb-2ec4c2fa4b78"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "system::leader-locking-kube-controller-manager"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:kube-controller-manager"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "kube-controller-manager",
                    "namespace": "kube-system"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "leader-election-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-04T13:01:13Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system::leader-locking-kube-scheduler",
                "namespace": "kube-system",
                "resourceVersion": "191",
                "uid": "39813af9-2351-4174-8df1-5bc0355495d0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "system::leader-locking-kube-scheduler"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:kube-scheduler"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "kube-scheduler",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-04T13:01:13Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:bootstrap-signer",
                "namespace": "kube-system",
                "resourceVersion": "192",
                "uid": "1208c1b5-297d-4c77-be80-276e54b348bc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "system:controller:bootstrap-signer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "bootstrap-signer",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-04T13:01:13Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:cloud-provider",
                "namespace": "kube-system",
                "resourceVersion": "194",
                "uid": "2876748e-41f0-44e0-b666-d9be668c2dc2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "system:controller:cloud-provider"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cloud-provider",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-04T13:01:13Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:token-cleaner",
                "namespace": "kube-system",
                "resourceVersion": "195",
                "uid": "f9e3dc80-9231-44e2-9a29-df4d6a05bc75"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "system:controller:token-cleaner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "token-cleaner",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-04T13:08:20Z",
                "labels": {
                    "app.kubernetes.io/component": "admission-controller",
                    "app.kubernetes.io/instance": "kyverno",
                    "app.kubernetes.io/part-of": "kyverno",
                    "app.kubernetes.io/version": "v1.17.1"
                },
                "name": "kyverno:admission-controller",
                "namespace": "kyverno",
                "resourceVersion": "3757",
                "uid": "bf4f284d-f472-461b-a285-01c72e660928"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "kyverno:admission-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kyverno-admission-controller",
                    "namespace": "kyverno"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-04T13:08:20Z",
                "labels": {
                    "app.kubernetes.io/component": "background-controller",
                    "app.kubernetes.io/instance": "kyverno",
                    "app.kubernetes.io/part-of": "kyverno",
                    "app.kubernetes.io/version": "v1.17.1"
                },
                "name": "kyverno:background-controller",
                "namespace": "kyverno",
                "resourceVersion": "3758",
                "uid": "50fdb5f6-e7f8-4315-908b-39989210d5a3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "kyverno:background-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kyverno-background-controller",
                    "namespace": "kyverno"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-04T13:08:20Z",
                "labels": {
                    "app.kubernetes.io/component": "cleanup-controller",
                    "app.kubernetes.io/instance": "kyverno",
                    "app.kubernetes.io/part-of": "kyverno",
                    "app.kubernetes.io/version": "v1.17.1"
                },
                "name": "kyverno:cleanup-controller",
                "namespace": "kyverno",
                "resourceVersion": "3759",
                "uid": "a4337094-136e-4ff0-bd0c-845b870ffa2a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "kyverno:cleanup-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kyverno-cleanup-controller",
                    "namespace": "kyverno"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-04T13:08:20Z",
                "labels": {
                    "app.kubernetes.io/component": "reports-controller",
                    "app.kubernetes.io/instance": "kyverno",
                    "app.kubernetes.io/part-of": "kyverno",
                    "app.kubernetes.io/version": "v1.17.1"
                },
                "name": "kyverno:reports-controller",
                "namespace": "kyverno",
                "resourceVersion": "3765",
                "uid": "8db94aec-8911-4a44-9d19-bc7f4b941800"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "kyverno:reports-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kyverno-reports-controller",
                    "namespace": "kyverno"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{},\"name\":\"local-path-provisioner-bind\",\"namespace\":\"local-path-storage\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"local-path-provisioner-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"local-path-provisioner-service-account\",\"namespace\":\"local-path-storage\"}]}\n"
                },
