{
    "apiVersion": "v1",
    "items": [
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:22:44Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "cluster-monitoring-operator",
                    "app.kubernetes.io/part-of": "openshift-monitoring"
                },
                "name": "alertmanager-main",
                "resourceVersion": "11243",
                "uid": "a8851840-cd94-4843-b288-55a9f84eeb94"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alertmanager-main"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "alertmanager-main",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:12:25Z",
                "name": "aws-ebs-csi-driver-operator-clusterrolebinding",
                "resourceVersion": "1414",
                "uid": "e35224fb-71c7-411c-8f02-a6aff8acc1c2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "aws-ebs-csi-driver-operator-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "aws-ebs-csi-driver-operator",
                    "namespace": "openshift-cluster-csi-drivers"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:12:29Z",
                "labels": {
                    "hypershift.openshift.io/managed": "true"
                },
                "name": "aws-pod-identity-webhook",
                "resourceVersion": "1851",
                "uid": "6578a708-c411-4621-a2a7-cdc4925306d0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "aws-pod-identity-webhook"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "aws-pod-identity-webhook",
                    "namespace": "openshift-authentication"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:14:37Z",
                "name": "backplane-ai-agent-c0",
                "resourceVersion": "4905",
                "uid": "cfcb0956-f860-47ca-9656-82394e2246c6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-readers-cluster"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:14:54Z",
                "name": "backplane-cee-c0",
                "resourceVersion": "5327",
                "uid": "f4f3fffa-e733-4449-ada5-5632c015f2ed"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-cee-readers-cluster"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:14:54Z",
                "name": "backplane-cee-c1",
                "resourceVersion": "5349",
                "uid": "1d64ee58-e82b-4550-b2f8-844d4e0552fc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-readers-cluster"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:15:14Z",
                "name": "backplane-cluster-admin",
                "resourceVersion": "5809",
                "uid": "76aa9bbd-8811-4522-afe8-0b22f348d906"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "backplane-cluster-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:15:18Z",
                "name": "backplane-cse-c0",
                "resourceVersion": "5972",
                "uid": "ab19645e-2c5c-4a79-afb8-35bb4cf88de5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-readers-cluster"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:14:55Z",
                "name": "backplane-csm-c0",
                "resourceVersion": "5367",
                "uid": "8a7adc20-932c-46aa-a09f-d70eb7b61197"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-csm-readers-cluster"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:14:55Z",
                "name": "backplane-csm-c1",
                "resourceVersion": "5369",
                "uid": "d31f846d-0ba3-4296-9477-de8c7c5782f8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-readers-cluster"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:15:14Z",
                "name": "backplane-impersonate-cluster-admin",
                "resourceVersion": "5803",
                "uid": "82c78ec3-5d1e-48ba-81bb-5543ac5c7820"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-impersonate-cluster-admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:15:27Z",
                "name": "backplane-lpsre-c0",
                "resourceVersion": "6228",
                "uid": "36a08fd7-82b9-4d62-ae57-a006817046d3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-admins-cluster"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:15:28Z",
                "name": "backplane-lpsre-c1",
                "resourceVersion": "6230",
                "uid": "ba4b0fff-2cde-4319-bb36-6d97cdce969f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-readers-cluster"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:15:21Z",
                "name": "backplane-lpsre-package-operator-c0",
                "resourceVersion": "6115",
                "uid": "76592fed-37d5-4101-a040-5873d2e39cfd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-cluster"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:15:05Z",
                "name": "backplane-mcs-tier-two-c0",
                "resourceVersion": "5606",
                "uid": "feee7b43-741f-4f5c-96de-7b1230ae380b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-mcs-tier-two-readers-cluster"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:15:05Z",
                "name": "backplane-mcs-tier-two-c1",
                "resourceVersion": "5609",
                "uid": "ceda3640-1c33-4638-879a-c0677e50052f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-readers-cluster"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:15:02Z",
                "name": "backplane-mobb-c0",
                "resourceVersion": "5512",
                "uid": "4a13ed17-8f6d-496b-a84e-571bfbb0b34b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-mobb-readers-cluster"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:15:03Z",
                "name": "backplane-mobb-c1",
                "resourceVersion": "5515",
                "uid": "9cbcb8ee-eac1-4d12-afad-38d62aa245a8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-readers-cluster"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:14:44Z",
                "name": "backplane-srep-c0",
                "resourceVersion": "5071",
                "uid": "412d58b8-90b2-4c59-804e-2eb5da2ac71a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-cluster"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:14:44Z",
                "name": "backplane-srep-c1",
                "resourceVersion": "5073",
                "uid": "f80dd428-25fe-459a-a4c6-b4a9355ee17b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-readers-cluster"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:15:37Z",
                "name": "backplane-srep-ro-c0",
                "resourceVersion": "6464",
                "uid": "c8097ef3-06fc-4bf2-bd76-0fe5ea6525c2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-cluster"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:15:37Z",
                "name": "backplane-srep-ro-c1",
                "resourceVersion": "6465",
                "uid": "3703f5f7-ff00-408d-ac64-66e131ba8570"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-readers-cluster"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:14:38Z",
                "name": "backplane-tam-c0",
                "resourceVersion": "4907",
                "uid": "6aac531f-d314-49cd-8f04-40008132ec20"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-tam-readers-cluster"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:14:38Z",
                "name": "backplane-tam-c1",
                "resourceVersion": "4910",
                "uid": "77d1ad4c-6d02-44b6-b7ac-a53d521020be"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-readers-cluster"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:44Z",
                "name": "basic-users",
                "resourceVersion": "414",
                "uid": "b1ac5431-3870-4993-9302-b5b2bd57a00e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "basic-user"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "CloudCredential",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true"
                },
                "creationTimestamp": "2026-05-14T03:12:10Z",
                "name": "cloud-credential-operator-rolebinding",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "adce030f-2578-4946-8b28-c0b5993e0934"
                    }
                ],
                "resourceVersion": "748",
                "uid": "ee182968-ddaa-4e73-9f2c-f6028c371bb5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cloud-credential-operator-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cloud-credential-operator",
                    "namespace": "openshift-cloud-credential-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:12:38Z",
                "name": "cloud-network-config-controller",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "31363e29-9212-46b6-8aaf-ce273e99531a"
                    }
                ],
                "resourceVersion": "3029",
                "uid": "189c9cf4-823f-4eb3-a69a-bef1007050c4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cloud-network-config-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cloud-network-config-controller",
                    "namespace": "openshift-cloud-network-config-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:34Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "cluster-admin",
                "resourceVersion": "209",
                "uid": "948aba6f-8af3-4ee4-be0e-ddb905ba3ed7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:masters"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:43Z",
                "name": "cluster-admins",
                "resourceVersion": "412",
                "uid": "549a5f10-acb8-41bb-a3e8-b835f5e58d54"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:cluster-admins"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T03:12:17Z",
                "labels": {
                    "k8s-addon": "cluster-autoscaler.addons.k8s.io",
                    "k8s-app": "cluster-autoscaler"
                },
                "name": "cluster-autoscaler",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "adce030f-2578-4946-8b28-c0b5993e0934"
                    }
                ],
                "resourceVersion": "1108",
                "uid": "f91e3b6a-6a55-46f5-966b-18c269a235b5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-autoscaler"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-autoscaler",
                    "namespace": "openshift-machine-api"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T03:12:11Z",
                "name": "cluster-autoscaler-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "adce030f-2578-4946-8b28-c0b5993e0934"
                    }
                ],
                "resourceVersion": "867",
                "uid": "f6a429d4-5e26-4974-b0d5-97a43c621567"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-autoscaler-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-autoscaler-operator",
                    "namespace": "openshift-machine-api"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T03:12:25Z",
                "name": "cluster-monitoring-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "adce030f-2578-4946-8b28-c0b5993e0934"
                    }
                ],
                "resourceVersion": "1328",
                "uid": "b1b1b916-9e9e-4c33-ba10-ac023777c3e4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-monitoring-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-monitoring-operator",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T03:12:14Z",
                "name": "cluster-network-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "adce030f-2578-4946-8b28-c0b5993e0934"
                    }
                ],
                "resourceVersion": "1003",
                "uid": "9afc96a1-dd84-4b7d-b2c4-4e96d5ba1b39"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-network-operator",
                    "namespace": "openshift-network-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "NodeTuning",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T03:12:26Z",
                "name": "cluster-node-tuning-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "adce030f-2578-4946-8b28-c0b5993e0934"
                    }
                ],
                "resourceVersion": "1430",
                "uid": "3a66746a-d905-44ae-b82a-f1107cdb916e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-node-tuning-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-node-tuning-operator",
                    "namespace": "openshift-cluster-node-tuning-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "NodeTuning",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T03:12:27Z",
                "name": "cluster-node-tuning:tuned",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "adce030f-2578-4946-8b28-c0b5993e0934"
                    }
                ],
                "resourceVersion": "1641",
                "uid": "5f144cc7-c9c8-468e-b570-f0a5e4fdd212"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-node-tuning:tuned"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tuned",
                    "namespace": "openshift-cluster-node-tuning-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:43Z",
                "name": "cluster-readers",
                "resourceVersion": "413",
                "uid": "64d19a63-58d6-4ff7-80a1-23b42d80cd32"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-reader"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:cluster-readers"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "openshift-samples",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true"
                },
                "creationTimestamp": "2026-05-14T03:12:27Z",
                "name": "cluster-samples-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "adce030f-2578-4946-8b28-c0b5993e0934"
                    }
                ],
                "resourceVersion": "1607",
                "uid": "61370f97-ed5c-4be6-a3b1-4882dc9626ad"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-samples-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-samples-operator",
                    "namespace": "openshift-cluster-samples-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "openshift-samples",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true"
                },
                "creationTimestamp": "2026-05-14T03:12:22Z",
                "name": "cluster-samples-operator-imageconfig-reader",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "adce030f-2578-4946-8b28-c0b5993e0934"
                    }
                ],
                "resourceVersion": "1233",
                "uid": "f321081b-bbc7-45e1-8203-7a31301e4c2a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-samples-operator-imageconfig-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-samples-operator",
                    "namespace": "openshift-cluster-samples-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "openshift-samples",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true"
                },
                "creationTimestamp": "2026-05-14T03:12:23Z",
                "name": "cluster-samples-operator-proxy-reader",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "adce030f-2578-4946-8b28-c0b5993e0934"
                    }
                ],
                "resourceVersion": "1281",
                "uid": "644b1e4a-7996-408c-a5a7-9a5be51c7bb5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-samples-operator-proxy-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-samples-operator",
                    "namespace": "openshift-cluster-samples-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:44Z",
                "name": "cluster-status-binding",
                "resourceVersion": "418",
                "uid": "a0db9f3d-6f8f-4f25-b10f-f42c4ab3859e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-status"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Storage",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T03:12:15Z",
                "labels": {
                    "addonmanager.kubernetes.io/mode": "Reconcile",
                    "kubernetes.io/cluster-service": "true"
                },
                "name": "cluster-storage-operator-role",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "adce030f-2578-4946-8b28-c0b5993e0934"
                    }
                ],
                "resourceVersion": "1038",
                "uid": "23215ff8-eda9-4c4d-8f85-7a866b40efe3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-storage-operator",
                    "namespace": "openshift-cluster-storage-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"include.release.openshift.io/self-managed-high-availability\":\"true\",\"kubernetes.io/description\":\"Grant the cluster-version operator permission to perform cluster-admin actions while managing the OpenShift core.\"},\"name\":\"cluster-version-operator\"},\"roleRef\":{\"kind\":\"ClusterRole\",\"name\":\"cluster-admin\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"default\",\"namespace\":\"openshift-cluster-version\"}]}\n",
                    "kubernetes.io/description": "Grant the cluster-version operator permission to perform cluster-admin actions while managing the OpenShift core."
