{
    "apiVersion": "v1",
    "items": [
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-12T16:54:08Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "cluster-admin",
                "resourceVersion": "137",
                "uid": "821a8563-551d-41c5-ab0b-a48a054527c5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:masters"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T16:54:11Z",
                "name": "kindnet",
                "resourceVersion": "282",
                "uid": "43981193-83ac-4f2b-96a3-fda354c9c8fd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "kindnet"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kindnet",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T16:54:09Z",
                "name": "kubeadm:cluster-admins",
                "resourceVersion": "212",
                "uid": "920f9544-5259-4de6-b741-b51fbda7c9ba"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "kubeadm:cluster-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T16:54:09Z",
                "name": "kubeadm:get-nodes",
                "resourceVersion": "223",
                "uid": "395e047b-b3e0-46d3-ab64-404faa18db9f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "kubeadm:get-nodes"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:bootstrappers:kubeadm:default-node-token"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T16:54:09Z",
                "name": "kubeadm:kubelet-bootstrap",
                "resourceVersion": "224",
                "uid": "81278316-35c1-4471-b831-1c0b7c1ccfbd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:node-bootstrapper"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:bootstrappers:kubeadm:default-node-token"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T16:54:09Z",
                "name": "kubeadm:node-autoapprove-bootstrap",
                "resourceVersion": "225",
                "uid": "04b8542e-2254-4549-aa25-92b7cfd35b57"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:certificates.k8s.io:certificatesigningrequests:nodeclient"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:bootstrappers:kubeadm:default-node-token"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T16:54:09Z",
                "name": "kubeadm:node-autoapprove-certificate-rotation",
                "resourceVersion": "226",
                "uid": "24ff16ad-9d0c-492f-94fc-9cbc41b819d0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:certificates.k8s.io:certificatesigningrequests:selfnodeclient"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:nodes"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T16:54:10Z",
                "name": "kubeadm:node-proxier",
                "resourceVersion": "256",
                "uid": "8586a9c4-3ea0-4e7a-934f-94885cabd968"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:node-proxier"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kube-proxy",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{},\"name\":\"local-path-provisioner-bind\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"local-path-provisioner-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"local-path-provisioner-service-account\",\"namespace\":\"local-path-storage\"}]}\n"
                },
                "creationTimestamp": "2026-05-12T16:54:12Z",
                "name": "local-path-provisioner-bind",
                "resourceVersion": "293",
                "uid": "07f747c0-8a43-4b9e-a4d5-059fd8c3e2c5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "local-path-provisioner-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "local-path-provisioner-service-account",
                    "namespace": "local-path-storage"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-12T16:54:08Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:basic-user",
                "resourceVersion": "140",
                "uid": "9a28fcb3-97f6-4bb0-8c3b-19cfe898f6a4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:basic-user"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-12T16:54:08Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:attachdetach-controller",
                "resourceVersion": "149",
                "uid": "53ae2632-bb44-47dd-a354-9a25aa38eff9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:attachdetach-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "attachdetach-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-12T16:54:08Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:certificate-controller",
                "resourceVersion": "175",
                "uid": "80acc12d-2703-48e5-91a5-c3d91f510482"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:certificate-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "certificate-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-12T16:54:08Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:clusterrole-aggregation-controller",
                "resourceVersion": "150",
                "uid": "4bf5d113-cfef-41f9-b7dd-758e59a37df8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:clusterrole-aggregation-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "clusterrole-aggregation-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-12T16:54:08Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:cronjob-controller",
                "resourceVersion": "151",
                "uid": "2aeb6eda-cc7a-4e55-8876-41d6e742e59d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:cronjob-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cronjob-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-12T16:54:08Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:daemon-set-controller",
                "resourceVersion": "152",
                "uid": "86eaf7b5-b083-440b-9f30-1f7f809a0ab1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:daemon-set-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "daemon-set-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-12T16:54:08Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:deployment-controller",
                "resourceVersion": "153",
                "uid": "d04cf8d0-8568-4313-b773-0ff28738911b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:deployment-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployment-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-12T16:54:08Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:disruption-controller",
                "resourceVersion": "154",