                "creationTimestamp": "2026-05-04T13:01:17Z",
                "name": "local-path-provisioner-bind",
                "namespace": "local-path-storage",
                "resourceVersion": "286",
                "uid": "c5ebb111-b366-483a-b98b-a9392f5be93d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "local-path-provisioner-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "local-path-provisioner-service-account",
                    "namespace": "local-path-storage"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/sync-wave": "0",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/sync-wave\":\"0\"},\"name\":\"chains-secret-admin\",\"namespace\":\"openshift-pipelines\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"chains-secret-admin\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"chains-secrets-admin\",\"namespace\":\"tekton-pipelines\"}]}\n"
                },
                "creationTimestamp": "2026-05-04T13:07:57Z",
                "name": "chains-secret-admin",
                "namespace": "openshift-pipelines",
                "resourceVersion": "3248",
                "uid": "2322f3e5-4b95-450a-91dd-71286362dc42"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "chains-secret-admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "chains-secrets-admin",
                    "namespace": "tekton-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/sync-wave": "0",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/sync-wave\":\"0\"},\"name\":\"tekton-chains-public-key-viewer\",\"namespace\":\"openshift-pipelines\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"tekton-chains-public-key-viewer\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"system:authenticated\"}]}\n"
                },
                "creationTimestamp": "2026-05-04T13:07:57Z",
                "name": "tekton-chains-public-key-viewer",
                "namespace": "openshift-pipelines",
                "resourceVersion": "3249",
                "uid": "6b93cb0c-e96c-4405-8961-95e69ecafb43"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-chains-public-key-viewer"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{},\"labels\":{\"app.kubernetes.io/instance\":\"default\",\"app.kubernetes.io/part-of\":\"pipelines-as-code\",\"app.kubernetes.io/version\":\"v0.42.0\"},\"name\":\"pipelines-as-code-controller-binding\",\"namespace\":\"pipelines-as-code\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"pipelines-as-code-controller-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"pipelines-as-code-controller\"}]}\n"
                },
                "creationTimestamp": "2026-05-04T13:07:52Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "pipelines-as-code",
                    "app.kubernetes.io/version": "v0.42.0"
                },
                "name": "pipelines-as-code-controller-binding",
                "namespace": "pipelines-as-code",
                "resourceVersion": "3030",
                "uid": "98b459b9-ae58-4b30-9e83-c59fae041ef2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "pipelines-as-code-controller-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipelines-as-code-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{},\"labels\":{\"app.kubernetes.io/instance\":\"default\",\"app.kubernetes.io/part-of\":\"pipelines-as-code\",\"app.kubernetes.io/version\":\"v0.42.0\"},\"name\":\"pipelines-as-code-info\",\"namespace\":\"pipelines-as-code\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"pipelines-as-code-info\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"system:authenticated\"}]}\n"
                },
                "creationTimestamp": "2026-05-04T13:07:52Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "pipelines-as-code",
                    "app.kubernetes.io/version": "v0.42.0"
                },
                "name": "pipelines-as-code-info",
                "namespace": "pipelines-as-code",
                "resourceVersion": "3033",
                "uid": "73dd6e39-661e-473e-8bdb-e4ceb0cd9461"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "pipelines-as-code-info"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{},\"labels\":{\"app.kubernetes.io/instance\":\"default\",\"app.kubernetes.io/part-of\":\"pipelines-as-code\",\"app.kubernetes.io/version\":\"v0.42.0\"},\"name\":\"pipelines-as-code-watcher-binding\",\"namespace\":\"pipelines-as-code\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"pipelines-as-code-watcher-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"pipelines-as-code-watcher\"}]}\n"
                },
                "creationTimestamp": "2026-05-04T13:07:52Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "pipelines-as-code",
                    "app.kubernetes.io/version": "v0.42.0"
                },
                "name": "pipelines-as-code-watcher-binding",
                "namespace": "pipelines-as-code",
                "resourceVersion": "3054",
                "uid": "5042868c-bc2b-45a2-9587-a47fe2e90441"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "pipelines-as-code-watcher-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipelines-as-code-watcher"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{},\"labels\":{\"app.kubernetes.io/instance\":\"default\",\"app.kubernetes.io/part-of\":\"pipelines-as-code\",\"app.kubernetes.io/version\":\"v0.42.0\"},\"name\":\"pipelines-as-code-webhook-binding\",\"namespace\":\"pipelines-as-code\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"pipelines-as-code-webhook-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"pipelines-as-code-webhook\"}]}\n"
                },