                },
                "creationTimestamp": "2026-05-14T03:12:01Z",
                "name": "cluster-version-operator",
                "resourceVersion": "495",
                "uid": "ffeed58b-ea60-450f-872a-e94fc8fc8fae"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "default",
                    "namespace": "openshift-cluster-version"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T03:12:31Z",
                "name": "console",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "adce030f-2578-4946-8b28-c0b5993e0934"
                    }
                ],
                "resourceVersion": "1987",
                "uid": "4f51d228-828a-45de-8615-e53ff1e057ff"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "console"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "console",
                    "namespace": "openshift-console"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T03:12:31Z",
                "name": "console-auth-delegator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "adce030f-2578-4946-8b28-c0b5993e0934"
                    }
                ],
                "resourceVersion": "1992",
                "uid": "31a31daf-9144-48c8-b745-55ddbc0189fb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:auth-delegator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "console",
                    "namespace": "openshift-console"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T03:12:30Z",
                "name": "console-extensions-reader",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "adce030f-2578-4946-8b28-c0b5993e0934"
                    }
                ],
                "resourceVersion": "1982",
                "uid": "9e6cb1a6-464e-4ba9-872b-23ad6bb0e512"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "console-extensions-reader"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T03:12:30Z",
                "name": "console-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "adce030f-2578-4946-8b28-c0b5993e0934"
                    }
                ],
                "resourceVersion": "1977",
                "uid": "65cde5df-fa82-47b2-a260-476855385cf1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "console-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "console-operator",
                    "namespace": "openshift-console-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T03:12:31Z",
                "name": "console-operator-auth-delegator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "adce030f-2578-4946-8b28-c0b5993e0934"
                    }
                ],
                "resourceVersion": "1983",
                "uid": "b08d8e74-9fd0-4863-a6a5-4eb40a595e63"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:auth-delegator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "console-operator",
                    "namespace": "openshift-console-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:12:26Z",
                "labels": {
                    "hypershift.openshift.io/managed": "true"
                },
                "name": "create-csrs-for-bootstrapping",
                "resourceVersion": "1508",
                "uid": "addabaf4-c592-4fbf-ad32-aca6171d23b8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:node-bootstrapper"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:serviceaccount:openshift-machine-config-operator:node-bootstrapper"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T03:12:25Z",
                "labels": {
                    "addonmanager.kubernetes.io/mode": "Reconcile",
                    "kubernetes.io/cluster-service": "true"
                },
                "name": "csi-snapshot-controller-operator-clusterrole",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "adce030f-2578-4946-8b28-c0b5993e0934"
                    }
                ],
                "resourceVersion": "1354",
                "uid": "1c119ac1-23cd-43cd-bdb0-f1a0a15b258b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "csi-snapshot-controller-operator-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "csi-snapshot-controller-operator",
                    "namespace": "openshift-cluster-storage-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "CSISnapshot",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T03:12:25Z",
                "labels": {
                    "addonmanager.kubernetes.io/mode": "Reconcile",
                    "kubernetes.io/cluster-service": "true"
                },
                "name": "csi-snapshot-controller-runner-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "adce030f-2578-4946-8b28-c0b5993e0934"
                    }
                ],
                "resourceVersion": "1417",
                "uid": "5b25e09d-efa9-4eb7-9673-1122f8dbe94a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-csi-snapshot-controller-runner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "csi-snapshot-controller-operator",
                    "namespace": "openshift-cluster-storage-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T03:12:18Z",
                "name": "custom-account-openshift-machine-config-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "adce030f-2578-4946-8b28-c0b5993e0934"
                    }
                ],
                "resourceVersion": "1142",
                "uid": "35d12dde-0fed-4ea7-9984-f378593c4c19"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "machine-config-operator",
                    "namespace": "openshift-machine-config-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:15:15Z",
                "name": "dedicated-admin-serviceaccounts-c0",
                "resourceVersion": "5866",
                "uid": "a19d725d-6650-4e39-bd9b-b896217d5cf9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-cluster"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:15:16Z",
                "name": "dedicated-admins-c0",
                "resourceVersion": "5936",
                "uid": "0d15c1a9-a98b-4736-bc8f-f23555391959"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-cluster"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:15:13Z",
                "name": "dedicated-admins-cluster",
                "resourceVersion": "5779",
                "uid": "102e75b1-8003-48ae-8620-ff3e0cc03344"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-cluster"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:15:11Z",
                "name": "dedicated-admins-registry-cas-cluster",
                "resourceVersion": "5725",
                "uid": "17c6ee10-5c76-4939-b7d1-e4ba2cafafac"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-registry-cas-cluster"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "ImageRegistry",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T03:12:25Z",
                "name": "default-account-cluster-image-registry-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "adce030f-2578-4946-8b28-c0b5993e0934"
                    }
                ],
                "resourceVersion": "1385",
                "uid": "70325f75-dcd1-4fdc-be71-cb34bfdfa5ef"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-image-registry-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-image-registry-operator",
                    "namespace": "openshift-image-registry"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:23:09Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "deployment-validation-operator.v0.1.595-gbf89fe8",
                    "olm.owner.kind": "ClusterServiceVersion",
                    "olm.owner.namespace": "openshift-deployment-validation-operator",
                    "olm.permissions.hash": "5skITWrLBOlbXhrBfE3G2s9UbRMxY4Z6yIM4Zm",
                    "operators.coreos.com/deployment-validation-operator.openshift-deployment-validation": ""
                },
                "name": "deployment-validation-op-3MPgHXAhudR419ZBRN97wNgaRvKjiTOnF1Hm8z",
                "resourceVersion": "12962",
                "uid": "1c3d0354-9d21-479c-ae4f-8dc24c8cac25"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "deployment-validation-op-3MPgHXAhudR419ZBRN97wNgaRvKjiTOnF1Hm8z"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployment-validation-operator",
                    "namespace": "openshift-deployment-validation-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:12:46Z",
                "name": "dns-monitoring",
                "resourceVersion": "3619",
                "uid": "99c05f60-9bdf-4f76-a213-de5510e2f69a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dns-monitoring"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:12:30Z",
                "name": "ebs-csi-main-attacher-binding",
                "resourceVersion": "1886",
                "uid": "97190c66-73f4-421b-a9c7-3bc7cec0f3ea"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-csi-main-attacher-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "aws-ebs-csi-driver-controller-sa",
                    "namespace": "openshift-cluster-csi-drivers"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:12:29Z",
                "name": "ebs-csi-main-provisioner-binding",
                "resourceVersion": "1858",
                "uid": "6836bdd4-e757-4888-8bf0-e22a7a17aa1e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-csi-main-provisioner-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "aws-ebs-csi-driver-controller-sa",
                    "namespace": "openshift-cluster-csi-drivers"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:12:28Z",
                "name": "ebs-csi-main-resizer-binding",
                "resourceVersion": "1697",
                "uid": "a02d5b14-1fa7-451d-b98f-ea0a02d66ab0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-csi-main-resizer-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "aws-ebs-csi-driver-controller-sa",
                    "namespace": "openshift-cluster-csi-drivers"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:12:30Z",
                "name": "ebs-csi-main-snapshotter-binding",
                "resourceVersion": "1949",
                "uid": "632494ea-1f54-4afd-980d-c1f5dbbe67b6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-csi-main-snapshotter-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "aws-ebs-csi-driver-controller-sa",
                    "namespace": "openshift-cluster-csi-drivers"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:12:28Z",
                "name": "ebs-csi-storageclass-reader-resizer-binding",
                "resourceVersion": "1735",
                "uid": "3a9c4fac-535d-4c47-a175-396e7ad8127e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-csi-resizer-storageclass-reader-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "aws-ebs-csi-driver-controller-sa",
                    "namespace": "openshift-cluster-csi-drivers"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:12:28Z",
                "name": "ebs-csi-volumesnapshot-reader-provisioner-binding",
                "resourceVersion": "1767",
                "uid": "256260cb-7460-40f5-b568-3559170e9521"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-csi-provisioner-volumesnapshot-reader-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "aws-ebs-csi-driver-controller-sa",
                    "namespace": "openshift-cluster-csi-drivers"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:12:29Z",
                "name": "ebs-node-privileged-binding",
                "resourceVersion": "1818",
                "uid": "28631aa5-d02e-43d2-a162-96ebcba6dce6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "ebs-privileged-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "aws-ebs-csi-driver-node-sa",
                    "namespace": "openshift-cluster-csi-drivers"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:27:34Z",
                "name": "gitops-service-cluster",
                "ownerReferences": [
                    {
                        "apiVersion": "pipelines.openshift.io/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "GitopsService",
                        "name": "cluster",
                        "uid": "b0a422e0-1933-4dd6-8169-cd5a3f47c4d7"
                    }
                ],
                "resourceVersion": "18470",
                "uid": "466c9ce0-0b96-4999-80a7-95835c9013e2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "gitops-service-cluster"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "gitops-service-cluster",
                    "namespace": "openshift-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{},\"name\":\"hcco-cluster-admin\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"cluster-admin\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"User\",\"name\":\"system:hosted-cluster-config\"}]}\n"
                },
                "creationTimestamp": "2026-05-14T03:11:33Z",
                "name": "hcco-cluster-admin",
                "resourceVersion": "137",
                "uid": "efb7a091-d79f-40a1-9c81-ea9a5ccba3e3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:hosted-cluster-config"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true",
                    "release.openshift.io/create-only": "true"
                },
                "creationTimestamp": "2026-05-14T03:12:31Z",
                "name": "helm-chartrepos-view",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "adce030f-2578-4946-8b28-c0b5993e0934"
                    }
                ],
                "resourceVersion": "1989",
                "uid": "3811c024-32f6-4a33-95ae-b7b68020df97"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "helm-chartrepos-viewer"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:12:26Z",
                "labels": {
                    "hypershift.openshift.io/managed": "true"
                },
                "name": "hypershift-metrics-client",
                "resourceVersion": "1510",
                "uid": "203ec10a-2bec-441c-b412-0257dfab00d2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:monitoring"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:serviceaccount:hypershift:prometheus"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Insights",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T03:12:24Z",
                "name": "insights-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "adce030f-2578-4946-8b28-c0b5993e0934"
                    }
                ],
                "resourceVersion": "1319",
                "uid": "fecabb0e-bb27-4760-88c0-d1a8894c7772"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "insights-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "operator",
                    "namespace": "openshift-insights"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Insights",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T03:12:09Z",
                "name": "insights-operator-auth",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "adce030f-2578-4946-8b28-c0b5993e0934"
                    }
                ],
                "resourceVersion": "745",
                "uid": "0812f92e-9978-4cce-9f8c-2eefbd2e17ea"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:auth-delegator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "operator",
                    "namespace": "openshift-insights"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Insights",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T03:12:26Z",
                "name": "insights-operator-gather",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "adce030f-2578-4946-8b28-c0b5993e0934"
                    }
                ],
                "resourceVersion": "1428",
                "uid": "c543000e-b8d0-4bc6-bd2f-b8a50545a1e7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "insights-operator-gather"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "gather",
                    "namespace": "openshift-insights"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Insights",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T03:12:26Z",
                "name": "insights-operator-gather-reader",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "adce030f-2578-4946-8b28-c0b5993e0934"
                    }
                ],
                "resourceVersion": "1500",
                "uid": "52198589-f766-4531-92a8-167109144cda"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "gather",
                    "namespace": "openshift-insights"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:22:42Z",
                "labels": {
                    "app.kubernetes.io/component": "exporter",
                    "app.kubernetes.io/managed-by": "cluster-monitoring-operator",
                    "app.kubernetes.io/name": "kube-state-metrics",
                    "app.kubernetes.io/part-of": "openshift-monitoring",
                    "app.kubernetes.io/version": "2.13.0"
                },
                "name": "kube-state-metrics",
                "resourceVersion": "11048",
                "uid": "40280ff3-c6b4-4be6-adad-526d8fcb94f9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "kube-state-metrics"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kube-state-metrics",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:12:42Z",