                "uid": "549fbfad-9c20-4a8a-a854-1b60f4e49573"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:disruption-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "disruption-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-12T16:54:08Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:endpoint-controller",
                "resourceVersion": "155",
                "uid": "7f19dcf6-e71a-48d7-8fd0-3e399b4e5824"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:endpoint-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "endpoint-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-12T16:54:08Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:endpointslice-controller",
                "resourceVersion": "156",
                "uid": "65a27c4c-b556-4bae-82ee-c42b708af3cf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:endpointslice-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "endpointslice-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-12T16:54:08Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:endpointslicemirroring-controller",
                "resourceVersion": "157",
                "uid": "2bba7950-a18b-456e-909b-f54688a08fae"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:endpointslicemirroring-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "endpointslicemirroring-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-12T16:54:08Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:ephemeral-volume-controller",
                "resourceVersion": "159",
                "uid": "655f1b94-c581-45b8-a6e6-8ff59ad89019"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:ephemeral-volume-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "ephemeral-volume-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-12T16:54:08Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:expand-controller",
                "resourceVersion": "158",
                "uid": "8526c2c3-a6f1-429d-b1c5-175a8d1ca6b8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:expand-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "expand-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-12T16:54:08Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:generic-garbage-collector",
                "resourceVersion": "160",
                "uid": "d1bfaf3d-0ad8-4646-bd40-2b152f4bab80"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:generic-garbage-collector"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "generic-garbage-collector",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-12T16:54:08Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:horizontal-pod-autoscaler",
                "resourceVersion": "161",
                "uid": "e716c53b-0e97-489b-bd18-4d057bb6a308"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:horizontal-pod-autoscaler"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "horizontal-pod-autoscaler",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-12T16:54:08Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:job-controller",
                "resourceVersion": "162",
                "uid": "c7a38579-39b3-4f70-a37e-5c58a140d40f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:job-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "job-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-12T16:54:08Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:legacy-service-account-token-cleaner",
                "resourceVersion": "181",
                "uid": "d1262356-72fd-4e6d-a428-b53ea3728088"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:legacy-service-account-token-cleaner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "legacy-service-account-token-cleaner",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-12T16:54:08Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:namespace-controller",
                "resourceVersion": "163",
                "uid": "a849bb06-f1bf-4824-bc75-e807d0347d0d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:namespace-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "namespace-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-12T16:54:08Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:node-controller",
                "resourceVersion": "164",
                "uid": "1b848b91-3e53-411c-83c0-b5f1a227f6a0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:node-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "node-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-12T16:54:08Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:persistent-volume-binder",
                "resourceVersion": "165",
                "uid": "bf39ca35-320d-4ddd-876d-4cbae6c25fa0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:persistent-volume-binder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "persistent-volume-binder",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-12T16:54:08Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:pod-garbage-collector",
                "resourceVersion": "166",
                "uid": "cc6551b8-1219-4dea-a818-ee4b559bcf3b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:pod-garbage-collector"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pod-garbage-collector",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-12T16:54:08Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:pv-protection-controller",
                "resourceVersion": "177",
                "uid": "e5880c42-9543-4198-b8e0-ba5b7feb4aaa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:pv-protection-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pv-protection-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-12T16:54:08Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:pvc-protection-controller",
                "resourceVersion": "176",
                "uid": "f7538b92-1493-459d-bd0a-e081b6826c35"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:pvc-protection-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pvc-protection-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-12T16:54:08Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:replicaset-controller",
                "resourceVersion": "167",
                "uid": "4969f0a3-347a-455c-a11c-d83521dbe22e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:replicaset-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "replicaset-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-12T16:54:08Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:replication-controller",
                "resourceVersion": "168",