                "creationTimestamp": "2026-05-04T13:07:52Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "pipelines-as-code",
                    "app.kubernetes.io/version": "v0.42.0"
                },
                "name": "pipelines-as-code-webhook-binding",
                "namespace": "pipelines-as-code",
                "resourceVersion": "3073",
                "uid": "8d574b77-fcc7-4dac-a333-99022bff31b0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "pipelines-as-code-webhook-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipelines-as-code-webhook"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-04T13:09:04Z",
                "name": "release-service-leader-election-rolebinding",
                "namespace": "release-service",
                "resourceVersion": "4380",
                "uid": "ef71c5cf-cdf1-4eaf-bd7c-223d8470be5f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "release-service-leader-election-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "release-service-controller-manager",
                    "namespace": "release-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-04T13:09:04Z",
                "name": "releaseserviceconfigs-rolebinding",
                "namespace": "release-service",
                "resourceVersion": "4381",
                "uid": "15456639-7d68-4e69-930a-e00afa831197"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "releaseserviceconfig-role"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{},\"labels\":{\"app.kubernetes.io/instance\":\"default\"},\"name\":\"tekton-operator-info\",\"namespace\":\"tekton-operator\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"tekton-operator-info\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"system:authenticated\"}]}\n"
                },
                "creationTimestamp": "2026-05-04T13:05:47Z",
                "labels": {
                    "app.kubernetes.io/instance": "default"
                },
                "name": "tekton-operator-info",
                "namespace": "tekton-operator",
                "resourceVersion": "1389",
                "uid": "ad8bc71c-4a2d-446c-96e3-a1fd963ffeb3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-operator-info"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/sync-wave": "0",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/sync-wave\":\"0\"},\"name\":\"chains-secret-admin\",\"namespace\":\"tekton-pipelines\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"chains-secret-admin\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"chains-secrets-admin\",\"namespace\":\"tekton-pipelines\"}]}\n"
                },
                "creationTimestamp": "2026-05-04T13:07:57Z",
                "name": "chains-secret-admin",
                "namespace": "tekton-pipelines",
                "resourceVersion": "3250",
                "uid": "d5f1e654-be5d-453e-87f7-a8b163af9d19"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "chains-secret-admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "chains-secrets-admin",
                    "namespace": "tekton-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "7e408bd2a05716bedff2c1a6a422be77117b5d7cad5920705da145ea446ff146"
                },
                "creationTimestamp": "2026-05-04T13:07:00Z",
                "labels": {
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-chains"
                },
                "name": "tekton-chains-controller-leaderelection",
                "namespace": "tekton-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "chain-jtqwh",
                        "uid": "f749b8fc-da68-45d6-b7f7-fb25b4bb9d61"
                    }
                ],
                "resourceVersion": "2343",
                "uid": "db2ba74e-c842-410e-b758-62df7b638b86"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-chains-leader-election"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-chains-controller",
                    "namespace": "tekton-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "e2df9477e8b822a23fedab1974d781d3b0149674e900311622ed7bf6af4b1ff4"
                },
                "creationTimestamp": "2026-05-04T13:07:00Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-chains"
                },
                "name": "tekton-chains-info",
                "namespace": "tekton-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "chain-jtqwh",
                        "uid": "f749b8fc-da68-45d6-b7f7-fb25b4bb9d61"
                    }
                ],
                "resourceVersion": "2345",
                "uid": "6816b831-4e2b-419a-b0a4-b594e108f15c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-chains-info"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/sync-wave": "0",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/sync-wave\":\"0\"},\"name\":\"tekton-chains-public-key-viewer\",\"namespace\":\"tekton-pipelines\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"tekton-chains-public-key-viewer\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"system:authenticated\"}]}\n"
                },
                "creationTimestamp": "2026-05-04T13:07:58Z",
                "name": "tekton-chains-public-key-viewer",
                "namespace": "tekton-pipelines",
                "resourceVersion": "3251",
                "uid": "275c35ca-512e-4927-a01b-c3b1c84e6958"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-chains-public-key-viewer"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "fae31a890ace621b9acbfa8d0389a79b7e63db61cac6609fde6c3f3a0378e1c7"
                },
                "creationTimestamp": "2026-05-04T13:06:16Z",
                "labels": {