                "name": "metrics-daemon-sa-rolebinding",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "31363e29-9212-46b6-8aaf-ce273e99531a"
                    }
                ],
                "resourceVersion": "3362",
                "uid": "ffd3eeba-2b3e-41c9-9cd3-1f56e2c034ba"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "metrics-daemon-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "metrics-daemon-sa",
                    "namespace": "openshift-multus"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:22:43Z",
                "labels": {
                    "app.kubernetes.io/component": "metrics-server",
                    "app.kubernetes.io/managed-by": "cluster-monitoring-operator",
                    "app.kubernetes.io/name": "auth-delegator",
                    "app.kubernetes.io/part-of": "openshift-monitoring"
                },
                "name": "metrics-server:system:auth-delegator",
                "resourceVersion": "11160",
                "uid": "075c0bdb-9515-4d04-87e3-f802f93e14f5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:auth-delegator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "metrics-server",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:12:44Z",
                "name": "multus-admission-controller-webhook",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "31363e29-9212-46b6-8aaf-ce273e99531a"
                    }
                ],
                "resourceVersion": "3485",
                "uid": "bfd360ed-6b33-40e2-b22c-d111b690bbde"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "multus-admission-controller-webhook"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "multus-ac",
                    "namespace": "openshift-multus"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:12:40Z",
                "name": "multus-ancillary-tools",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "31363e29-9212-46b6-8aaf-ce273e99531a"
                    }
                ],
                "resourceVersion": "3238",
                "uid": "fd4f2087-343d-4f1e-a54a-8f015be72947"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "multus-ancillary-tools"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "multus-ancillary-tools",
                    "namespace": "openshift-multus"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:12:40Z",
                "name": "multus-cluster-readers",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "31363e29-9212-46b6-8aaf-ce273e99531a"
                    }
                ],
                "resourceVersion": "3247",
                "uid": "309d7097-c355-442a-971c-2c99079be57b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "multus-ancillary-tools"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:cluster-readers"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:12:39Z",
                "name": "multus-group",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "31363e29-9212-46b6-8aaf-ce273e99531a"
                    }
                ],
                "resourceVersion": "3203",
                "uid": "6084ff1a-112e-487b-a95a-6216aee9caec"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "multus"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:multus"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:12:39Z",
                "name": "multus-transient",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "31363e29-9212-46b6-8aaf-ce273e99531a"
                    }
                ],
                "resourceVersion": "3186",
                "uid": "986a0861-55b7-475e-ac68-f9656ba4d5f8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "multus-ancillary-tools"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "multus",
                    "namespace": "openshift-multus"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:12:40Z",
                "name": "multus-whereabouts",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "31363e29-9212-46b6-8aaf-ce273e99531a"
                    }
                ],
                "resourceVersion": "3249",
                "uid": "ad1fb91b-f1e2-446c-951b-90fc9ad8b76d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "whereabouts-cni"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "multus-ancillary-tools",
                    "namespace": "openshift-multus"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:12:54Z",
                "name": "network-diagnostics",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "31363e29-9212-46b6-8aaf-ce273e99531a"
                    }
                ],
                "resourceVersion": "3911",
                "uid": "56dcc787-56a6-4ed0-ace9-2a23f18d2155"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "network-diagnostics"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "network-diagnostics",
                    "namespace": "openshift-network-diagnostics"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:12:56Z",
                "name": "network-node-identity",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "31363e29-9212-46b6-8aaf-ce273e99531a"
                    }
                ],
                "resourceVersion": "3998",
                "uid": "bd04f08a-8867-4f90-b239-cf41a5c78e0d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "network-node-identity"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "network-node-identity",
                    "namespace": "openshift-network-node-identity"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:22:42Z",
                "labels": {
                    "app.kubernetes.io/component": "exporter",
                    "app.kubernetes.io/managed-by": "cluster-monitoring-operator",
                    "app.kubernetes.io/name": "node-exporter",
                    "app.kubernetes.io/part-of": "openshift-monitoring",
                    "app.kubernetes.io/version": "1.8.2"
                },
                "name": "node-exporter",
                "resourceVersion": "11047",
                "uid": "34fc0012-acd1-4e66-a96c-6ad8df9acdcf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "node-exporter"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "node-exporter",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:12:57Z",
                "labels": {
                    "open-cluster-management.io/created-by-klusterlet": "klusterlet-2q9eqos1qsf5l91tgu6eiequb7lp37oq"
                },
                "name": "open-cluster-management:klusterlet-2q9eqos1qsf5l91tgu6eiequb7lp37oq-registration:addon-management",
                "resourceVersion": "4068",
                "uid": "d77abbba-f285-49e3-b849-91c0a9d5d2c6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "open-cluster-management:klusterlet-2q9eqos1qsf5l91tgu6eiequb7lp37oq-registration:addon-management"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "klusterlet-2q9eqos1qsf5l91tgu6eiequb7lp37oq-registration-sa",
                    "namespace": "open-cluster-management-2q9eqos1qsf5l91tgu6eiequb7lp37oq"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:12:57Z",
                "labels": {
                    "open-cluster-management.io/created-by-klusterlet": "klusterlet-2q9eqos1qsf5l91tgu6eiequb7lp37oq"
                },
                "name": "open-cluster-management:klusterlet-2q9eqos1qsf5l91tgu6eiequb7lp37oq-registration:agent",
                "resourceVersion": "4067",
                "uid": "d87ff736-16e7-4cc3-8462-0099db078105"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "open-cluster-management:klusterlet-2q9eqos1qsf5l91tgu6eiequb7lp37oq-registration:agent"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "klusterlet-2q9eqos1qsf5l91tgu6eiequb7lp37oq-registration-sa",
                    "namespace": "open-cluster-management-2q9eqos1qsf5l91tgu6eiequb7lp37oq"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:12:58Z",
                "labels": {
                    "open-cluster-management.io/created-by-klusterlet": "klusterlet-2q9eqos1qsf5l91tgu6eiequb7lp37oq"
                },
                "name": "open-cluster-management:klusterlet-2q9eqos1qsf5l91tgu6eiequb7lp37oq-work:agent",
                "resourceVersion": "4100",
                "uid": "0bd62ac2-d4f0-414d-a4d9-75ab52c7b244"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "open-cluster-management:klusterlet-2q9eqos1qsf5l91tgu6eiequb7lp37oq-work:agent"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "klusterlet-2q9eqos1qsf5l91tgu6eiequb7lp37oq-work-sa",
                    "namespace": "open-cluster-management-2q9eqos1qsf5l91tgu6eiequb7lp37oq"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:12:59Z",
                "labels": {
                    "open-cluster-management.io/created-by-klusterlet": "klusterlet-2q9eqos1qsf5l91tgu6eiequb7lp37oq"
                },
                "name": "open-cluster-management:klusterlet-2q9eqos1qsf5l91tgu6eiequb7lp37oq-work:aggregate",
                "resourceVersion": "4102",
                "uid": "2afc369f-e993-4796-9f3e-680b028ee32a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "open-cluster-management:klusterlet-2q9eqos1qsf5l91tgu6eiequb7lp37oq-work:aggregate"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "klusterlet-2q9eqos1qsf5l91tgu6eiequb7lp37oq-work-sa",
                    "namespace": "open-cluster-management-2q9eqos1qsf5l91tgu6eiequb7lp37oq"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:12:59Z",
                "labels": {
                    "open-cluster-management.io/created-by-klusterlet": "klusterlet-2q9eqos1qsf5l91tgu6eiequb7lp37oq"
                },
                "name": "open-cluster-management:klusterlet-2q9eqos1qsf5l91tgu6eiequb7lp37oq-work:execution-admin",
                "resourceVersion": "4117",
                "uid": "02500be3-1e65-4a58-b086-f1227c4c7640"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "klusterlet-2q9eqos1qsf5l91tgu6eiequb7lp37oq-work-sa",
                    "namespace": "open-cluster-management-2q9eqos1qsf5l91tgu6eiequb7lp37oq"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:15:05Z",
                "name": "openshift-backplane-managed-scripts-reader",
                "resourceVersion": "5579",
                "uid": "432e646d-528b-494f-8fd3-2942706ef507"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-backplane-managed-scripts-reader"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-managed-scripts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "CSISnapshot",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T03:12:17Z",
                "name": "openshift-csi-snapshot-controller-role",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "adce030f-2578-4946-8b28-c0b5993e0934"
                    }
                ],
                "resourceVersion": "1093",
                "uid": "882da527-6be0-4470-89cc-6e0e98b08571"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-csi-snapshot-controller-runner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "csi-snapshot-controller",
                    "namespace": "openshift-cluster-storage-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:12:15Z",
                "name": "openshift-dns",
                "resourceVersion": "1034",
                "uid": "5069328d-c04a-473e-b9f9-b926df4621f7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-dns"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "dns",
                    "namespace": "openshift-dns"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T03:12:13Z",
                "name": "openshift-dns-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "adce030f-2578-4946-8b28-c0b5993e0934"
                    }
                ],
                "resourceVersion": "946",
                "uid": "c8a72cfb-69ae-4924-9d20-6423957fe074"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-dns-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "dns-operator",
                    "namespace": "openshift-dns-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocds.argoproj.io/name": "openshift-gitops",
                    "argocds.argoproj.io/namespace": "openshift-gitops"
                },
                "creationTimestamp": "2026-05-14T03:27:35Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "openshift-gitops",
                    "app.kubernetes.io/name": "argocd-application-controller",
                    "app.kubernetes.io/part-of": "argocd"
                },
                "name": "openshift-gitops-openshift-gitops-argocd-application-controller",
                "resourceVersion": "18609",
                "uid": "69161c12-b291-4bec-ba29-e04ab3708ac8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-gitops-openshift-gitops-argocd-application-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-argocd-application-controller",
                    "namespace": "openshift-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocds.argoproj.io/name": "openshift-gitops",
                    "argocds.argoproj.io/namespace": "openshift-gitops"
                },
                "creationTimestamp": "2026-05-14T03:27:36Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "openshift-gitops",
                    "app.kubernetes.io/name": "argocd-applicationset-controller",
                    "app.kubernetes.io/part-of": "argocd"
                },
                "name": "openshift-gitops-openshift-gitops-argocd-applicationset-controller",
                "resourceVersion": "18745",
                "uid": "3d8f8799-aabc-4593-b2d2-9884a93dcb67"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-gitops-openshift-gitops-argocd-applicationset-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-applicationset-controller",
                    "namespace": "openshift-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocds.argoproj.io/name": "openshift-gitops",
                    "argocds.argoproj.io/namespace": "openshift-gitops"
                },
                "creationTimestamp": "2026-05-14T03:27:35Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "openshift-gitops",
                    "app.kubernetes.io/name": "argocd-server",
                    "app.kubernetes.io/part-of": "argocd"
                },
                "name": "openshift-gitops-openshift-gitops-argocd-server",
                "resourceVersion": "18610",
                "uid": "2a72984d-d64f-498f-9e6b-9f8aedd89251"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-gitops-openshift-gitops-argocd-server"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-argocd-server",
                    "namespace": "openshift-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:27:18Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "openshift-gitops-operator.v1.20.3",
                    "olm.owner.kind": "ClusterServiceVersion",
                    "olm.owner.namespace": "openshift-operators",
                    "olm.permissions.hash": "993H94RKqE0J0pbKS5E8ldZBwC47Jht8qr5cEW",
                    "operators.coreos.com/openshift-gitops-operator.openshift-operators": ""
                },
                "name": "openshift-gitops-operato-6ecDQfQvnwLmJdrEMFiLx2iohajkwwpZJ1vzhp",
                "resourceVersion": "20507",
                "uid": "ce19105a-c109-4269-a67e-4987de8df8b1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-gitops-operato-6ecDQfQvnwLmJdrEMFiLx2iohajkwwpZJ1vzhp"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-operator-controller-manager",
                    "namespace": "openshift-operators"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:27:19Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "openshift-gitops-operator.v1.20.3",
                    "olm.owner.kind": "ClusterServiceVersion",
                    "olm.owner.namespace": "openshift-operators",
                    "olm.permissions.hash": "aqAv32Xm5CGdRrOHSGPnQu9xOxupACkltd8iJ1",
                    "operators.coreos.com/openshift-gitops-operator.openshift-operators": ""
                },
                "name": "openshift-gitops-operato-7dZc96pdcBCF2yHlvLNpxsecf0Tq8kgH84Jkxl",
                "resourceVersion": "17181",
                "uid": "2be4c66b-f57a-4f39-8ec9-9997c9283040"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-gitops-operato-7dZc96pdcBCF2yHlvLNpxsecf0Tq8kgH84Jkxl"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-operator-controller-manager",
                    "namespace": "openshift-operators"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:27:19Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "openshift-gitops-operator.v1.20.3",
                    "olm.owner.kind": "ClusterServiceVersion",
                    "olm.owner.namespace": "openshift-operators",
                    "operators.coreos.com/openshift-gitops-operator.openshift-operators": ""
                },
                "name": "openshift-gitops-operator-controller-manager-service-system:auth-delegator",
                "resourceVersion": "17188",
                "uid": "bcc2a057-a8d5-4bbe-8ac9-1d95a6525856"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:auth-delegator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-operator-controller-manager",
