{
    "apiVersion": "v1",
    "items": [
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{},\"name\":\"build-pipeline-config-read-only-binding\",\"namespace\":\"build-service\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"build-service-build-pipeline-config-read-only\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"system:authenticated\"}]}\n"
                },
                "creationTimestamp": "2026-05-04T20:25:02Z",
                "name": "build-pipeline-config-read-only-binding",
                "namespace": "build-service",
                "resourceVersion": "4409",
                "uid": "9ac0dea8-6ef3-4b69-989c-3077aded99c9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "build-service-build-pipeline-config-read-only"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{},\"labels\":{\"app.kubernetes.io/managed-by\":\"kustomize\",\"app.kubernetes.io/name\":\"build-service\"},\"name\":\"build-service-leader-election-rolebinding\",\"namespace\":\"build-service\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"build-service-leader-election-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"build-service-controller-manager\",\"namespace\":\"build-service\"}]}\n"
                },
                "creationTimestamp": "2026-05-04T20:25:03Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "kustomize",
                    "app.kubernetes.io/name": "build-service"
                },
                "name": "build-service-leader-election-rolebinding",
                "namespace": "build-service",
                "resourceVersion": "4410",
                "uid": "698f484d-55a0-4668-bc70-addb2612af13"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "build-service-leader-election-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "build-service-controller-manager",
                    "namespace": "build-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "helm.sh/hook": "post-install",
                    "helm.sh/hook-delete-policy": "before-hook-creation,hook-succeeded",
                    "helm.sh/hook-weight": "-5",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"helm.sh/hook\":\"post-install\",\"helm.sh/hook-delete-policy\":\"before-hook-creation,hook-succeeded\",\"helm.sh/hook-weight\":\"-5\"},\"labels\":{\"app\":\"startupapicheck\",\"app.kubernetes.io/component\":\"startupapicheck\",\"app.kubernetes.io/instance\":\"cert-manager\",\"app.kubernetes.io/managed-by\":\"Helm\",\"app.kubernetes.io/name\":\"startupapicheck\",\"app.kubernetes.io/version\":\"v1.19.4\",\"helm.sh/chart\":\"cert-manager-v1.19.4\"},\"name\":\"cert-manager-startupapicheck:create-cert\",\"namespace\":\"cert-manager\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"cert-manager-startupapicheck:create-cert\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"cert-manager-startupapicheck\",\"namespace\":\"cert-manager\"}]}\n"
                },
                "creationTimestamp": "2026-05-04T20:21:00Z",
                "labels": {
                    "app": "startupapicheck",
                    "app.kubernetes.io/component": "startupapicheck",
                    "app.kubernetes.io/instance": "cert-manager",
                    "app.kubernetes.io/managed-by": "Helm",
                    "app.kubernetes.io/name": "startupapicheck",
                    "app.kubernetes.io/version": "v1.19.4",
                    "helm.sh/chart": "cert-manager-v1.19.4"
                },
                "name": "cert-manager-startupapicheck:create-cert",
                "namespace": "cert-manager",
                "resourceVersion": "775",
                "uid": "897d71a6-e310-4908-8bef-9dfde27a7990"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "cert-manager-startupapicheck:create-cert"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cert-manager-startupapicheck",
                    "namespace": "cert-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{},\"labels\":{\"app\":\"cert-manager\",\"app.kubernetes.io/component\":\"controller\",\"app.kubernetes.io/instance\":\"cert-manager\",\"app.kubernetes.io/managed-by\":\"Helm\",\"app.kubernetes.io/name\":\"cert-manager\",\"app.kubernetes.io/version\":\"v1.19.4\",\"helm.sh/chart\":\"cert-manager-v1.19.4\"},\"name\":\"cert-manager-tokenrequest\",\"namespace\":\"cert-manager\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"cert-manager-tokenrequest\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"cert-manager\",\"namespace\":\"cert-manager\"}]}\n"
                },
                "creationTimestamp": "2026-05-04T20:21:00Z",
                "labels": {
                    "app": "cert-manager",
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/instance": "cert-manager",
                    "app.kubernetes.io/managed-by": "Helm",
                    "app.kubernetes.io/name": "cert-manager",
                    "app.kubernetes.io/version": "v1.19.4",
                    "helm.sh/chart": "cert-manager-v1.19.4"
                },
                "name": "cert-manager-tokenrequest",
                "namespace": "cert-manager",
                "resourceVersion": "776",
                "uid": "9c7a9a2b-e21e-4fa1-8ee1-bc15bd5a646f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "cert-manager-tokenrequest"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cert-manager",
                    "namespace": "cert-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{},\"labels\":{\"app\":\"webhook\",\"app.kubernetes.io/component\":\"webhook\",\"app.kubernetes.io/instance\":\"cert-manager\",\"app.kubernetes.io/managed-by\":\"Helm\",\"app.kubernetes.io/name\":\"webhook\",\"app.kubernetes.io/version\":\"v1.19.4\",\"helm.sh/chart\":\"cert-manager-v1.19.4\"},\"name\":\"cert-manager-webhook:dynamic-serving\",\"namespace\":\"cert-manager\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"cert-manager-webhook:dynamic-serving\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"cert-manager-webhook\",\"namespace\":\"cert-manager\"}]}\n"
                },
                "creationTimestamp": "2026-05-04T20:21:00Z",
                "labels": {
                    "app": "webhook",
                    "app.kubernetes.io/component": "webhook",
                    "app.kubernetes.io/instance": "cert-manager",
                    "app.kubernetes.io/managed-by": "Helm",
                    "app.kubernetes.io/name": "webhook",
                    "app.kubernetes.io/version": "v1.19.4",
                    "helm.sh/chart": "cert-manager-v1.19.4"
                },
                "name": "cert-manager-webhook:dynamic-serving",
                "namespace": "cert-manager",
                "resourceVersion": "777",