                    "app.kubernetes.io/component": "events",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines"
                },
                "name": "tekton-events-controller-leaderelection",
                "namespace": "tekton-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-2qxzb",
                        "uid": "2aa7210b-628f-4753-9398-4bff0fb591ec"
                    }
                ],
                "resourceVersion": "1685",
                "uid": "55c55c03-4393-4f4e-b7ca-c51de00e9fee"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-pipelines-leader-election"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-events-controller",
                    "namespace": "tekton-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "7f29f20f11d599b7c648ce6ff9aadee9aebf1369a32c21c935b2675b46e44a53"
                },
                "creationTimestamp": "2026-05-04T13:06:16Z",
                "name": "tekton-operators-proxy-webhook-admin",
                "namespace": "tekton-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-2qxzb",
                        "uid": "2aa7210b-628f-4753-9398-4bff0fb591ec"
                    }
                ],
                "resourceVersion": "1696",
                "uid": "c0c059b0-abe1-497c-8806-2f3218596c6c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-operators-proxy-admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-operators-proxy-webhook",
                    "namespace": "tekton-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "e2c645024299596515ff8d5b443f69df3d361d12c8ca14e9941e879bf6e14d05"
                },
                "creationTimestamp": "2026-05-04T13:06:14Z",
                "labels": {
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines"
                },
                "name": "tekton-pipelines-controller",
                "namespace": "tekton-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-2qxzb",
                        "uid": "2aa7210b-628f-4753-9398-4bff0fb591ec"
                    }
                ],
                "resourceVersion": "1667",
                "uid": "3ead58d8-9d08-46b4-bd41-7fab798d72db"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-pipelines-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-pipelines-controller",
                    "namespace": "tekton-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "2386f2163b4a7e48299a43541e4f4ef42145c33df3ec6c374dff5256ff2670c2"
                },
                "creationTimestamp": "2026-05-04T13:06:15Z",
                "labels": {
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines"
                },
                "name": "tekton-pipelines-controller-leaderelection",
                "namespace": "tekton-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-2qxzb",
                        "uid": "2aa7210b-628f-4753-9398-4bff0fb591ec"
                    }
                ],
                "resourceVersion": "1675",
                "uid": "3078d562-23ad-43c3-b23a-e2c40142df42"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-pipelines-leader-election"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-pipelines-controller",
                    "namespace": "tekton-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "4cbc1bd7fdc26bb012a8048fd48c4d1f42580e3c365d6731dadc04f84f072e34"
                },
                "creationTimestamp": "2026-05-04T13:06:15Z",
                "labels": {
                    "app.kubernetes.io/component": "events",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines"
                },
                "name": "tekton-pipelines-events-controller",
                "namespace": "tekton-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-2qxzb",
                        "uid": "2aa7210b-628f-4753-9398-4bff0fb591ec"
                    }
                ],
                "resourceVersion": "1681",
                "uid": "6a970422-dfc0-4308-93e9-8ab54858b307"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-pipelines-events-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-events-controller",
                    "namespace": "tekton-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "b0213839aded91f0cf6e0e06e0009015cb88019a2cd111db6a1e3b5e18715a37"
                },
                "creationTimestamp": "2026-05-04T13:06:15Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines"
                },
                "name": "tekton-pipelines-info",
                "namespace": "tekton-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-2qxzb",
                        "uid": "2aa7210b-628f-4753-9398-4bff0fb591ec"
                    }
                ],
                "resourceVersion": "1680",
                "uid": "42d93863-8ec0-42ad-a736-83ffd3114474"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-pipelines-info"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "d44d9525e20942fcfaaacfe5aaa26e87c7f680ecbf1683829e137b7ccd13046d"
                },
                "creationTimestamp": "2026-05-04T13:06:16Z",
                "labels": {
                    "app.kubernetes.io/component": "resolvers",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines"
                },
                "name": "tekton-pipelines-resolvers-namespace-rbac",
                "namespace": "tekton-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-2qxzb",
                        "uid": "2aa7210b-628f-4753-9398-4bff0fb591ec"
                    }
                ],
                "resourceVersion": "1692",
                "uid": "d45c68f3-071c-4543-87bd-9b10527b9ecb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-pipelines-resolvers-namespace-rbac"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-pipelines-resolvers",