                    "namespace": "openshift-operators"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "imageregistry.operator.openshift.io/checksum": "sha256:9c18924fae4eab4651205fc268268a67bd4b9025164b242656ab8e009955b634"
                },
                "creationTimestamp": "2026-05-14T03:12:27Z",
                "name": "openshift-image-registry-pruner",
                "resourceVersion": "1646",
                "uid": "c8170deb-ce6c-4fd5-8da9-f5d2d4561174"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-pruner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pruner",
                    "namespace": "openshift-image-registry"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Ingress",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T03:12:22Z",
                "name": "openshift-ingress-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "adce030f-2578-4946-8b28-c0b5993e0934"
                    }
                ],
                "resourceVersion": "1224",
                "uid": "ed2c02bb-7771-434e-842d-1e6635e34f3e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-ingress-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "ingress-operator",
                    "namespace": "openshift-ingress-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:12:30Z",
                "name": "openshift-ingress-router",
                "resourceVersion": "1912",
                "uid": "eaa70742-3cf1-49f1-85bb-d8deb08108c6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-ingress-router"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "router",
                    "namespace": "openshift-ingress"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:12:58Z",
                "name": "openshift-iptables-alerter",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "31363e29-9212-46b6-8aaf-ce273e99531a"
                    }
                ],
                "resourceVersion": "4083",
                "uid": "6dfd379a-8640-4b5a-a662-196ed58d60c7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-iptables-alerter"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "iptables-alerter",
                    "namespace": "openshift-network-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:12:49Z",
                "name": "openshift-ovn-kubernetes-control-plane-limited",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "31363e29-9212-46b6-8aaf-ce273e99531a"
                    }
                ],
                "resourceVersion": "3752",
                "uid": "e5a438a2-f3e5-468b-a15f-eae018036792"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-ovn-kubernetes-control-plane-limited"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "ovn-kubernetes-control-plane",
                    "namespace": "openshift-ovn-kubernetes"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:12:47Z",
                "name": "openshift-ovn-kubernetes-node-identity-limited",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "31363e29-9212-46b6-8aaf-ce273e99531a"
                    }
                ],
                "resourceVersion": "3696",
                "uid": "0b22c203-b7fd-43a0-b5df-599b753b08b1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-ovn-kubernetes-node-limited"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:ovn-nodes"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:12:48Z",
                "name": "openshift-ovn-kubernetes-node-kube-rbac-proxy",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "31363e29-9212-46b6-8aaf-ce273e99531a"
                    }
                ],
                "resourceVersion": "3722",
                "uid": "02a83a73-d316-44f1-b219-30581f6390eb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-ovn-kubernetes-kube-rbac-proxy"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "ovn-kubernetes-node",
                    "namespace": "openshift-ovn-kubernetes"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:31:37Z",
                "name": "openshift-pipelines-clusterinterceptors",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-58zdl",
                        "uid": "8be6c30f-3948-4087-a22a-64115b2ea5ec"
                    }
                ],
                "resourceVersion": "27012",
                "uid": "5e61bef0-3da8-40c0-af54-f7f3a29f095f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-pipelines-clusterinterceptors"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "default"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "null"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "open-cluster-management-2q9eqos1qsf5l91tgu6eiequb7lp37oq"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "openshift"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "rhbk-operator"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "rhtpa-operator"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "trusted-artifact-signer"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "tssc"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "tssc-dh"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "tssc-gitops"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "tssc-keycloak"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "tssc-tas"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "tssc-tpa"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "tssc-app-ci"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "tssc-app-development"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "tssc-app-prod"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "tssc-app-stage"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:27:05Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "openshift-pipelines-operator-rh.v1.21.1",
                    "olm.owner.kind": "ClusterServiceVersion",
                    "olm.owner.namespace": "openshift-operators",
                    "olm.permissions.hash": "cB9Iy2FBLKMQGDnVL4GIqx6oSSGXR5pr72ehtu",
                    "operators.coreos.com/openshift-pipelines-operator-rh.openshift-operators": ""
                },
                "name": "openshift-pipelines-oper-1izJZYSaiUb7yNA85i2TaL9OB0mLdU057MDiKJ",
                "resourceVersion": "20137",
                "uid": "5003e520-cdbd-4adb-8f16-a17427b184dd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-pipelines-oper-1izJZYSaiUb7yNA85i2TaL9OB0mLdU057MDiKJ"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-pipelines-operator",
                    "namespace": "openshift-operators"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "cf4dc84d211c53faae8539d7482bd28c2933a9a0b7d4f15eeec304e8b46585f4"
                },
                "creationTimestamp": "2026-05-14T03:31:44Z",
                "labels": {
                    "operator.tekton.dev/operand-name": "tektoncd-pipelines"
                },
                "name": "openshift-pipelines-permission",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-mqfv6",
                        "uid": "d08871f1-80e2-4809-a6dc-cdc24c98da2f"
                    }
                ],
                "resourceVersion": "23774",
                "uid": "3bf16412-3fa9-465d-b695-592d55b90b7f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-pipelines-controller",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:22:42Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "cluster-monitoring-operator",
                    "app.kubernetes.io/part-of": "openshift-monitoring"
                },
                "name": "openshift-state-metrics",
                "resourceVersion": "11045",
                "uid": "305b0d1f-29a4-465c-8faa-14796db1f368"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-state-metrics"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-state-metrics",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:15:34Z",
                "name": "osd-cluster-admin",
                "resourceVersion": "6389",
                "uid": "4b0e36cd-3578-43c8-a87f-3b198aaf97ab"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "cluster-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:15:18Z",
                "name": "osd-delete-backplane-script-resources",
                "resourceVersion": "5974",
                "uid": "c4611c30-ed27-4e4a-bd6e-3944d9c16ed1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "osd-delete-backplane-script-resources"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "osd-backplane",
                    "namespace": "openshift-backplane-managed-scripts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:15:04Z",
                "name": "osd-delete-backplane-serviceaccounts-c0",
                "resourceVersion": "5538",
                "uid": "28e1305d-f614-4acc-bb02-7fddd1afaf93"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "osd-get-namespace"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:serviceaccount:openshift-backplane:osd-delete-backplane-serviceaccounts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:15:35Z",
                "name": "pcap-dedicated-admins",
                "resourceVersion": "6420",
                "uid": "68c56d57-dac1-4512-bba4-c108234b50ae"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pcap-dedicated-admins"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "fd381ee2e412ff90ede0583228879a4842f8856f1244529df218abea05bbe706"
                },
                "creationTimestamp": "2026-05-14T03:33:23Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "pipelines-as-code",
                    "app.kubernetes.io/version": "v0.39.5",
                    "operator.tekton.dev/operand-name": "openshift-pipeline-as-code"
                },
                "name": "pipelines-as-code-controller-clusterbinding",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "openshiftpipelinesascode-main-static-d6tqf",
                        "uid": "bbd3f34b-86e3-44d4-b46f-81d4b7119cd0"
                    }
                ],
                "resourceVersion": "26375",
                "uid": "1f790338-712e-4240-9061-e5db2c7a2a37"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipeline-as-code-controller-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipelines-as-code-controller",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "5529e95ca82171926cd1d853fe2d171111b1d507de1354c382f20ca30263f51c"
                },
                "creationTimestamp": "2026-05-14T03:33:23Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "pipelines-as-code",
                    "app.kubernetes.io/version": "v0.39.5",
                    "operator.tekton.dev/operand-name": "openshift-pipeline-as-code"
                },
                "name": "pipelines-as-code-watcher-clusterbinding",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "openshiftpipelinesascode-main-static-d6tqf",
                        "uid": "bbd3f34b-86e3-44d4-b46f-81d4b7119cd0"
                    }
                ],
                "resourceVersion": "26396",
                "uid": "0e6007f3-6933-4545-b7ab-6711f4481b6f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipeline-as-code-watcher-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipelines-as-code-watcher",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "6ca37258a5e5a78d698a9c3ec955039146811520d37eb9ec00b9ad7a11307690"
                },
                "creationTimestamp": "2026-05-14T03:33:23Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "pipelines-as-code",
                    "app.kubernetes.io/version": "v0.39.5",
                    "operator.tekton.dev/operand-name": "openshift-pipeline-as-code"
                },
                "name": "pipelines-as-code-webhook-clusterbinding",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "openshiftpipelinesascode-main-static-d6tqf",
                        "uid": "bbd3f34b-86e3-44d4-b46f-81d4b7119cd0"
                    }
                ],
                "resourceVersion": "26403",
                "uid": "7e946af2-3886-486e-9ecb-53a90c7baadb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipeline-as-code-webhook-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipelines-as-code-webhook",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:22:42Z",
                "labels": {
                    "app.kubernetes.io/component": "prometheus",
                    "app.kubernetes.io/instance": "k8s",
                    "app.kubernetes.io/managed-by": "cluster-monitoring-operator",
                    "app.kubernetes.io/name": "prometheus",
                    "app.kubernetes.io/part-of": "openshift-monitoring",
                    "app.kubernetes.io/version": "2.55.1"
                },
                "name": "prometheus-k8s",
                "resourceVersion": "11050",
                "uid": "da734c47-8074-4567-9fda-5bedbaaec61c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:22:32Z",
                "labels": {
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/managed-by": "cluster-monitoring-operator",
                    "app.kubernetes.io/name": "prometheus-operator",
                    "app.kubernetes.io/part-of": "openshift-monitoring",
                    "app.kubernetes.io/version": "0.78.1"
                },
                "name": "prometheus-operator",
                "resourceVersion": "10549",
                "uid": "1895d280-f2f9-4b65-a815-2b1abb2fd998"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "prometheus-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-operator",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "ImageRegistry",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T03:12:08Z",
                "name": "registry-monitoring",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "adce030f-2578-4946-8b28-c0b5993e0934"
                    }
                ],
                "resourceVersion": "722",
                "uid": "4fd5e957-7155-4792-94e4-715973760e2e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "registry-monitoring"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "imageregistry.operator.openshift.io/checksum": "sha256:74248883530fac21ef97d7c550c5f486050f236de11e2021e1f5961957eb75bc"
                },
                "creationTimestamp": "2026-05-14T03:12:29Z",
                "name": "registry-registry-role",
                "resourceVersion": "1801",
                "uid": "950619e8-951f-438a-9fc9-406221846e79"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:registry"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "registry",
                    "namespace": "openshift-image-registry"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:26:39Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "rhbk-operator.v26.4.11-opr.2",
                    "olm.owner.kind": "ClusterServiceVersion",
                    "olm.owner.namespace": "rhbk-operator",
                    "olm.permissions.hash": "601EkWriCgdERFy91x6Tt8GI77v3NygFZMmv1W",
                    "operators.coreos.com/rhbk-operator.rhbk-operator": ""
                },
                "name": "rhbk-operator.v26.4.11-o-57ZCOUu8s455UodJ9Q1U28Blaq0hU0IQr7AwDE",
                "resourceVersion": "15495",
                "uid": "bebe06b8-072b-44ce-a511-ff7b1bfd5fb0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "rhbk-operator.v26.4.11-o-57ZCOUu8s455UodJ9Q1U28Blaq0hU0IQr7AwDE"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "rhbk-operator",
                    "namespace": "rhbk-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "meta.helm.sh/release-name": "tssc-infrastructure",
                    "meta.helm.sh/release-namespace": "tssc"
                },
                "creationTimestamp": "2026-05-14T03:28:42Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "Helm"
                },
                "name": "rhdh-kubernetes-plugin",
                "resourceVersion": "20924",
                "uid": "259e8b58-046b-43d4-99ac-c5d663a71bc0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "rhdh-kubernetes-plugin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "rhdh-kubernetes-plugin",
                    "namespace": "tssc"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:26:57Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "rhdh-operator.v1.9.4",
                    "olm.owner.kind": "ClusterServiceVersion",
                    "olm.owner.namespace": "openshift-operators",
                    "olm.permissions.hash": "cINOSdlRVExWGPrS9B6948AWpub9ZOcaziHipA",
                    "operators.coreos.com/rhdh.openshift-operators": ""
                },
                "name": "rhdh-operator.v1.9.4-58m0nmjheUl8Ka3RwCLwu4RhvkuVSYKjqTtA30",
                "resourceVersion": "19873",
                "uid": "497d3aeb-7754-4735-bad3-28b173ec2341"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "rhdh-operator.v1.9.4-58m0nmjheUl8Ka3RwCLwu4RhvkuVSYKjqTtA30"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "rhdh-controller-manager",
                    "namespace": "openshift-operators"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:26:57Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "rhdh-operator.v1.9.4",
                    "olm.owner.kind": "ClusterServiceVersion",
                    "olm.owner.namespace": "openshift-operators",