                "uid": "b91a99e1-4185-4502-b92e-3c7ac475c29b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:replication-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "replication-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-12T16:54:08Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:resourcequota-controller",
                "resourceVersion": "169",
                "uid": "0707ea6e-aa74-4899-a862-e55fb099be7c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:resourcequota-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "resourcequota-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-12T16:54:08Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:root-ca-cert-publisher",
                "resourceVersion": "179",
                "uid": "8d6a5aca-65cc-4ab2-8d8b-92e48aaa26db"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:root-ca-cert-publisher"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "root-ca-cert-publisher",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-12T16:54:08Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:route-controller",
                "resourceVersion": "170",
                "uid": "e160d30f-ad2f-4c1e-bb06-618ba088f5f9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:route-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "route-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-12T16:54:08Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:service-account-controller",
                "resourceVersion": "171",
                "uid": "6307ea40-1c77-4dd6-ab9c-91f583608727"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:service-account-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "service-account-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-12T16:54:08Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:service-controller",
                "resourceVersion": "172",
                "uid": "6f5b9d46-704a-47d2-933d-eda8a400644c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:service-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "service-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-12T16:54:08Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:statefulset-controller",
                "resourceVersion": "173",
                "uid": "c5004591-914f-4af1-bc3f-9a89927eac48"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:statefulset-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "statefulset-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-12T16:54:08Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:ttl-after-finished-controller",
                "resourceVersion": "178",
                "uid": "f2d6c7bc-1363-44aa-8361-a38b3d646c21"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:ttl-after-finished-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "ttl-after-finished-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-12T16:54:08Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:ttl-controller",
                "resourceVersion": "174",
                "uid": "f87c0508-856f-4062-90b5-7ce650cee8b6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:ttl-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "ttl-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-12T16:54:08Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:validatingadmissionpolicy-status-controller",
                "resourceVersion": "180",
                "uid": "04ea3759-0467-495a-82e3-dba1f8aab3bc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:validatingadmissionpolicy-status-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "validatingadmissionpolicy-status-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T16:54:10Z",
                "name": "system:coredns",
                "resourceVersion": "247",
                "uid": "a280f686-0761-4e7a-ae05-59704378cb5f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:coredns"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "coredns",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-12T16:54:08Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:discovery",
                "resourceVersion": "139",
                "uid": "b8c5d3d9-49ca-43a8-bebd-b62b218bebf7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:discovery"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-12T16:54:08Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:kube-controller-manager",
                "resourceVersion": "143",
                "uid": "c7c64233-dc46-44f2-a3b5-4cdd419986a8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:kube-controller-manager"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:kube-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-12T16:54:08Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:kube-dns",
                "resourceVersion": "144",
                "uid": "ae3993dd-e53d-41bb-bd33-3ce8cbc2efc5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:kube-dns"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kube-dns",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-12T16:54:08Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:kube-scheduler",
                "resourceVersion": "145",
                "uid": "a7bdd471-f7b4-4ec3-8793-b71dacf4f630"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:kube-scheduler"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:kube-scheduler"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-12T16:54:08Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:monitoring",
                "resourceVersion": "138",
                "uid": "2904ee52-59ec-4b54-ba64-6156f1830ba3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:monitoring"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-12T16:54:08Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:node",
                "resourceVersion": "147",
                "uid": "ce9de3f9-3460-497c-ab7d-0c4fb5df337c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:node"
            }
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-12T16:54:08Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:node-proxier",
                "resourceVersion": "142",
                "uid": "38d314bf-52c7-4c52-8976-c702c2c3a7cc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:node-proxier"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:kube-proxy"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-12T16:54:08Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:public-info-viewer",