                    "namespace": "tekton-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "7610a76086fb4d5b3b0dd5724ec4b62867419a4e585b942819048aa70777463a"
                },
                "creationTimestamp": "2026-05-04T13:06:15Z",
                "labels": {
                    "app.kubernetes.io/component": "webhook",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines"
                },
                "name": "tekton-pipelines-webhook",
                "namespace": "tekton-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-2qxzb",
                        "uid": "2aa7210b-628f-4753-9398-4bff0fb591ec"
                    }
                ],
                "resourceVersion": "1672",
                "uid": "249ed862-f7c6-4e55-aaea-663d45ee5437"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-pipelines-webhook"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-pipelines-webhook",
                    "namespace": "tekton-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "2cecc80b44bb7c85027ebbaea636493eb5b358b682445e9f258fe20a9af8fc4e"
                },
                "creationTimestamp": "2026-05-04T13:06:15Z",
                "labels": {
                    "app.kubernetes.io/component": "webhook",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines"
                },
                "name": "tekton-pipelines-webhook-leaderelection",
                "namespace": "tekton-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-2qxzb",
                        "uid": "2aa7210b-628f-4753-9398-4bff0fb591ec"
                    }
                ],
                "resourceVersion": "1678",
                "uid": "285bef9a-1fc9-44fa-8aed-19d1ea023945"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-pipelines-leader-election"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-pipelines-webhook",
                    "namespace": "tekton-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "d53db9080206024822e2e7c04102bfd7cbc065288563a155812c1e47a3957bcb"
                },
                "creationTimestamp": "2026-05-04T13:07:06Z",
                "labels": {
                    "app.kubernetes.io/name": "tekton-results-info",
                    "app.kubernetes.io/part-of": "tekton-results",
                    "app.kubernetes.io/version": "v0.18.0"
                },
                "name": "tekton-results-info",
                "namespace": "tekton-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "result-hrt9t",
                        "uid": "32edd1a3-9190-4276-aa3a-6c37bcabc1d2"
                    }
                ],
                "resourceVersion": "2464",
                "uid": "b959b6e7-01e3-4773-9a37-4a21e3d245d6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-results-info"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "38410dbf7b70f94554981f048365c51704f3e8cf6fa555d74877bd20c70ccea6"
                },
                "creationTimestamp": "2026-05-04T13:06:40Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-triggers"
                },
                "name": "tekton-triggers-core-interceptors",
                "namespace": "tekton-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "trigger-main-static-qwvns",
                        "uid": "2c8e2108-86a0-44ad-98ac-c81c2286e209"
                    }
                ],
                "resourceVersion": "2063",
                "uid": "cafa506f-7143-4b77-9d7a-40957d2cd4ed"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-triggers-core-interceptors"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-triggers-core-interceptors",
                    "namespace": "tekton-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "d6d109028812c451b90f1db4a2a2065305c662df38a451fc385a66d55f113b2a"
                },
                "creationTimestamp": "2026-05-04T13:06:40Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-triggers"
                },
                "name": "tekton-triggers-info",
                "namespace": "tekton-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "trigger-main-static-qwvns",
                        "uid": "2c8e2108-86a0-44ad-98ac-c81c2286e209"
                    }
                ],
                "resourceVersion": "2066",
                "uid": "cfd2951e-58ee-4f33-bd86-223f14d08512"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-triggers-info"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "602b56ffcd6640bfa8afd8a71ebde359c21bbc5915e3b28fd537ab9bf3f8abd7"
                },
                "creationTimestamp": "2026-05-04T13:06:40Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-triggers"
                },
                "name": "tekton-triggers-webhook-admin",
                "namespace": "tekton-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "trigger-main-static-qwvns",
                        "uid": "2c8e2108-86a0-44ad-98ac-c81c2286e209"
                    }
                ],
                "resourceVersion": "2062",
                "uid": "e42ca98f-9f98-4d49-833d-21a25195536f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-triggers-admin-webhook"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-triggers-webhook",
                    "namespace": "tekton-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-04T13:11:34Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "kyverno",
                    "generate.kyverno.io/policy-name": "init-ns-integration",
                    "generate.kyverno.io/policy-namespace": "",
                    "generate.kyverno.io/rule-name": "create-konflux-integration-runner-rolebinding",