                    "olm.permissions.hash": "7PJxGMaoD2vAwcWHHxXXt9q6jpholdLFoaVeXN",
                    "operators.coreos.com/rhdh.openshift-operators": ""
                },
                "name": "rhdh-operator.v1.9.4-rhd-aLDt04vakp3HDjfCw7K9S3Ven0p91ezU2S9VEh",
                "resourceVersion": "16000",
                "uid": "a8cc73f2-2106-4d1d-95d2-c5a74330f98b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "rhdh-operator.v1.9.4-rhd-aLDt04vakp3HDjfCw7K9S3Ven0p91ezU2S9VEh"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "rhdh-controller-manager",
                    "namespace": "openshift-operators"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:27:23Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "rhtas-operator.v1.3.4",
                    "olm.owner.kind": "ClusterServiceVersion",
                    "olm.owner.namespace": "openshift-operators",
                    "olm.permissions.hash": "96vbPO04rdFCdvUctEydY98vE4KPeG2Pv7d7zu",
                    "operators.coreos.com/rhtas-operator.openshift-operators": ""
                },
                "name": "rhtas-operator.v1.3.4-13oKXws6qzRZWDEKMoWqdWEMvG9AS3l0fNPQnl",
                "resourceVersion": "20615",
                "uid": "c658bb52-6083-4ad7-ad2c-4c4078db1c13"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "rhtas-operator.v1.3.4-13oKXws6qzRZWDEKMoWqdWEMvG9AS3l0fNPQnl"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "rhtas-operator-controller-manager",
                    "namespace": "openshift-operators"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:27:23Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "rhtas-operator.v1.3.4",
                    "olm.owner.kind": "ClusterServiceVersion",
                    "olm.owner.namespace": "openshift-operators",
                    "olm.permissions.hash": "i7bTIKZBx8FqjvSrhZBs4xBUckmilYzg7RKFC",
                    "operators.coreos.com/rhtas-operator.openshift-operators": ""
                },
                "name": "rhtas-operator.v1.3.4-rh-6jkXqEAFvzZGw4NCzsx1aZqPAnGtMfvcYMAjoa",
                "resourceVersion": "17408",
                "uid": "b0c958eb-2fad-4208-aaa1-781cbc864fa1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "rhtas-operator.v1.3.4-rh-6jkXqEAFvzZGw4NCzsx1aZqPAnGtMfvcYMAjoa"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "rhtas-operator-controller-manager",
                    "namespace": "openshift-operators"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:30:28Z",
                "labels": {
                    "app.kubernetes.io/component": "segment-backup-installation",
                    "app.kubernetes.io/instance": "trusted-artifact-signer",
                    "app.kubernetes.io/instance-namespace": "tssc-tas",
                    "app.kubernetes.io/managed-by": "controller-manager",
                    "app.kubernetes.io/name": "segment-backup-nightly-metrics",
                    "app.kubernetes.io/part-of": "trusted-artifact-signer"
                },
                "name": "rhtas-segment-backup-job-tssc-tas-clusterMonitoringRoleBinding",
                "resourceVersion": "22180",
                "uid": "e88c8903-f98f-4c05-a53f-f4678a687994"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-monitoring-view"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "rhtas-segment-backup-job",
                    "namespace": "tssc-tas"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:30:28Z",
                "labels": {
                    "app.kubernetes.io/component": "segment-backup-installation",
                    "app.kubernetes.io/instance": "trusted-artifact-signer",
                    "app.kubernetes.io/instance-namespace": "tssc-tas",
                    "app.kubernetes.io/managed-by": "controller-manager",
                    "app.kubernetes.io/name": "segment-backup-nightly-metrics",
                    "app.kubernetes.io/part-of": "trusted-artifact-signer"
                },
                "name": "rhtas-segment-backup-job-tssc-tas-clusterRoleBinding",
                "resourceVersion": "22185",
                "uid": "ea02e9a5-a99c-4bde-8925-1ec5021b455d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "rhtas-segment-backup-job-tssc-tas-clusterRole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "rhtas-segment-backup-job",
                    "namespace": "tssc-tas"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:26:56Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "rhtpa-operator.v1.1.4"
                },
                "name": "rhtpa-operator-ingress-reader-binding",
                "resourceVersion": "15974",
                "uid": "4078637f-4906-4a97-8c3c-7905c614dd59"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "ingress-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "rhtpa-operator-controller-manager",
                    "namespace": "placeholder"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:27:00Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "rhtpa-operator.v1.1.4",
                    "olm.owner.kind": "ClusterServiceVersion",
                    "olm.owner.namespace": "tssc-tpa",
                    "olm.permissions.hash": "8PXSADb09lBK9rkRoHlNoYjAigR6vzp1F4bkUF",
                    "operators.coreos.com/rhtpa-operator.tssc-tpa": ""
                },
                "name": "rhtpa-operator.v1.1.4-9ERpfzcngD8VAOIgo3Ykh9yLq66wyDBIbjpBO9",
                "resourceVersion": "16718",
                "uid": "f2d33869-97f4-47e2-b70e-4c10a2e34509"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "rhtpa-operator.v1.1.4-9ERpfzcngD8VAOIgo3Ykh9yLq66wyDBIbjpBO9"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "rhtpa-operator-controller-manager",
                    "namespace": "tssc-tpa"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:12:30Z",
                "name": "router-monitoring",
                "resourceVersion": "1955",
                "uid": "171fa3ac-7057-45fe-acb8-80cddb0d6c0d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "router-monitoring"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:44Z",
                "name": "self-access-reviewers",
                "resourceVersion": "415",
                "uid": "398aa5a3-b931-43de-b0b5-1600c0b932c7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "self-access-reviewer"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:44Z",
                "name": "self-provisioners",
                "resourceVersion": "416",
                "uid": "5b7d9fde-db6c-432d-8687-f418a3dcb012"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "self-provisioner"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated:oauth"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:22:02Z",
                "name": "storage-version-migration-migrator",
                "resourceVersion": "9379",
                "uid": "a07cb771-196f-4e6e-af03-b513970610e5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kube-storage-version-migrator-sa",
                    "namespace": "openshift-kube-storage-version-migrator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:12:26Z",
                "labels": {
                    "hypershift.openshift.io/managed": "true"
                },
                "name": "system-bootstrap-node-renewal",
                "resourceVersion": "1509",
                "uid": "1f986b17-ae3b-4b90-88a9-fac56ad74847"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:certificates.k8s.io:certificatesigningrequests:selfnodeclient"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:nodes"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:34Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:basic-user",
                "resourceVersion": "212",
                "uid": "3eb43b0a-81fa-47f8-a31b-a461b16161aa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:basic-user"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:44Z",
                "name": "system:build-strategy-docker-binding",
                "resourceVersion": "423",
                "uid": "bd4befef-31d4-4a36-be35-b3f5042f48f1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:build-strategy-docker"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:44Z",
                "name": "system:build-strategy-jenkinspipeline-binding",
                "resourceVersion": "425",
                "uid": "da03e447-daec-4643-9e86-13067ac42c24"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:build-strategy-jenkinspipeline"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:44Z",
                "name": "system:build-strategy-source-binding",
                "resourceVersion": "424",
                "uid": "82d209e2-eb9e-43d1-9413-a8d52572dbcf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:build-strategy-source"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:34Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:attachdetach-controller",
                "resourceVersion": "223",
                "uid": "4b355bb0-822b-48d5-86c9-ab307d8e6206"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:attachdetach-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "attachdetach-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:34Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:certificate-controller",
                "resourceVersion": "249",
                "uid": "ca417b16-0c86-4828-a3c9-4e159f7b7973"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:certificate-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "certificate-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:34Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:clusterrole-aggregation-controller",
                "resourceVersion": "224",
                "uid": "5675e6d9-c920-4d37-889b-07882a1bfa35"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:clusterrole-aggregation-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "clusterrole-aggregation-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:34Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:cronjob-controller",
                "resourceVersion": "225",
                "uid": "8045ed85-9085-4e01-b153-27c1317590aa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:cronjob-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cronjob-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:34Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:daemon-set-controller",
                "resourceVersion": "226",
                "uid": "8cacc3d9-d6ba-45a6-9b52-bbe353575caf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:daemon-set-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "daemon-set-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:34Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:deployment-controller",
                "resourceVersion": "227",
                "uid": "95bf101b-7f58-4990-b366-603b6e89f55b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:deployment-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployment-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:34Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:disruption-controller",
                "resourceVersion": "228",
                "uid": "eed2225a-237e-4be0-8cd7-fae60f36d332"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:disruption-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "disruption-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:34Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:endpoint-controller",
                "resourceVersion": "229",
                "uid": "5f8df147-4841-4c28-b4b3-c58261528aee"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:endpoint-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "endpoint-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:34Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:endpointslice-controller",
                "resourceVersion": "230",
                "uid": "97b3d44e-3486-4436-967d-8c09540fa5f1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:endpointslice-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "endpointslice-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:34Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:endpointslicemirroring-controller",
                "resourceVersion": "231",
                "uid": "2a56ac58-6a1c-43a9-8ad0-a1a8a6d2f95e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:endpointslicemirroring-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "endpointslicemirroring-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:34Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:ephemeral-volume-controller",
                "resourceVersion": "233",
                "uid": "8d807f6f-c302-4a9c-8dc9-af38bcc69d14"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:ephemeral-volume-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "ephemeral-volume-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:34Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:expand-controller",
                "resourceVersion": "232",
                "uid": "eaad8aa5-7fed-4d4d-9349-6c05a0e56404"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:expand-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "expand-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:34Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:generic-garbage-collector",
                "resourceVersion": "234",
                "uid": "f8c21e91-578f-4af4-8cf6-a1ddc3a21637"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:generic-garbage-collector"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "generic-garbage-collector",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:34Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:horizontal-pod-autoscaler",
                "resourceVersion": "448",
                "uid": "2806e914-969f-42ba-9d14-52c40dafbebd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:horizontal-pod-autoscaler"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "horizontal-pod-autoscaler",
                    "namespace": "kube-system"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "horizontal-pod-autoscaler",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:34Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:job-controller",
                "resourceVersion": "236",
                "uid": "6442c302-8982-479f-ba15-4cd189848c3a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:job-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "job-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:34Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:legacy-service-account-token-cleaner",
                "resourceVersion": "256",
                "uid": "2d427775-1dcc-41c3-8589-1395cc1c0b25"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:legacy-service-account-token-cleaner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "legacy-service-account-token-cleaner",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:34Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:namespace-controller",
                "resourceVersion": "237",
                "uid": "624bb160-8f70-40da-b8d5-db1021c97b7f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:namespace-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "namespace-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:34Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:node-controller",
                "resourceVersion": "238",
                "uid": "bf332a0e-f826-4a65-bd6e-ab4cf2935a90"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:node-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "node-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:34Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:persistent-volume-binder",
                "resourceVersion": "239",
                "uid": "09b6cb41-6d04-4fd8-97ac-ddb22d5c8efc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:persistent-volume-binder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "persistent-volume-binder",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:34Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:pod-garbage-collector",
                "resourceVersion": "240",
                "uid": "2a139c66-d6c4-4e30-a632-21cfaa63b734"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:pod-garbage-collector"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pod-garbage-collector",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:34Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:pv-protection-controller",
                "resourceVersion": "251",
                "uid": "51b7fb1e-b01f-4a3a-a7d7-8784bda3936a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:pv-protection-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pv-protection-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:34Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:pvc-protection-controller",
                "resourceVersion": "250",
                "uid": "a8a85531-1d60-47f2-9137-ce3bd6e1fc08"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:pvc-protection-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pvc-protection-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:34Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:replicaset-controller",