                "uid": "011ae972-8a67-4e1a-8ccf-508ee162f081"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "cert-manager-webhook:dynamic-serving"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cert-manager-webhook",
                    "namespace": "cert-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{},\"labels\":{\"app.kubernetes.io/instance\":\"trust-manager\",\"app.kubernetes.io/managed-by\":\"Helm\",\"app.kubernetes.io/name\":\"trust-manager\",\"app.kubernetes.io/version\":\"v0.21.0\",\"helm.sh/chart\":\"trust-manager-v0.21.0\"},\"name\":\"trust-manager\",\"namespace\":\"cert-manager\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"trust-manager\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"trust-manager\",\"namespace\":\"cert-manager\"}]}\n"
                },
                "creationTimestamp": "2026-05-04T20:21:24Z",
                "labels": {
                    "app.kubernetes.io/instance": "trust-manager",
                    "app.kubernetes.io/managed-by": "Helm",
                    "app.kubernetes.io/name": "trust-manager",
                    "app.kubernetes.io/version": "v0.21.0",
                    "helm.sh/chart": "trust-manager-v0.21.0"
                },
                "name": "trust-manager",
                "namespace": "cert-manager",
                "resourceVersion": "941",
                "uid": "70d91fec-a40d-40b9-a67b-8c2ea1010dcf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "trust-manager"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "trust-manager",
                    "namespace": "cert-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{},\"labels\":{\"app.kubernetes.io/instance\":\"trust-manager\",\"app.kubernetes.io/managed-by\":\"Helm\",\"app.kubernetes.io/name\":\"trust-manager\",\"app.kubernetes.io/version\":\"v0.21.0\",\"helm.sh/chart\":\"trust-manager-v0.21.0\"},\"name\":\"trust-manager:leaderelection\",\"namespace\":\"cert-manager\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"trust-manager:leaderelection\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"trust-manager\",\"namespace\":\"cert-manager\"}]}\n"
                },
                "creationTimestamp": "2026-05-04T20:21:24Z",
                "labels": {
                    "app.kubernetes.io/instance": "trust-manager",
                    "app.kubernetes.io/managed-by": "Helm",
                    "app.kubernetes.io/name": "trust-manager",
                    "app.kubernetes.io/version": "v0.21.0",
                    "helm.sh/chart": "trust-manager-v0.21.0"
                },
                "name": "trust-manager:leaderelection",
                "namespace": "cert-manager",
                "resourceVersion": "942",
                "uid": "cc9a34d5-b5e2-4b7c-9928-8d58eb82777e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "trust-manager:leaderelection"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "trust-manager",
                    "namespace": "cert-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{},\"name\":\"public-ec-cm\",\"namespace\":\"enterprise-contract-service\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"enterprisecontract-configmap-viewer-role\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"system:authenticated\"}]}\n"
                },
                "creationTimestamp": "2026-05-04T20:24:47Z",
                "name": "public-ec-cm",
                "namespace": "enterprise-contract-service",
                "resourceVersion": "4114",
                "uid": "489cc128-08e1-4d46-86bd-a904cc436c16"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "enterprisecontract-configmap-viewer-role"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{},\"name\":\"public-ecp\",\"namespace\":\"enterprise-contract-service\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"enterprisecontractpolicy-viewer-role\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"system:authenticated\"}]}\n"
                },
                "creationTimestamp": "2026-05-04T20:24:47Z",
                "name": "public-ecp",
                "namespace": "enterprise-contract-service",
                "resourceVersion": "4115",
                "uid": "cb24ec8e-bf7b-445d-9193-98d847b58b17"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "enterprisecontractpolicy-viewer-role"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{},\"labels\":{\"app.kubernetes.io/managed-by\":\"kustomize\",\"app.kubernetes.io/name\":\"image-controller\"},\"name\":\"image-controller-leader-election-rolebinding\",\"namespace\":\"image-controller\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"image-controller-leader-election-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"image-controller-controller-manager\",\"namespace\":\"image-controller\"}]}\n"
                },
                "creationTimestamp": "2026-05-04T20:26:49Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "kustomize",
                    "app.kubernetes.io/name": "image-controller"
                },
                "name": "image-controller-leader-election-rolebinding",
                "namespace": "image-controller",
                "resourceVersion": "5583",
                "uid": "24b48308-77d7-4577-90df-5f699665e97f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "image-controller-leader-election-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "image-controller-controller-manager",
                    "namespace": "image-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{},\"name\":\"integration-service-leader-election-rolebinding\",\"namespace\":\"integration-service\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"integration-service-leader-election-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"integration-service-controller-manager\",\"namespace\":\"integration-service\"}]}\n"
                },
                "creationTimestamp": "2026-05-04T20:25:10Z",
                "name": "integration-service-leader-election-rolebinding",
                "namespace": "integration-service",
                "resourceVersion": "4542",
                "uid": "987ed661-2e1a-4b11-b758-950f48bf30e9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "integration-service-leader-election-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "integration-service-controller-manager",
                    "namespace": "integration-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{},\"name\":\"konflux-public-info-view-rb\",\"namespace\":\"konflux-info\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"konflux-public-info-view-role\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"system:authenticated\"}]}\n"
                },
                "creationTimestamp": "2026-05-04T20:24:36Z",
                "name": "konflux-public-info-view-rb",