                    "generate.kyverno.io/trigger-group": "",
                    "generate.kyverno.io/trigger-kind": "Namespace",
                    "generate.kyverno.io/trigger-namespace": "",
                    "generate.kyverno.io/trigger-uid": "aa6a58ca-9ea3-4ef7-8ce5-09aa01b578f7",
                    "generate.kyverno.io/trigger-version": "v1"
                },
                "name": "konflux-integration-runner-rolebinding",
                "namespace": "user-ns1",
                "resourceVersion": "6007",
                "uid": "e84f1f4a-0c34-4392-8447-67709443bbc8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "konflux-integration-runner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "konflux-integration-runner",
                    "namespace": "user-ns1"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-04T13:11:37Z",
                "name": "konflux-pipelines-runner-bindings",
                "namespace": "user-ns1",
                "resourceVersion": "6057",
                "uid": "dda30c75-733c-4cda-98af-c543290e847a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "appstudio-pipelines-runner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "build-pipeline-sample-component",
                    "namespace": "user-ns1"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-04T13:11:35Z",
                "name": "release-pipeline-resource-role-binding",
                "namespace": "user-ns1",
                "resourceVersion": "6026",
                "uid": "c0c37ba9-2885-41ab-afd6-59500f6b5a2b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "release-pipeline-resource-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "release-pipeline",
                    "namespace": "user-ns1"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-04T13:11:35Z",
                "name": "user1-konflux-admin",
                "namespace": "user-ns1",
                "resourceVersion": "6027",
                "uid": "f6c8d7f1-f673-4b0e-a115-e004a18309d8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "konflux-admin-user-actions"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "user1@konflux.dev"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-04T13:11:35Z",
                "name": "user2-konflux-admin",
                "namespace": "user-ns1",
                "resourceVersion": "6028",
                "uid": "a456ee4b-8c42-4e79-877b-286dd3c98528"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "konflux-admin-user-actions"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "user2@konflux.dev"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-04T13:11:34Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "kyverno",
                    "generate.kyverno.io/policy-name": "init-ns-integration",
                    "generate.kyverno.io/policy-namespace": "",
                    "generate.kyverno.io/rule-name": "create-konflux-integration-runner-rolebinding",
                    "generate.kyverno.io/trigger-group": "",
                    "generate.kyverno.io/trigger-kind": "Namespace",
                    "generate.kyverno.io/trigger-namespace": "",
                    "generate.kyverno.io/trigger-uid": "b977b49c-72f1-4ad4-9a1e-afdcb9f9ca55",
                    "generate.kyverno.io/trigger-version": "v1"
                },
                "name": "konflux-integration-runner-rolebinding",
                "namespace": "user-ns2",
                "resourceVersion": "6019",
                "uid": "f205596e-e9ec-4590-bbbf-2711c4f2eb45"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "konflux-integration-runner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "konflux-integration-runner",
                    "namespace": "user-ns2"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-04T13:11:35Z",
                "name": "ns2-pod-viewer-job-creator-binding",
                "namespace": "user-ns2",
                "resourceVersion": "6029",
                "uid": "00a63794-d4f8-4109-97a6-47a6708d9010"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "ns2-pod-viewer-job-creator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "konflux-integration-runner",
                    "namespace": "user-ns2"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-04T13:11:35Z",
                "name": "release-pipeline-resource-role-binding",
                "namespace": "user-ns2",
                "resourceVersion": "6031",
                "uid": "6fced188-f67e-4259-9ec4-0acc71901cff"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "release-pipeline-resource-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "release-pipeline",
                    "namespace": "user-ns2"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-04T13:11:35Z",
                "name": "user1-konflux-admin",
                "namespace": "user-ns2",
                "resourceVersion": "6032",
                "uid": "633c7c3b-56c5-4982-8f04-030df6a22d0f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "konflux-admin-user-actions"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "user1@konflux.dev"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-04T13:11:35Z",
                "name": "user2-konflux-admin",
                "namespace": "user-ns2",
                "resourceVersion": "6033",
                "uid": "364bd1f8-00c4-46a1-ba66-345c661007d0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "konflux-admin-user-actions"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "user2@konflux.dev"
                }
            ]
        }
    ],
    "kind": "List",
    "metadata": {
        "resourceVersion": ""
    }
}