                "resourceVersion": "241",
                "uid": "871a52e1-ba44-4b02-864e-b803d1a450e1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:replicaset-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "replicaset-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:34Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:replication-controller",
                "resourceVersion": "242",
                "uid": "90273a20-c5f6-4dcd-9fa9-23f641802a70"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:replication-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "replication-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:34Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:resourcequota-controller",
                "resourceVersion": "243",
                "uid": "8ae95c24-8fce-42ac-b98a-627f7d860943"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:resourcequota-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "resourcequota-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:34Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:root-ca-cert-publisher",
                "resourceVersion": "253",
                "uid": "2a790ab0-9ee6-4155-b88f-3dd6bff44b13"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:root-ca-cert-publisher"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "root-ca-cert-publisher",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:34Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:route-controller",
                "resourceVersion": "244",
                "uid": "e88ae4e9-cf30-42b9-9716-7e9b18fb90a2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:route-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "route-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:34Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:service-account-controller",
                "resourceVersion": "245",
                "uid": "8d677369-adc2-4be3-b5d0-6436498ec25c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:service-account-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "service-account-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:34Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:service-ca-cert-publisher",
                "resourceVersion": "254",
                "uid": "fbee3ba8-fb5f-4326-bd40-c4701ef1e35c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:service-ca-cert-publisher"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "service-ca-cert-publisher",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:34Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:service-controller",
                "resourceVersion": "246",
                "uid": "7122c59f-5d4c-4e8c-97d9-2eaa9af06988"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:service-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "service-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:34Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:statefulset-controller",
                "resourceVersion": "247",
                "uid": "1db91833-2219-4103-8c68-0739c0d0d826"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:statefulset-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "statefulset-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:34Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:ttl-after-finished-controller",
                "resourceVersion": "252",
                "uid": "f7df699b-15e2-4c43-ba3a-107ccceef811"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:ttl-after-finished-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "ttl-after-finished-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:34Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:ttl-controller",
                "resourceVersion": "248",
                "uid": "2b3aa6a9-e13b-4847-9518-a0d7df57489e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:ttl-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "ttl-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:34Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:validatingadmissionpolicy-status-controller",
                "resourceVersion": "255",
                "uid": "78ab5889-1525-474f-b321-42b9693e8808"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:validatingadmissionpolicy-status-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "validatingadmissionpolicy-status-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:12:27Z",
                "labels": {
                    "hypershift.openshift.io/managed": "true"
                },
                "name": "system:deployer",
                "resourceVersion": "1534",
                "uid": "97dbd384-831d-4674-aa83-560bf26d6058"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "default-rolebindings-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:34Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:discovery",
                "resourceVersion": "211",
                "uid": "898d93e5-7672-4732-bd57-10db4b979641"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:discovery"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:44Z",
                "name": "system:image-builder",
                "resourceVersion": "451",
                "uid": "31053714-3959-49a9-b094-31f86394b6cf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "default-rolebindings-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:44Z",
                "name": "system:image-puller",
                "resourceVersion": "450",
                "uid": "50a48c3e-fba6-4981-9ac7-15e41b91d965"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "default-rolebindings-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:34Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:kube-controller-manager",
                "resourceVersion": "216",
                "uid": "fbac242f-2605-48a6-a6b1-7bfa2b4285ab"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:kube-controller-manager"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:kube-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:34Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:kube-dns",
                "resourceVersion": "217",
                "uid": "eab56f96-48a9-413f-a606-b2e45a535a21"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:kube-dns"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kube-dns",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:34Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:kube-scheduler",
                "resourceVersion": "218",
                "uid": "fbc2f090-739c-4ec9-bc7f-2677453b6dba"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:kube-scheduler"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:kube-scheduler"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:43Z",
                "name": "system:masters",
                "resourceVersion": "410",
                "uid": "62587379-202b-4e9f-aeed-1a1b5fea4eab"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:master"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:masters"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:22:43Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "cluster-monitoring-operator",
                    "app.kubernetes.io/name": "metrics-server",
                    "app.kubernetes.io/part-of": "openshift-monitoring"
                },
                "name": "system:metrics-server",
                "resourceVersion": "11142",
                "uid": "40e930d0-7f04-4077-a110-883af63c22fb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:metrics-server"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "metrics-server",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:34Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:monitoring",
                "resourceVersion": "210",
                "uid": "9869bbc7-7a90-4da6-a080-418a1b7645da"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:monitoring"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:34Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:node",
                "resourceVersion": "220",
                "uid": "8e092c56-46f9-4504-93d8-138b6f693a9b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:node"
            }
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:34Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:node-admin",
                "resourceVersion": "222",
                "uid": "a5fd8c27-a87c-4cfc-bcdb-d9e96d1d487e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:node-admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:master"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:kube-apiserver"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:node-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:43Z",
                "name": "system:node-admins",
                "resourceVersion": "411",
                "uid": "e0cd5585-0cce-421c-89f9-15ab1787618d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:node-admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:master"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:node-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:44Z",
                "name": "system:node-bootstrapper",
                "resourceVersion": "426",
                "uid": "4260cafe-0343-49c5-90bb-8b1ee36057ce"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:node-bootstrapper"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "node-bootstrapper",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:34Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:node-proxier",
                "resourceVersion": "215",
                "uid": "a127c5e9-1ae7-476d-802a-d2a66f7463d6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:node-proxier"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:kube-proxy"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:44Z",
                "name": "system:node-proxiers",
                "resourceVersion": "419",
                "uid": "f71f1de3-5aba-4783-b309-1e560b8bda00"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:node-proxier"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:nodes"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:44Z",
                "name": "system:oauth-token-deleters",
                "resourceVersion": "417",
                "uid": "5b7d0ac1-e301-4537-8566-a6ebbed338ff"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:oauth-token-deleter"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:44Z",
                "name": "system:openshift:controller:build-config-change-controller",
                "resourceVersion": "430",
                "uid": "a08f2a2f-ca31-413e-991f-abe0910b80ee"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:build-config-change-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "build-config-change-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:44Z",
                "name": "system:openshift:controller:build-controller",
                "resourceVersion": "429",
                "uid": "ccf6aeb9-0022-4bb0-90f7-e206adc5417f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:build-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "build-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:12:26Z",
                "labels": {
                    "hypershift.openshift.io/managed": "true"
                },
                "name": "system:openshift:controller:cluster-csr-approver-controller",
                "resourceVersion": "1505",
                "uid": "e9b94317-92fb-449b-8603-1b8b8725d37a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:cluster-csr-approver-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-csr-approver-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:44Z",
                "name": "system:openshift:controller:cluster-quota-reconciliation-controller",
                "resourceVersion": "442",
                "uid": "112252ee-3b34-4b7f-8abc-e9314c1825ca"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:cluster-quota-reconciliation-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-quota-reconciliation-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:44Z",
                "name": "system:openshift:controller:default-rolebindings-controller",
                "resourceVersion": "452",
                "uid": "1f92f9b0-ecb5-42b6-a6d1-a58d33068757"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:default-rolebindings-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "default-rolebindings-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:44Z",
                "name": "system:openshift:controller:deployer-controller",
                "resourceVersion": "431",
                "uid": "65071c46-2e37-4bcd-a3de-4c1a66304635"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:deployer-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:44Z",
                "name": "system:openshift:controller:deploymentconfig-controller",
                "resourceVersion": "432",
                "uid": "78eec839-412b-41a0-a526-22a7442fac7e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:deploymentconfig-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deploymentconfig-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:44Z",
                "name": "system:openshift:controller:horizontal-pod-autoscaler",
                "resourceVersion": "447",
                "uid": "c63bc5bb-3aba-4c42-bfc5-43ea86ef22a9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:horizontal-pod-autoscaler"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "horizontal-pod-autoscaler",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:44Z",
                "name": "system:openshift:controller:image-import-controller",
                "resourceVersion": "441",
                "uid": "904ff865-6428-4714-b74d-0731de5b6ac0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:image-import-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "image-import-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:44Z",
                "name": "system:openshift:controller:image-trigger-controller",
                "resourceVersion": "440",
                "uid": "0ee81cfa-3cb3-46c8-9e0a-05c6ad53f31d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:image-trigger-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "image-trigger-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T03:12:16Z",
                "name": "system:openshift:controller:machine-approver",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "adce030f-2578-4946-8b28-c0b5993e0934"
                    }
                ],
                "resourceVersion": "1075",
                "uid": "c1e263c6-fede-4e74-93df-06ef9ece0b5a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:machine-approver"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "machine-approver-sa",
                    "namespace": "openshift-cluster-machine-approver"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:12:26Z",
                "labels": {
                    "hypershift.openshift.io/managed": "true"
                },
                "name": "system:openshift:controller:namespace-security-allocation-controller",
                "resourceVersion": "1507",
                "uid": "c428943b-4b6b-4905-acf1-3e89cd2eb348"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:namespace-security-allocation-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "namespace-security-allocation-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:44Z",
                "name": "system:openshift:controller:origin-namespace-controller",
                "resourceVersion": "437",
                "uid": "7e483fe9-9bcb-47b9-92d2-68e954c47463"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:origin-namespace-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "origin-namespace-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:12:27Z",
                "labels": {
                    "hypershift.openshift.io/managed": "true"
                },
                "name": "system:openshift:controller:podsecurity-admission-label-syncer-controller",
                "resourceVersion": "1530",
                "uid": "ecabbf68-0636-45a8-b38f-c79db04723e3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:podsecurity-admission-label-syncer-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "podsecurity-admission-label-syncer-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:12:27Z",
                "labels": {
                    "hypershift.openshift.io/managed": "true"
                },
                "name": "system:openshift:controller:privileged-namespaces-psa-label-syncer",
                "resourceVersion": "1532",
                "uid": "e50195ef-7abc-44f0-91de-6c9cafddf012"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:privileged-namespaces-psa-label-syncer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "privileged-namespaces-psa-label-syncer",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:44Z",
                "name": "system:openshift:controller:pv-recycler-controller",
                "resourceVersion": "445",