                "namespace": "konflux-info",
                "resourceVersion": "3941",
                "uid": "bf727dac-aee8-481f-8b81-ac8399268bb7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "konflux-public-info-view-role"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-04T20:17:44Z",
                "name": "kubeadm:bootstrap-signer-clusterinfo",
                "namespace": "kube-public",
                "resourceVersion": "219",
                "uid": "6f2b8784-4623-4431-9ab5-42de3d020c16"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "kubeadm:bootstrap-signer-clusterinfo"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:anonymous"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-04T20:17:44Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:bootstrap-signer",
                "namespace": "kube-public",
                "resourceVersion": "193",
                "uid": "682d6a31-0590-4e3c-b86d-dc31ba256f91"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "system:controller:bootstrap-signer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "bootstrap-signer",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{},\"labels\":{\"app\":\"cainjector\",\"app.kubernetes.io/component\":\"cainjector\",\"app.kubernetes.io/instance\":\"cert-manager\",\"app.kubernetes.io/managed-by\":\"Helm\",\"app.kubernetes.io/name\":\"cainjector\",\"app.kubernetes.io/version\":\"v1.19.4\",\"helm.sh/chart\":\"cert-manager-v1.19.4\"},\"name\":\"cert-manager-cainjector:leaderelection\",\"namespace\":\"kube-system\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"cert-manager-cainjector:leaderelection\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"cert-manager-cainjector\",\"namespace\":\"cert-manager\"}]}\n"
                },
                "creationTimestamp": "2026-05-04T20:21:00Z",
                "labels": {
                    "app": "cainjector",
                    "app.kubernetes.io/component": "cainjector",
                    "app.kubernetes.io/instance": "cert-manager",
                    "app.kubernetes.io/managed-by": "Helm",
                    "app.kubernetes.io/name": "cainjector",
                    "app.kubernetes.io/version": "v1.19.4",
                    "helm.sh/chart": "cert-manager-v1.19.4"
                },
                "name": "cert-manager-cainjector:leaderelection",
                "namespace": "kube-system",
                "resourceVersion": "778",
                "uid": "88bc95ef-383a-46f3-a3ab-13af6470ed70"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "cert-manager-cainjector:leaderelection"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cert-manager-cainjector",
                    "namespace": "cert-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{},\"labels\":{\"app\":\"cert-manager\",\"app.kubernetes.io/component\":\"controller\",\"app.kubernetes.io/instance\":\"cert-manager\",\"app.kubernetes.io/managed-by\":\"Helm\",\"app.kubernetes.io/name\":\"cert-manager\",\"app.kubernetes.io/version\":\"v1.19.4\",\"helm.sh/chart\":\"cert-manager-v1.19.4\"},\"name\":\"cert-manager:leaderelection\",\"namespace\":\"kube-system\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"cert-manager:leaderelection\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"cert-manager\",\"namespace\":\"cert-manager\"}]}\n"
                },
                "creationTimestamp": "2026-05-04T20:21:00Z",
                "labels": {
                    "app": "cert-manager",
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/instance": "cert-manager",
                    "app.kubernetes.io/managed-by": "Helm",
                    "app.kubernetes.io/name": "cert-manager",
                    "app.kubernetes.io/version": "v1.19.4",
                    "helm.sh/chart": "cert-manager-v1.19.4"
                },
                "name": "cert-manager:leaderelection",
                "namespace": "kube-system",
                "resourceVersion": "779",
                "uid": "2b1dba65-38dc-493a-a273-87f2923e897d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "cert-manager:leaderelection"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cert-manager",
                    "namespace": "cert-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-04T20:17:45Z",
                "name": "kube-proxy",
                "namespace": "kube-system",
                "resourceVersion": "241",
                "uid": "e850ed87-396c-4fcb-b051-75118dae7e92"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "kube-proxy"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:bootstrappers:kubeadm:default-node-token"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-04T20:17:44Z",
                "name": "kubeadm:kubelet-config",
                "namespace": "kube-system",
                "resourceVersion": "207",
                "uid": "59a9eadc-c96e-4890-a3ff-4dd2c6a0cfdc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "kubeadm:kubelet-config"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:nodes"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:bootstrappers:kubeadm:default-node-token"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-04T20:17:44Z",
                "name": "kubeadm:nodes-kubeadm-config",
                "namespace": "kube-system",
                "resourceVersion": "204",
                "uid": "e8747ad9-4f21-4951-b4ae-8580145ea6a6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "kubeadm:nodes-kubeadm-config"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:bootstrappers:kubeadm:default-node-token"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:nodes"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-04T20:17:44Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system::extension-apiserver-authentication-reader",
                "namespace": "kube-system",
                "resourceVersion": "187",
                "uid": "cb686b9f-6637-4e36-b5ea-76a0796cce38"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "extension-apiserver-authentication-reader"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:kube-controller-manager"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:kube-scheduler"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-04T20:17:44Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system::leader-locking-kube-controller-manager",
                "namespace": "kube-system",
                "resourceVersion": "188",
                "uid": "a70c5fba-fa23-4a9c-89b5-1ad80bd9cf34"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "system::leader-locking-kube-controller-manager"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:kube-controller-manager"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "kube-controller-manager",