                "resourceVersion": "141",
                "uid": "2421550d-2289-41d2-aefc-df75470c63b6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:public-info-viewer"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:unauthenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-12T16:54:08Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:service-account-issuer-discovery",
                "resourceVersion": "148",
                "uid": "cbe89eb8-ae72-4d37-9fa0-3709e7e31788"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:service-account-issuer-discovery"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-12T16:54:08Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:volume-scheduler",
                "resourceVersion": "146",
                "uid": "258b7f60-f30a-428c-8b58-e5f0c9ffad11"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:volume-scheduler"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:kube-scheduler"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{},\"labels\":{\"app.kubernetes.io/component\":\"events\",\"app.kubernetes.io/instance\":\"default\",\"app.kubernetes.io/part-of\":\"tekton-pipelines\"},\"name\":\"tekton-events-controller-cluster-access\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"tekton-events-controller-cluster-access\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"tekton-events-controller\",\"namespace\":\"tekton-pipelines\"}]}\n"
                },
                "creationTimestamp": "2026-05-12T17:01:55Z",
                "labels": {
                    "app.kubernetes.io/component": "events",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines"
                },
                "name": "tekton-events-controller-cluster-access",
                "resourceVersion": "1072",
                "uid": "74608207-5f7c-47f5-98f7-f7e2c8fe047b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-events-controller-cluster-access"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-events-controller",
                    "namespace": "tekton-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{},\"labels\":{\"app.kubernetes.io/component\":\"controller\",\"app.kubernetes.io/instance\":\"default\",\"app.kubernetes.io/part-of\":\"tekton-pipelines\"},\"name\":\"tekton-pipelines-controller-cluster-access\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"tekton-pipelines-controller-cluster-access\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"tekton-pipelines-controller\",\"namespace\":\"tekton-pipelines\"}]}\n"
                },
                "creationTimestamp": "2026-05-12T17:01:55Z",
                "labels": {
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines"
                },
                "name": "tekton-pipelines-controller-cluster-access",
                "resourceVersion": "1069",
                "uid": "95d26b9e-d159-4ec2-b7f0-a6aa0f104594"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-pipelines-controller-cluster-access"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-pipelines-controller",
                    "namespace": "tekton-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{},\"labels\":{\"app.kubernetes.io/component\":\"controller\",\"app.kubernetes.io/instance\":\"default\",\"app.kubernetes.io/part-of\":\"tekton-pipelines\"},\"name\":\"tekton-pipelines-controller-tenant-access\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"tekton-pipelines-controller-tenant-access\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"tekton-pipelines-controller\",\"namespace\":\"tekton-pipelines\"}]}\n"
                },
                "creationTimestamp": "2026-05-12T17:01:55Z",
                "labels": {
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines"
                },
                "name": "tekton-pipelines-controller-tenant-access",
                "resourceVersion": "1070",
                "uid": "198bf027-1295-4651-a40b-bd21874cb72f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-pipelines-controller-tenant-access"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-pipelines-controller",
                    "namespace": "tekton-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{},\"labels\":{\"app.kubernetes.io/component\":\"resolvers\",\"app.kubernetes.io/instance\":\"default\",\"app.kubernetes.io/part-of\":\"tekton-pipelines\"},\"name\":\"tekton-pipelines-resolvers\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"tekton-pipelines-resolvers-resolution-request-updates\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"tekton-pipelines-resolvers\",\"namespace\":\"tekton-pipelines-resolvers\"}]}\n"
                },
                "creationTimestamp": "2026-05-12T17:01:57Z",
                "labels": {
                    "app.kubernetes.io/component": "resolvers",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines"
                },
                "name": "tekton-pipelines-resolvers",
                "resourceVersion": "1177",
                "uid": "8b26d5ae-2861-4bc3-a5a5-686222a13784"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-pipelines-resolvers-resolution-request-updates"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-pipelines-resolvers",
                    "namespace": "tekton-pipelines-resolvers"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{},\"labels\":{\"app.kubernetes.io/component\":\"webhook\",\"app.kubernetes.io/instance\":\"default\",\"app.kubernetes.io/part-of\":\"tekton-pipelines\"},\"name\":\"tekton-pipelines-webhook-cluster-access\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"tekton-pipelines-webhook-cluster-access\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"tekton-pipelines-webhook\",\"namespace\":\"tekton-pipelines\"}]}\n"
                },
                "creationTimestamp": "2026-05-12T17:01:55Z",
                "labels": {
                    "app.kubernetes.io/component": "webhook",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines"
                },
                "name": "tekton-pipelines-webhook-cluster-access",
                "resourceVersion": "1071",
                "uid": "0ca261ee-8475-422a-b385-cf5b662d2c0e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-pipelines-webhook-cluster-access"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-pipelines-webhook",
                    "namespace": "tekton-pipelines"
                }
            ]
        }
    ],
    "kind": "List",
    "metadata": {
        "resourceVersion": ""
    }
}