                "uid": "07b855af-c492-4a2b-9156-012af59b78b3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:pv-recycler-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pv-recycler-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:44Z",
                "name": "system:openshift:controller:resourcequota-controller",
                "resourceVersion": "446",
                "uid": "06240ebc-e034-4a27-a32e-1b2f63f891f3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:resourcequota-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "resourcequota-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:22:03Z",
                "name": "system:openshift:controller:service-ca",
                "resourceVersion": "9460",
                "uid": "39860120-6908-4f39-b635-3ce47c0582a1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:service-ca"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "service-ca",
                    "namespace": "openshift-service-ca"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:44Z",
                "name": "system:openshift:controller:service-ingress-ip-controller",
                "resourceVersion": "444",
                "uid": "5b01bc98-1f5f-4e5d-ba92-3f2cc5ec1897"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:service-ingress-ip-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "service-ingress-ip-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:44Z",
                "name": "system:openshift:controller:serviceaccount-controller",
                "resourceVersion": "438",
                "uid": "b5e68c44-79c1-4293-a788-eb424af45ab8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:serviceaccount-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "serviceaccount-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:44Z",
                "name": "system:openshift:controller:serviceaccount-pull-secrets-controller",
                "resourceVersion": "439",
                "uid": "99bdab6c-57dd-4e6f-986d-ca382284b063"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:serviceaccount-pull-secrets-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "serviceaccount-pull-secrets-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:44Z",
                "name": "system:openshift:controller:template-instance-controller",
                "resourceVersion": "433",
                "uid": "4a853c6d-8568-4a43-a795-242dac508d91"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:template-instance-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "template-instance-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:44Z",
                "name": "system:openshift:controller:template-instance-controller:admin",
                "resourceVersion": "434",
                "uid": "1f669d08-6780-4341-b6cf-ff541b838370"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "template-instance-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:44Z",
                "name": "system:openshift:controller:template-instance-finalizer-controller",
                "resourceVersion": "435",
                "uid": "ae08976a-6ea4-46dc-926f-952484946c7b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:template-instance-finalizer-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "template-instance-finalizer-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:44Z",
                "name": "system:openshift:controller:template-instance-finalizer-controller:admin",
                "resourceVersion": "436",
                "uid": "33c51d5c-edc5-4c55-9793-4a9b4824a751"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "template-instance-finalizer-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:44Z",
                "name": "system:openshift:controller:template-service-broker",
                "resourceVersion": "449",
                "uid": "948eba35-60e2-4211-b28f-f4720f84fd9e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:template-service-broker"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "template-service-broker",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:44Z",
                "name": "system:openshift:controller:unidling-controller",
                "resourceVersion": "443",
                "uid": "fda1e757-b966-460e-b0c6-f8247eb56445"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:unidling-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "unidling-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:44Z",
                "name": "system:openshift:discovery",
                "resourceVersion": "422",
                "uid": "be96daab-496d-4d9c-a854-0e9019ef510c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:discovery"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:12:27Z",
                "labels": {
                    "hypershift.openshift.io/managed": "true"
                },
                "name": "system:openshift:openshift-controller-manager:image-trigger-controller",
                "resourceVersion": "1528",
                "uid": "82e4b673-7cdb-47f5-8a06-21cabe2c3770"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:openshift-controller-manager:image-trigger-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "image-trigger-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:12:26Z",
                "labels": {
                    "hypershift.openshift.io/managed": "true"
                },
                "name": "system:openshift:openshift-controller-manager:ingress-to-route-controller",
                "resourceVersion": "1506",
                "uid": "c9e5ce4f-0521-4401-924b-b134fc4adc35"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:openshift-controller-manager:ingress-to-route-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "ingress-to-route-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T03:12:14Z",
                "name": "system:openshift:operator:authentication",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "adce030f-2578-4946-8b28-c0b5993e0934"
                    }
                ],
                "resourceVersion": "1006",
                "uid": "e83c138d-2091-48a1-93c9-72b0f27689be"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "authentication-operator",
                    "namespace": "openshift-authentication-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T03:12:12Z",
                "name": "system:openshift:operator:cluster-kube-scheduler-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "adce030f-2578-4946-8b28-c0b5993e0934"
                    }
                ],
                "resourceVersion": "918",
                "uid": "44b1f8bb-6fd8-485a-807e-95ee4b1112d2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-kube-scheduler-operator",
                    "namespace": "openshift-kube-scheduler-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T03:12:28Z",
                "name": "system:openshift:operator:kube-apiserver-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "adce030f-2578-4946-8b28-c0b5993e0934"
                    }
                ],
                "resourceVersion": "1759",
                "uid": "06179d3b-bc2c-49ab-a65f-c2a5a237efdd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kube-apiserver-operator",
                    "namespace": "openshift-kube-apiserver-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T03:12:14Z",
                "name": "system:openshift:operator:kube-controller-manager-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "adce030f-2578-4946-8b28-c0b5993e0934"
                    }
                ],
                "resourceVersion": "997",
                "uid": "7acb770e-fdcc-4795-b458-581da9da4701"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kube-controller-manager-operator",
                    "namespace": "openshift-kube-controller-manager-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true"
                },
                "creationTimestamp": "2026-05-14T03:12:15Z",
                "name": "system:openshift:operator:kube-storage-version-migrator-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "adce030f-2578-4946-8b28-c0b5993e0934"
                    }
                ],
                "resourceVersion": "1052",
                "uid": "fef58f80-4904-4d00-b021-95b61115fc05"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kube-storage-version-migrator-operator",
                    "namespace": "openshift-kube-storage-version-migrator-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T03:12:14Z",
                "name": "system:openshift:operator:openshift-apiserver-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "adce030f-2578-4946-8b28-c0b5993e0934"
                    }
                ],
                "resourceVersion": "994",
                "uid": "1f2516cc-f320-4fe3-b963-aa4df98f77c5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-apiserver-operator",
                    "namespace": "openshift-apiserver-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T03:12:29Z",
                "name": "system:openshift:operator:openshift-config-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "adce030f-2578-4946-8b28-c0b5993e0934"
                    }
                ],
                "resourceVersion": "1822",
                "uid": "4d5905f7-a19b-40dc-b7f1-87b9df613d9b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-config-operator",
                    "namespace": "openshift-config-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T03:12:14Z",
                "name": "system:openshift:operator:openshift-controller-manager-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "adce030f-2578-4946-8b28-c0b5993e0934"
                    }
                ],
                "resourceVersion": "993",
                "uid": "b2a60cb7-b293-4e9f-a1aa-d21f5fc6d38d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-controller-manager-operator",
                    "namespace": "openshift-controller-manager-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T03:12:08Z",
                "name": "system:openshift:operator:service-ca-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "adce030f-2578-4946-8b28-c0b5993e0934"
                    }
                ],
                "resourceVersion": "688",
                "uid": "3ce329a8-e162-4c30-892b-53018bfae91b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "service-ca-operator",
                    "namespace": "openshift-service-ca-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:34Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:openshift:public-info-viewer",
                "resourceVersion": "214",
                "uid": "42576fc4-7c97-4b4f-834e-0a3764fce926"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:public-info-viewer"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:unauthenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T03:12:19Z",
                "name": "system:openshift:scc:restricted-v2",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "adce030f-2578-4946-8b28-c0b5993e0934"
                    }
                ],
                "resourceVersion": "1167",
                "uid": "bbc3665c-f8ca-4f65-a7c1-e62d3e517c93"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:scc:restricted-v2"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:12:27Z",
                "labels": {
                    "hypershift.openshift.io/managed": "true"
                },
                "name": "system:openshift:useroauthaccesstoken-manager",
                "resourceVersion": "1536",
                "uid": "48cddb04-780f-4f2d-a4d1-5a4dabf586fb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:useroauthaccesstoken-manager"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated:oauth"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:34Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:public-info-viewer",
                "resourceVersion": "213",
                "uid": "f70dc4ca-ddff-4613-bf1a-1653088b0d5f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:public-info-viewer"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:unauthenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:44Z",
                "name": "system:scope-impersonation",
                "resourceVersion": "428",
                "uid": "93743b22-3be0-4f9a-bb31-06e29bf8ff79"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:scope-impersonation"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:44Z",
                "name": "system:sdn-readers",
                "resourceVersion": "420",
                "uid": "99a8f211-0771-4b57-b5b4-a66d646456c9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:sdn-reader"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:nodes"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:34Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:service-account-issuer-discovery",
                "resourceVersion": "221",
                "uid": "26c99db3-0846-4c77-8dd9-6c5922b73a25"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:service-account-issuer-discovery"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:34Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:volume-scheduler",
                "resourceVersion": "219",
                "uid": "7f9a588b-f3f1-41c3-a0c2-9c9c61ab1870"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:volume-scheduler"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:kube-scheduler"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T03:11:44Z",
                "name": "system:webhooks",
                "resourceVersion": "421",
                "uid": "30462541-a8d9-4de7-9daa-f78aee3e6a1c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:webhook"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "3e6e055c298a487c39fc4580491a85ebfa2a361d47c5a2fd6cc10a6f3346e812"
                },
                "creationTimestamp": "2026-05-14T03:32:27Z",
                "labels": {
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-chains",
                    "operator.tekton.dev/operand-name": "tektoncd-chains"
                },
                "name": "tekton-chains-controller-cluster-access",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "chain-d769w",
                        "uid": "dae7a9c2-5e0c-4717-97cb-bc8315150405"
                    }
                ],
                "resourceVersion": "24923",
                "uid": "ae4c94bd-4e11-405d-98f4-11e9745b87db"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-chains-controller-cluster-access"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-chains-controller",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "6c14694e8ca1d40c8c9a571294d13e63057a9d009342846046962bd4354039ef"
                },
                "creationTimestamp": "2026-05-14T03:32:27Z",
                "labels": {
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-chains",
                    "operator.tekton.dev/operand-name": "tektoncd-chains"
                },
                "name": "tekton-chains-controller-tenant-access",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "chain-d769w",
                        "uid": "dae7a9c2-5e0c-4717-97cb-bc8315150405"
                    }
                ],
                "resourceVersion": "24924",
                "uid": "0eb04eb5-7fd4-4ec6-a2d1-aa843c1d63aa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-chains-controller-tenant-access"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-chains-controller",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "adde1d634b0cf9f5c5f0060ed38a7018d69aea6b1c552efc454a77450a9e689c"
                },
                "creationTimestamp": "2026-05-14T03:31:44Z",
                "labels": {
                    "operator.tekton.dev/operand-name": "tektoncd-pipelines"
                },
                "name": "tekton-clustertasks-view-rolebinding-all-users",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-mqfv6",
                        "uid": "d08871f1-80e2-4809-a6dc-cdc24c98da2f"
                    }
                ],
                "resourceVersion": "23775",
                "uid": "78afc8bc-3937-4e76-8a96-151898183254"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-clustertasks-view-role"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "6065efe519f74bcd9e8c00a0b97784295f299725b8174cc0ba1de4d0dc3ef0b6"
                },
                "creationTimestamp": "2026-05-14T03:32:12Z",
                "labels": {
                    "operator.tekton.dev/operand-name": "tektoncd-triggers"
                },
                "name": "tekton-clustertriggerbindings-view-rolebinding-all-users",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "trigger-main-static-v67vr",
                        "uid": "5027a1c0-4c6d-428a-b61c-df88cd4dcf5f"
                    }
                ],
                "resourceVersion": "24533",
                "uid": "2bdc72dc-f92a-4911-996c-697189a47c88"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-clustertriggerbindings-view-role"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:27:04Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "openshift-pipelines-operator-rh.v1.21.1"