                    "namespace": "kube-system"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "leader-election-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-04T20:17:44Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system::leader-locking-kube-scheduler",
                "namespace": "kube-system",
                "resourceVersion": "189",
                "uid": "70baa574-4f06-4f93-a764-d92c7d031da1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "system::leader-locking-kube-scheduler"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:kube-scheduler"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "kube-scheduler",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-04T20:17:44Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:bootstrap-signer",
                "namespace": "kube-system",
                "resourceVersion": "190",
                "uid": "f0a692b3-527a-4c0b-82be-4e633c176b01"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "system:controller:bootstrap-signer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "bootstrap-signer",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-04T20:17:44Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:cloud-provider",
                "namespace": "kube-system",
                "resourceVersion": "191",
                "uid": "1ffaccf1-6d20-4b60-b0b6-5a8f4cff3a4f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "system:controller:cloud-provider"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cloud-provider",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-04T20:17:44Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:token-cleaner",
                "namespace": "kube-system",
                "resourceVersion": "192",
                "uid": "22c50370-bfc7-4e14-b12f-706f05feef37"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "system:controller:token-cleaner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "token-cleaner",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-04T20:24:16Z",
                "labels": {
                    "app.kubernetes.io/component": "admission-controller",
                    "app.kubernetes.io/instance": "kyverno",
                    "app.kubernetes.io/part-of": "kyverno",
                    "app.kubernetes.io/version": "v1.17.1"
                },
                "name": "kyverno:admission-controller",
                "namespace": "kyverno",
                "resourceVersion": "3630",
                "uid": "cf3009b3-3fc4-44cf-9be1-9c7deac747b0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "kyverno:admission-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kyverno-admission-controller",
                    "namespace": "kyverno"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-04T20:24:16Z",
                "labels": {
                    "app.kubernetes.io/component": "background-controller",
                    "app.kubernetes.io/instance": "kyverno",
                    "app.kubernetes.io/part-of": "kyverno",
                    "app.kubernetes.io/version": "v1.17.1"
                },
                "name": "kyverno:background-controller",
                "namespace": "kyverno",
                "resourceVersion": "3631",
                "uid": "89885650-af02-43d9-8e0a-e64be02a8950"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "kyverno:background-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kyverno-background-controller",
                    "namespace": "kyverno"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-04T20:24:16Z",
                "labels": {
                    "app.kubernetes.io/component": "cleanup-controller",
                    "app.kubernetes.io/instance": "kyverno",
                    "app.kubernetes.io/part-of": "kyverno",
                    "app.kubernetes.io/version": "v1.17.1"
                },
                "name": "kyverno:cleanup-controller",
                "namespace": "kyverno",
                "resourceVersion": "3632",
                "uid": "407b8763-6eb7-4ae9-92de-07f9f896aba3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "kyverno:cleanup-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kyverno-cleanup-controller",
                    "namespace": "kyverno"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-04T20:24:16Z",
                "labels": {
                    "app.kubernetes.io/component": "reports-controller",
                    "app.kubernetes.io/instance": "kyverno",
                    "app.kubernetes.io/part-of": "kyverno",
                    "app.kubernetes.io/version": "v1.17.1"
                },
                "name": "kyverno:reports-controller",
                "namespace": "kyverno",
                "resourceVersion": "3633",
                "uid": "42132669-9530-438e-ba86-250a2c9dad64"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "kyverno:reports-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kyverno-reports-controller",
                    "namespace": "kyverno"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{},\"name\":\"local-path-provisioner-bind\",\"namespace\":\"local-path-storage\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"local-path-provisioner-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"local-path-provisioner-service-account\",\"namespace\":\"local-path-storage\"}]}\n"
                },
                "creationTimestamp": "2026-05-04T20:17:47Z",
                "name": "local-path-provisioner-bind",
                "namespace": "local-path-storage",
                "resourceVersion": "280",
                "uid": "5725c6f8-3e79-49f6-99d2-5280e3c07bbc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "local-path-provisioner-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "local-path-provisioner-service-account",
                    "namespace": "local-path-storage"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/sync-wave": "0",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/sync-wave\":\"0\"},\"name\":\"chains-secret-admin\",\"namespace\":\"openshift-pipelines\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"chains-secret-admin\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"chains-secrets-admin\",\"namespace\":\"tekton-pipelines\"}]}\n"
                },
                "creationTimestamp": "2026-05-04T20:23:48Z",
                "name": "chains-secret-admin",
                "namespace": "openshift-pipelines",
                "resourceVersion": "3014",
                "uid": "4c8496f0-6c13-4bbe-9613-7a3fcdf32c15"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "chains-secret-admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "chains-secrets-admin",
                    "namespace": "tekton-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/sync-wave": "0",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/sync-wave\":\"0\"},\"name\":\"tekton-chains-public-key-viewer\",\"namespace\":\"openshift-pipelines\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"tekton-chains-public-key-viewer\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"system:authenticated\"}]}\n"
                },
                "creationTimestamp": "2026-05-04T20:23:48Z",
                "name": "tekton-chains-public-key-viewer",
                "namespace": "openshift-pipelines",
                "resourceVersion": "3015",
                "uid": "cad2bd55-7780-4c5a-a46b-c97ea1e79d89"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-chains-public-key-viewer"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{},\"labels\":{\"app.kubernetes.io/instance\":\"default\",\"app.kubernetes.io/part-of\":\"pipelines-as-code\",\"app.kubernetes.io/version\":\"v0.42.0\"},\"name\":\"pipelines-as-code-controller-binding\",\"namespace\":\"pipelines-as-code\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"pipelines-as-code-controller-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"pipelines-as-code-controller\"}]}\n"
                },
                "creationTimestamp": "2026-05-04T20:23:43Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "pipelines-as-code",
                    "app.kubernetes.io/version": "v0.42.0"
                },
                "name": "pipelines-as-code-controller-binding",
                "namespace": "pipelines-as-code",
                "resourceVersion": "2805",
                "uid": "65b637e0-b21f-4021-9ac0-18c0fd5cc974"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "pipelines-as-code-controller-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipelines-as-code-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{},\"labels\":{\"app.kubernetes.io/instance\":\"default\",\"app.kubernetes.io/part-of\":\"pipelines-as-code\",\"app.kubernetes.io/version\":\"v0.42.0\"},\"name\":\"pipelines-as-code-info\",\"namespace\":\"pipelines-as-code\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"pipelines-as-code-info\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"system:authenticated\"}]}\n"
                },
                "creationTimestamp": "2026-05-04T20:23:43Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "pipelines-as-code",
                    "app.kubernetes.io/version": "v0.42.0"
                },
                "name": "pipelines-as-code-info",
                "namespace": "pipelines-as-code",
                "resourceVersion": "2807",
                "uid": "41ca17ff-c144-41ad-98b7-77050bad35c1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "pipelines-as-code-info"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{},\"labels\":{\"app.kubernetes.io/instance\":\"default\",\"app.kubernetes.io/part-of\":\"pipelines-as-code\",\"app.kubernetes.io/version\":\"v0.42.0\"},\"name\":\"pipelines-as-code-watcher-binding\",\"namespace\":\"pipelines-as-code\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"pipelines-as-code-watcher-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"pipelines-as-code-watcher\"}]}\n"
                },
                "creationTimestamp": "2026-05-04T20:23:43Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "pipelines-as-code",
                    "app.kubernetes.io/version": "v0.42.0"
                },
                "name": "pipelines-as-code-watcher-binding",
                "namespace": "pipelines-as-code",
                "resourceVersion": "2808",
                "uid": "ec98b94c-586f-4d2d-ade0-7b79bfb80358"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "pipelines-as-code-watcher-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipelines-as-code-watcher"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{},\"labels\":{\"app.kubernetes.io/instance\":\"default\",\"app.kubernetes.io/part-of\":\"pipelines-as-code\",\"app.kubernetes.io/version\":\"v0.42.0\"},\"name\":\"pipelines-as-code-webhook-binding\",\"namespace\":\"pipelines-as-code\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"pipelines-as-code-webhook-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"pipelines-as-code-webhook\"}]}\n"
                },
                "creationTimestamp": "2026-05-04T20:23:43Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "pipelines-as-code",
                    "app.kubernetes.io/version": "v0.42.0"
                },
                "name": "pipelines-as-code-webhook-binding",
                "namespace": "pipelines-as-code",
                "resourceVersion": "2809",
                "uid": "d1d1917d-b2d7-4c5f-af43-3397b2d63296"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "pipelines-as-code-webhook-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipelines-as-code-webhook"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-04T20:24:56Z",
                "name": "release-service-leader-election-rolebinding",
                "namespace": "release-service",
                "resourceVersion": "4266",
                "uid": "9af5f834-ad5a-4867-8b57-447705706081"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "release-service-leader-election-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "release-service-controller-manager",
                    "namespace": "release-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-04T20:24:56Z",
                "name": "releaseserviceconfigs-rolebinding",
                "namespace": "release-service",
                "resourceVersion": "4267",
                "uid": "773ce198-a156-4a16-8fad-469f5ae3cf27"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "releaseserviceconfig-role"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{},\"labels\":{\"app.kubernetes.io/instance\":\"default\"},\"name\":\"tekton-operator-info\",\"namespace\":\"tekton-operator\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"tekton-operator-info\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"system:authenticated\"}]}\n"
                },
                "creationTimestamp": "2026-05-04T20:21:41Z",
                "labels": {
                    "app.kubernetes.io/instance": "default"
                },
                "name": "tekton-operator-info",
                "namespace": "tekton-operator",
                "resourceVersion": "1150",
                "uid": "ccc1a28b-0e1d-4f01-858f-07d51b6c24dc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-operator-info"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/sync-wave": "0",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/sync-wave\":\"0\"},\"name\":\"chains-secret-admin\",\"namespace\":\"tekton-pipelines\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"chains-secret-admin\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"chains-secrets-admin\",\"namespace\":\"tekton-pipelines\"}]}\n"