                },
                "name": "tekton-config-read-rolebinding",
                "resourceVersion": "18327",
                "uid": "13f67dc8-0723-423d-ba33-2c6377c03afe"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-config-read-role"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "92406d388e39c5df3b49ad299cce521179f6ea96cf4df6db395bd9811467e863"
                },
                "creationTimestamp": "2026-05-14T03:31:41Z",
                "labels": {
                    "app.kubernetes.io/component": "events",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines",
                    "operator.tekton.dev/operand-name": "tektoncd-pipelines"
                },
                "name": "tekton-events-controller-cluster-access",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-mqfv6",
                        "uid": "d08871f1-80e2-4809-a6dc-cdc24c98da2f"
                    }
                ],
                "resourceVersion": "23702",
                "uid": "0bfe2455-b039-4c71-a85e-4651561bd9f8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-events-controller-cluster-access"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-events-controller",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "e6f73049b56cd9399028dc246f26d83d8b3aacb7d752ed60d9d90e8148751d8f"
                },
                "creationTimestamp": "2026-05-14T03:31:44Z",
                "labels": {
                    "operator.tekton.dev/operand-name": "tektoncd-pipelines"
                },
                "name": "tekton-operators-proxy-webhook-admin",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-mqfv6",
                        "uid": "d08871f1-80e2-4809-a6dc-cdc24c98da2f"
                    }
                ],
                "resourceVersion": "23781",
                "uid": "19772419-41a1-4b57-9d1e-55bb6e673dab"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-operators-proxy-admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-operators-proxy-webhook",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "04ffbe0f7d2fd4fcf0aced33012c65d53860aa7d2a4feb13defb750738eaa186"
                },
                "creationTimestamp": "2026-05-14T03:31:41Z",
                "labels": {
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines",
                    "operator.tekton.dev/operand-name": "tektoncd-pipelines"
                },
                "name": "tekton-pipelines-controller-cluster-access",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-mqfv6",
                        "uid": "d08871f1-80e2-4809-a6dc-cdc24c98da2f"
                    }
                ],
                "resourceVersion": "23694",
                "uid": "c3acf93b-3c2f-460e-9285-91a55ae9eac5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-pipelines-controller-cluster-access"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-pipelines-controller",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "f7ee1e40c35db181da154d3a53820988e8505a8237d9f5e2e281b6b9c3a01bd6"
                },
                "creationTimestamp": "2026-05-14T03:31:41Z",
                "labels": {
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines",
                    "operator.tekton.dev/operand-name": "tektoncd-pipelines"
                },
                "name": "tekton-pipelines-controller-tenant-access",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-mqfv6",
                        "uid": "d08871f1-80e2-4809-a6dc-cdc24c98da2f"
                    }
                ],
                "resourceVersion": "23697",
                "uid": "f23a2678-418f-4f0d-9548-7e5d9584b93c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-pipelines-controller-tenant-access"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-pipelines-controller",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "4de1071ef7000841fd519d77b0a1b3035851238ba59b38d2c97a42b3c6261bbe"
                },
                "creationTimestamp": "2026-05-14T03:31:43Z",
                "labels": {
                    "app.kubernetes.io/component": "resolvers",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines",
                    "operator.tekton.dev/operand-name": "tektoncd-pipelines"
                },
                "name": "tekton-pipelines-resolvers",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-mqfv6",
                        "uid": "d08871f1-80e2-4809-a6dc-cdc24c98da2f"
                    }
                ],
                "resourceVersion": "23754",
                "uid": "4b1106ff-3cce-4878-90f5-1e20c416746c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-pipelines-resolvers-resolution-request-updates"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-pipelines-resolvers",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "163e20f367e1f1a5bf8f5c432aa4160109feb6e9cde39677e6e2726e61fa7e9c"
                },
                "creationTimestamp": "2026-05-14T03:31:41Z",
                "labels": {
                    "app.kubernetes.io/component": "webhook",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines",
                    "operator.tekton.dev/operand-name": "tektoncd-pipelines"
                },
                "name": "tekton-pipelines-webhook-cluster-access",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-mqfv6",
                        "uid": "d08871f1-80e2-4809-a6dc-cdc24c98da2f"
                    }
                ],
                "resourceVersion": "23698",
                "uid": "3b5d9f79-f37a-4de7-844d-288411cb6aa8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-pipelines-webhook-cluster-access"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-pipelines-webhook",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "b53afb78c9e0fe2de60a6af957d1355be61c539be16d259bb3f0a37f521d0e80"
                },
                "creationTimestamp": "2026-05-14T03:32:57Z",
                "labels": {
                    "app.kubernetes.io/part-of": "tekton-config",
                    "operator.tekton.dev/operand-name": "tektoncd-pruner"
                },
                "name": "tekton-resource-pruner",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "tektoncd-pruner-2bfft",
                        "uid": "49a50537-f401-4cc6-a861-d740c0660140"
                    }
                ],
                "resourceVersion": "25692",
                "uid": "ffdf86fa-9296-49ef-a599-66fce5efbd3f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-resource-pruner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-resource-pruner",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:27:00Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "openshift-pipelines-operator-rh.v1.21.1"
                },
                "name": "tekton-result-read-rolebinding",
                "resourceVersion": "17767",
                "uid": "f4bc01fa-d03c-4062-9375-efd717b527b8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-result-read-role"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "5fe42eb2abf0d35305cceec2e415fafe87604846b3a361a5a5d8e9b372b565fe"
                },
                "creationTimestamp": "2026-05-14T03:32:34Z",
                "labels": {
                    "app.kubernetes.io/part-of": "tekton-results",
                    "app.kubernetes.io/version": "v0.17.2",
                    "operator.tekton.dev/operand-name": "tektoncd-results"
                },
                "name": "tekton-results-api",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "result-mczcw",
                        "uid": "e8d8db33-0d74-40df-bf02-fb8bf1927ca7"
                    }
                ],
                "resourceVersion": "25132",
                "uid": "25e2442f-6ca6-4d14-a558-745e9c5c8cd8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-results-api"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-results-api",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "1b8686467ebb8d0c8b3e41bfca91620c2be49852c43a84c680918dde48d5246c"
                },
                "creationTimestamp": "2026-05-14T03:32:34Z",
                "labels": {
                    "app.kubernetes.io/part-of": "tekton-results",
                    "app.kubernetes.io/version": "v0.17.2",
                    "operator.tekton.dev/operand-name": "tektoncd-results"
                },
                "name": "tekton-results-watcher",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "result-mczcw",
                        "uid": "e8d8db33-0d74-40df-bf02-fb8bf1927ca7"
                    }
                ],
                "resourceVersion": "25135",
                "uid": "a35e530a-5eb2-4bc3-bf34-c06124d095e3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-results-watcher"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-results-watcher",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "08f8af2e163e5729477417e9f617471d49211efd8be2bc6579662c42c34788a3"
                },
                "creationTimestamp": "2026-05-14T03:32:11Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-triggers",
                    "operator.tekton.dev/operand-name": "tektoncd-triggers"
                },
                "name": "tekton-triggers-controller-admin",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "trigger-main-static-v67vr",
                        "uid": "5027a1c0-4c6d-428a-b61c-df88cd4dcf5f"
                    }
                ],
                "resourceVersion": "24490",
                "uid": "e35994d2-b912-4595-a63b-d618900feb80"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-triggers-admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-triggers-controller",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "2225d0b5aae466fec8e7dd74d35398565eb6654a642869e258b6b1f411ce8fe9"
                },
                "creationTimestamp": "2026-05-14T03:32:11Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-triggers",
                    "operator.tekton.dev/operand-name": "tektoncd-triggers"
                },
                "name": "tekton-triggers-core-interceptors",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "trigger-main-static-v67vr",
                        "uid": "5027a1c0-4c6d-428a-b61c-df88cd4dcf5f"
                    }
                ],
                "resourceVersion": "24501",
                "uid": "c32be54a-7acc-4c81-ac5e-0c82900e28dd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-triggers-core-interceptors"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-triggers-core-interceptors",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "a99ec76fda6ff04319cf2d951825ee1e979427ba28c7ad4605dffb3745096305"
                },
                "creationTimestamp": "2026-05-14T03:32:11Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-triggers",
                    "operator.tekton.dev/operand-name": "tektoncd-triggers"
                },
                "name": "tekton-triggers-core-interceptors-secrets",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "trigger-main-static-v67vr",
                        "uid": "5027a1c0-4c6d-428a-b61c-df88cd4dcf5f"
                    }
                ],
                "resourceVersion": "24505",
                "uid": "09a1a51c-1b4e-4df3-9405-391adec2050f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-triggers-core-interceptors-secrets"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-triggers-core-interceptors",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "3c87fe21af5155fead284ead7914f51960d962de264ccad1192a0d035fa11ad8"
                },
                "creationTimestamp": "2026-05-14T03:32:11Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-triggers",
                    "operator.tekton.dev/operand-name": "tektoncd-triggers"
                },
                "name": "tekton-triggers-webhook-admin",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "trigger-main-static-v67vr",
                        "uid": "5027a1c0-4c6d-428a-b61c-df88cd4dcf5f"
                    }
                ],
                "resourceVersion": "24497",
                "uid": "eb2dd0fc-005c-4971-ac91-d06dc801b9e6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-triggers-admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-triggers-webhook",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:22:42Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "cluster-monitoring-operator",
                    "app.kubernetes.io/part-of": "openshift-monitoring"
                },
                "name": "telemeter-client",
                "resourceVersion": "11049",
                "uid": "aca130d1-2c01-4bf7-b54a-c6c49d7b1e2f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "telemeter-client"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "telemeter-client",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:24:02Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "cluster-monitoring-operator",
                    "app.kubernetes.io/part-of": "openshift-monitoring"
                },
                "name": "telemeter-client-view",
                "resourceVersion": "13737",
                "uid": "cf6bd2b4-e74d-42d3-9f13-bfaac6efbdf7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-monitoring-view"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "telemeter-client",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T03:22:44Z",
                "labels": {
                    "app.kubernetes.io/component": "query-layer",
                    "app.kubernetes.io/instance": "thanos-querier",
                    "app.kubernetes.io/managed-by": "cluster-monitoring-operator",
                    "app.kubernetes.io/name": "thanos-query",
                    "app.kubernetes.io/part-of": "openshift-monitoring",
                    "app.kubernetes.io/version": "0.36.1"
                },
                "name": "thanos-querier",
                "resourceVersion": "11242",
                "uid": "681e806f-82b0-4ccc-b27c-a02cd01d2551"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "thanos-querier"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "thanos-querier",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocds.argoproj.io/name": "tssc-gitops",
                    "argocds.argoproj.io/namespace": "tssc-gitops",
                    "meta.helm.sh/release-name": "tssc-gitops",
                    "meta.helm.sh/release-namespace": "tssc-gitops"
                },
                "creationTimestamp": "2026-05-14T03:27:33Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "tssc-gitops",
                    "app.kubernetes.io/name": "argocd-application-controller",
                    "app.kubernetes.io/part-of": "argocd"
                },
                "name": "tssc-gitops-tssc-gitops-argocd-application-controller",
                "resourceVersion": "18187",
                "uid": "cec1752c-01d6-46a8-a344-9e5952e388c4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tssc-gitops-tssc-gitops-argocd-application-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tssc-gitops-argocd-application-controller",
                    "namespace": "tssc-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocds.argoproj.io/name": "tssc-gitops",
                    "argocds.argoproj.io/namespace": "tssc-gitops",
                    "meta.helm.sh/release-name": "tssc-gitops",
                    "meta.helm.sh/release-namespace": "tssc-gitops"
                },
                "creationTimestamp": "2026-05-14T03:27:34Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "tssc-gitops",
                    "app.kubernetes.io/name": "argocd-applicationset-controller",
                    "app.kubernetes.io/part-of": "argocd"
                },
                "name": "tssc-gitops-tssc-gitops-argocd-applicationset-controller",
                "resourceVersion": "18423",
                "uid": "8735a7c5-49cf-4a5c-b362-bffd5ceff891"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tssc-gitops-tssc-gitops-argocd-applicationset-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tssc-gitops-applicationset-controller",
                    "namespace": "tssc-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocds.argoproj.io/name": "tssc-gitops",
                    "argocds.argoproj.io/namespace": "tssc-gitops",
                    "meta.helm.sh/release-name": "tssc-gitops",
                    "meta.helm.sh/release-namespace": "tssc-gitops"
                },
                "creationTimestamp": "2026-05-14T03:27:33Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "tssc-gitops",
                    "app.kubernetes.io/name": "argocd-server",
                    "app.kubernetes.io/part-of": "argocd"
                },
                "name": "tssc-gitops-tssc-gitops-argocd-server",
                "resourceVersion": "18189",
                "uid": "8c892b6b-5d58-4b7e-a5bf-8b127e0c4d76"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tssc-gitops-tssc-gitops-argocd-server"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tssc-gitops-argocd-server",
                    "namespace": "tssc-gitops"
                }
            ]
        }
    ],
    "kind": "List",
    "metadata": {
        "resourceVersion": ""
    }
}