                },
                "creationTimestamp": "2026-05-04T20:23:48Z",
                "name": "chains-secret-admin",
                "namespace": "tekton-pipelines",
                "resourceVersion": "3017",
                "uid": "52610fb4-a555-4dd9-be03-c8f08d80fd66"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "chains-secret-admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "chains-secrets-admin",
                    "namespace": "tekton-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "d87283b0e34ca081f2e2cb110bcfcb332ff8453584bf3153096b52d093258598"
                },
                "creationTimestamp": "2026-05-04T20:22:56Z",
                "labels": {
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-chains"
                },
                "name": "tekton-chains-controller-leaderelection",
                "namespace": "tekton-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "chain-d7vmh",
                        "uid": "795d37c1-7772-499f-8d69-822201785660"
                    }
                ],
                "resourceVersion": "2161",
                "uid": "f08a943a-8f71-48d0-b3f3-8a97c4a51fec"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-chains-leader-election"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-chains-controller",
                    "namespace": "tekton-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "14759064f895324469bedbe22f1d4a1343a43bced599a3a579e19b70dfd000db"
                },
                "creationTimestamp": "2026-05-04T20:22:56Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-chains"
                },
                "name": "tekton-chains-info",
                "namespace": "tekton-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "chain-d7vmh",
                        "uid": "795d37c1-7772-499f-8d69-822201785660"
                    }
                ],
                "resourceVersion": "2163",
                "uid": "8ccc65d0-b356-4e6b-9a81-f82fa0f6b9c2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-chains-info"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/sync-wave": "0",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/sync-wave\":\"0\"},\"name\":\"tekton-chains-public-key-viewer\",\"namespace\":\"tekton-pipelines\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"tekton-chains-public-key-viewer\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"system:authenticated\"}]}\n"
                },
                "creationTimestamp": "2026-05-04T20:23:48Z",
                "name": "tekton-chains-public-key-viewer",
                "namespace": "tekton-pipelines",
                "resourceVersion": "3019",
                "uid": "7e16d575-77dd-4077-a2b6-15d570a840a4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-chains-public-key-viewer"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "d08b23bc8dbcae9585ef2acfc7a0b49b4d36afc39b31eca74452d145c49e879a"
                },
                "creationTimestamp": "2026-05-04T20:22:07Z",
                "labels": {
                    "app.kubernetes.io/component": "events",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines"
                },
                "name": "tekton-events-controller-leaderelection",
                "namespace": "tekton-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-589gp",
                        "uid": "13f3756b-11a1-4d66-b2cb-993bf426249b"
                    }
                ],
                "resourceVersion": "1450",
                "uid": "28a0ebc0-efb6-43e1-97b2-dbae322fb54e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-pipelines-leader-election"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-events-controller",
                    "namespace": "tekton-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "632a38eb00839ea8d29e6af68047c2a2f8ac57d6f5a5229f6d50f7e07b4f9e01"
                },
                "creationTimestamp": "2026-05-04T20:22:07Z",
                "name": "tekton-operators-proxy-webhook-admin",
                "namespace": "tekton-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-589gp",
                        "uid": "13f3756b-11a1-4d66-b2cb-993bf426249b"
                    }
                ],
                "resourceVersion": "1452",
                "uid": "43f1fda3-70e4-4940-a644-5dd6b40bd3cb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-operators-proxy-admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-operators-proxy-webhook",
                    "namespace": "tekton-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "f7181fb5518ba890b3a0e87cbab9bd75eb44252b86a65fc8597e60253824b0f9"
                },
                "creationTimestamp": "2026-05-04T20:22:06Z",
                "labels": {
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines"
                },
                "name": "tekton-pipelines-controller",
                "namespace": "tekton-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-589gp",
                        "uid": "13f3756b-11a1-4d66-b2cb-993bf426249b"
                    }
                ],
                "resourceVersion": "1440",
                "uid": "5f21ea03-eee3-43a8-97b0-111e1b981844"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-pipelines-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-pipelines-controller",
                    "namespace": "tekton-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "f25cebe540e041e5c53b7ef73b22aefc7e59a641f09d3e7182051cdba9fcb8f5"
                },
                "creationTimestamp": "2026-05-04T20:22:06Z",
                "labels": {
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines"
                },
                "name": "tekton-pipelines-controller-leaderelection",
                "namespace": "tekton-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-589gp",
                        "uid": "13f3756b-11a1-4d66-b2cb-993bf426249b"
                    }
                ],
                "resourceVersion": "1443",
                "uid": "e6f131ee-1351-4cf5-8901-53def264c6fd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-pipelines-leader-election"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-pipelines-controller",
                    "namespace": "tekton-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "a6552fef1959d0498c6d5591e86f585656b9123cbc66b4cd7151627c4a6b7300"
                },
                "creationTimestamp": "2026-05-04T20:22:07Z",
                "labels": {
                    "app.kubernetes.io/component": "events",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines"
                },
                "name": "tekton-pipelines-events-controller",
                "namespace": "tekton-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-589gp",
                        "uid": "13f3756b-11a1-4d66-b2cb-993bf426249b"
                    }
                ],
                "resourceVersion": "1449",
                "uid": "963a7c0b-224d-48a3-919e-0b6c81983eda"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-pipelines-events-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-events-controller",
                    "namespace": "tekton-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "4075a4799706a67874406f8e6d71e36b377bd3dfd1229f21489615ef1ca73f83"
                },
                "creationTimestamp": "2026-05-04T20:22:07Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines"
                },
                "name": "tekton-pipelines-info",
                "namespace": "tekton-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-589gp",
                        "uid": "13f3756b-11a1-4d66-b2cb-993bf426249b"
                    }
                ],
                "resourceVersion": "1445",
                "uid": "8bb31b7d-2d66-4160-9947-6872ed84312d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-pipelines-info"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "9b5b6e9ad4fe9ec8ad646d63a4c8c92f7b2b76584470def270315446adab0267"
                },
                "creationTimestamp": "2026-05-04T20:22:07Z",
                "labels": {
                    "app.kubernetes.io/component": "resolvers",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines"
                },
                "name": "tekton-pipelines-resolvers-namespace-rbac",
                "namespace": "tekton-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-589gp",
                        "uid": "13f3756b-11a1-4d66-b2cb-993bf426249b"
                    }
                ],
                "resourceVersion": "1451",
                "uid": "6370765c-30a8-4697-97f5-60dd3bce178b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-pipelines-resolvers-namespace-rbac"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-pipelines-resolvers",
                    "namespace": "tekton-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "53923a9c879609b1781d01d764e057c3784e2c74d47f513e29e36e99d8875336"
                },
                "creationTimestamp": "2026-05-04T20:22:06Z",
                "labels": {
                    "app.kubernetes.io/component": "webhook",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines"
                },
                "name": "tekton-pipelines-webhook",
                "namespace": "tekton-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-589gp",
                        "uid": "13f3756b-11a1-4d66-b2cb-993bf426249b"
                    }
                ],
                "resourceVersion": "1442",
                "uid": "5dca7ae6-49f7-49bf-8647-27920bb42886"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-pipelines-webhook"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-pipelines-webhook",
                    "namespace": "tekton-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "d9b1c0a38e443f72b9870af645d4d58cf2049d2fc231d8dd92e280896c11d1d2"
                },
                "creationTimestamp": "2026-05-04T20:22:07Z",
                "labels": {
                    "app.kubernetes.io/component": "webhook",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines"
                },
                "name": "tekton-pipelines-webhook-leaderelection",
                "namespace": "tekton-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-589gp",
                        "uid": "13f3756b-11a1-4d66-b2cb-993bf426249b"
                    }
                ],
                "resourceVersion": "1444",
                "uid": "0ec1235b-1134-414b-a2a3-391e03750e08"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-pipelines-leader-election"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-pipelines-webhook",
                    "namespace": "tekton-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "e3609a4bcbc0b6df646ace1a0a34d099d7887cccd5fc1ab3eab3f9aca6cb0429"
                },
                "creationTimestamp": "2026-05-04T20:23:02Z",
                "labels": {
                    "app.kubernetes.io/name": "tekton-results-info",
                    "app.kubernetes.io/part-of": "tekton-results",
                    "app.kubernetes.io/version": "v0.18.0"
                },
                "name": "tekton-results-info",
                "namespace": "tekton-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "result-wtvck",
                        "uid": "51ce58a5-3abf-476a-bc10-b5621fee05f7"
                    }
                ],
                "resourceVersion": "2287",
                "uid": "71d8d84b-89e7-4692-a05c-f5457219678f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-results-info"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "390c26a26417e43d67a4be721ce5914b25015b2d0e992f39bf271270cd9776f3"
                },
                "creationTimestamp": "2026-05-04T20:22:34Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-triggers"
                },
                "name": "tekton-triggers-core-interceptors",
                "namespace": "tekton-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "trigger-main-static-xgp2l",
                        "uid": "29e62414-e4b5-43ca-9307-f4a0644a0368"
                    }
                ],
                "resourceVersion": "1860",
                "uid": "c89d8704-17d5-4ecc-80b3-bf89d8daf80e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-triggers-core-interceptors"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-triggers-core-interceptors",
                    "namespace": "tekton-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "3f4023d30ff535d05bbd1f9d6c6dcb6a69d4efe3334a27d4a3dffe6fdaeca2c7"
                },
                "creationTimestamp": "2026-05-04T20:22:35Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-triggers"
                },
                "name": "tekton-triggers-info",
                "namespace": "tekton-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "trigger-main-static-xgp2l",
                        "uid": "29e62414-e4b5-43ca-9307-f4a0644a0368"
                    }
                ],
                "resourceVersion": "1863",
                "uid": "35f6baa2-8237-409e-8b12-ccdd997e7fa2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-triggers-info"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "ba4ed754431138427b5c95b8df955cad023f385120123f990f90fc9e3204c150"
                },
                "creationTimestamp": "2026-05-04T20:22:34Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-triggers"
                },
                "name": "tekton-triggers-webhook-admin",
                "namespace": "tekton-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "trigger-main-static-xgp2l",
                        "uid": "29e62414-e4b5-43ca-9307-f4a0644a0368"
                    }
                ],
                "resourceVersion": "1859",
                "uid": "53da5240-c153-4845-aca6-a63140daa749"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-triggers-admin-webhook"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-triggers-webhook",
                    "namespace": "tekton-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-04T20:27:11Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "kyverno",
                    "generate.kyverno.io/policy-name": "init-ns-integration",
                    "generate.kyverno.io/policy-namespace": "",
                    "generate.kyverno.io/rule-name": "create-konflux-integration-runner-rolebinding",
                    "generate.kyverno.io/trigger-group": "",
                    "generate.kyverno.io/trigger-kind": "Namespace",
                    "generate.kyverno.io/trigger-namespace": "",
                    "generate.kyverno.io/trigger-uid": "cbd0bdca-7b1e-4193-85a7-a8ef1267f4e1",
                    "generate.kyverno.io/trigger-version": "v1"
                },
                "name": "konflux-integration-runner-rolebinding",
                "namespace": "user-ns1",
                "resourceVersion": "5876",
                "uid": "5cf3b010-4508-4e86-9913-0498966e64ec"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "konflux-integration-runner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "konflux-integration-runner",
                    "namespace": "user-ns1"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-04T20:27:12Z",
                "name": "konflux-pipelines-runner-bindings",
                "namespace": "user-ns1",
                "resourceVersion": "5925",
                "uid": "9e93a102-6cdb-4fe9-9c59-de2a6cfc899d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "appstudio-pipelines-runner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "build-pipeline-sample-component",
                    "namespace": "user-ns1"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-04T20:27:11Z",
                "name": "release-pipeline-resource-role-binding",
                "namespace": "user-ns1",
                "resourceVersion": "5875",
                "uid": "cb5380d5-073e-466a-a2fd-c5c51e63aaed"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "release-pipeline-resource-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "release-pipeline",
                    "namespace": "user-ns1"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-04T20:27:11Z",
                "name": "user1-konflux-admin",
                "namespace": "user-ns1",
                "resourceVersion": "5878",
                "uid": "c6ad747e-cada-4ace-897a-577f47d00a2d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "konflux-admin-user-actions"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "user1@konflux.dev"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-04T20:27:11Z",
                "name": "user2-konflux-admin",
                "namespace": "user-ns1",
                "resourceVersion": "5881",
                "uid": "acdab05e-ae8d-411e-9aea-3d926958f90c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "konflux-admin-user-actions"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "user2@konflux.dev"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-04T20:27:11Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "kyverno",
                    "generate.kyverno.io/policy-name": "init-ns-integration",
                    "generate.kyverno.io/policy-namespace": "",
                    "generate.kyverno.io/rule-name": "create-konflux-integration-runner-rolebinding",
                    "generate.kyverno.io/trigger-group": "",
                    "generate.kyverno.io/trigger-kind": "Namespace",
                    "generate.kyverno.io/trigger-namespace": "",
                    "generate.kyverno.io/trigger-uid": "466e3805-4120-44e5-a3c2-5cefd757c8dd",
                    "generate.kyverno.io/trigger-version": "v1"
                },
                "name": "konflux-integration-runner-rolebinding",
                "namespace": "user-ns2",
                "resourceVersion": "5893",
                "uid": "ccc32a48-66c9-4886-8016-983f4d5b7766"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "konflux-integration-runner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "konflux-integration-runner",
                    "namespace": "user-ns2"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-04T20:27:11Z",
                "name": "ns2-pod-viewer-job-creator-binding",
                "namespace": "user-ns2",
                "resourceVersion": "5882",
                "uid": "16155047-7a57-46ec-aac4-dca9b2ae27b6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "ns2-pod-viewer-job-creator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "konflux-integration-runner",
                    "namespace": "user-ns2"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-04T20:27:11Z",
                "name": "release-pipeline-resource-role-binding",
                "namespace": "user-ns2",
                "resourceVersion": "5883",
                "uid": "ae52b33f-6a30-4b51-8298-8830c7f997a1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "release-pipeline-resource-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "release-pipeline",
                    "namespace": "user-ns2"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-04T20:27:11Z",
                "name": "user1-konflux-admin",
                "namespace": "user-ns2",
                "resourceVersion": "5886",
                "uid": "2e774388-6a1c-46a6-b14c-9eaaf324de57"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "konflux-admin-user-actions"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "user1@konflux.dev"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-04T20:27:11Z",
                "name": "user2-konflux-admin",
                "namespace": "user-ns2",
                "resourceVersion": "5887",
                "uid": "9db6f56d-bee6-4a06-896a-62d9f24d8890"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "konflux-admin-user-actions"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "user2@konflux.dev"
                }
            ]
        }
    ],
    "kind": "List",
    "metadata": {
        "resourceVersion": ""
    }
}
